- the Syllabus for this course will be maintained on the instructor's
website at www.berghel.net.
- the assigned readings will come from online resources. URLs for the readings will be listed in the syllabus under "reading assignments." Note that reading assignments are for the current syllabus entry (i.e., read the assignment for the next class ahead of class). Exam questions regarding the assigned readings will be taken from the course
Study Guide.
- The dates of any exams and homework will be posted on this online syllabus at least 10 days before the date. Homework may be periodically assigned, the value of which will be clearly indicated on the assignment. The exam component of your final exam will be weighted as follows: in-term exams, collectively, will represent 50% of the total exam grade; and the final exam will represent the other 50% of the exam component of the overall course grade. The weighting of other course requirements such as homework, projects, etc. will be specified on the assignments.
- UNLV POLICES AND RESOURCES
- The current UNLV policies that govern instruction are posted on the website of the The Office of the Executive Vice President and Provost at https://www.unlv.edu/policies/students.
- In addition, these resources may be of interest::
- Writing Center Statement
- Tutoring Availability
- UNLV Annual Security Report
- UNLV campus police crime log
- UNLV Institutional Metrics
- Additional University Policies: https://www.unlv.edu/policies/additional
- CLASS POLICIES
- EXAMS: All exams are closed book, closed notes, all electronic devices turned off. Any student caught with an active mobile device during an exam will receive a grade of F for the exam.
- GENERATIVE AI: All students are responsible for submitted work, irrespective of tools used to create it. Any use of generative AI to create content or make translations for
use in coursework must be completely transparent and acknowledged in the submitted work. A minimum for complete transparancy will include disclosure of (a) acknowledgement of the use of GenAI,
(b) name of GenAI tool(s), and (c) identifying the "imported" GenAI content in the document(s) affected (either by quotation, footnote, or endnote).
Further students must retain the complete GenAI content until the end-of-terms should this be requested for
comparison purposes. It must be noted that any use of GenAI must be consistent with existing intellectual
property laws and UNLV policies.
- ATTENDANCE: Attendance will be taken. Students with at most 1 (one) documented unexcused absence (e.g., due to health problems, religious holidays, official UNLV
activities) as recorded by the classroom attendance sheet, will receive a bonus of 10% on their final grade.
- GRADING SCALE : Grading will be on a standard "university scale," i.e., 90-100=A; 80-89=B; etc.
- FINAL GRADE: A tentative grade will be determined by averaging the regular exams during the semester and applying the "university scale" and adding any bonus that might apply. You are only required to take the final exam if you wish to attempt to improve your grade. If you are satisfied with this grade, you need not take the final exam. If you wish to improve your course grade, your final grade will be averaged in with your semester grade according to a formula announced in class during dead week.
Course Description:
Overview Of Computer Security, Threats, Vulnerabilities And Controls.
Security Auditing, Physical Security, Computer Security Policies And
Implementation Plans, And Computer Forensics Including Penetration Testing
And Investigation. Management Issues. Legal, Privacy And Ethical Issues.
Prerequisites: CS 370. 3 Credits.
Course Materials:
Most reading assignments will either relate directly to the course
notes/slides provided on this syllabus, or will be public domain
material linked to this syllabus. In addition, you may find the
following resources of value.
- SANS Resources
- SANS IPv4 TCP/IP and tcpdump Pocket
Reference Guide (The version that will be attached to
relevant exams)
- Lenny
Zeltser's Reverse Engineering Malware FAQs
- Instructor's Notes
- Instructor's notes on Positional Number
Systems and Boolean Algebra
- Instructor's notes on TCPdump commands
and filters
- Instructor's study guide to selected reading
assignments
- Instructor's Online Resources
- Better Than
Nothing Security Practices
- The Packet Pal
Primer (an Internet Protocol Resource)
- The CGI-Bin Bin (a
guide to CGI programming circa 1996
- The World Wide
Web Test Pattern (find out what the 1990's browser wars were
about interactively)
- Instructor's TCP/IP Lecture Slides (CS448/648 & CS449/649)
- IPv4
- TCP/UDP
- ICMP
- DNS-ARP
- HTTP
- BGP
- IPsec
- Instructor's Online Packet Guide: Packet Pal Primer
- Useful Online References:
- Wireshark References
- Wireshark Capture Filter Expressions: http://wiki.wireshark.org/CaptureFilters
- Wireshark Sample Captures: http://wiki.wireshark.org/SampleCaptures#ARP.2FRARP
- Forensics Papers
- Carrier, Brian and Eugene Spafford, "An
Event-Based Digital Forensic Investigation Framework"
- Carrier, Brian: "Degining
Digital Forensic Examination and Analysis Tools"
- Carrier, Brian: "Performing
an Autopsy Examination on FFS and EXT2FS Partition Images"
- Manuals and Reference Materials
- WinDump
Manual
- Notes on TCPdump and Windump
- Snort Commands
- ASCII Table
- Packet Pal
Primer
- Berghel/Hoelzer: Pernicious Ports
, CACM, December, 2005
- Wireshark Display Filters
- Trusted-Source Network in Digital Security
- Schneier on Security - the
most accurate security blog on the internet
- Krebs on Security - the best
general-purpose security blog on the internet
- Watchlist of Future Threat Vectors
- Election Fraud and Digital Ballot Boxes:
- The Verified Voting
Foundation
- The
VVF's Principles for New Voting Systems
- The NSA
ANT Catalog
- The
DIY Ransomware software ad from the Isle of Man March 2,
2017
- CIA
Tradecraft DOs and DONT's for Malware Development (text;
src: Wikileaks; cf. esp. "(U) Networking" ). See also
Helpful(?) coding tips from the CIA's school of hacks , Ars
Technica, March 8, 2017
- The NSA's
Media Engagement (aka: Deception) Plan
- Micah Lee, It's
Impossible to Prove your Laptop hasn't been Hacked..... ",
The Interecept, April 28, 2018.
- Micah Lee, Edward
Snowden's New App uses your smartphone to physically guard your
laptop , The Intercept, December 27, 2017.
- Interesting Digital Archives
- A Protocol for Packet Network Intercommunication Vint Cerf and Bob Kahn's seminal 1974 paper that outlines the TCP/IP protocol suite
- IEEE
Computer Society's Computing Conversations by Chuck Severance
- AT&Ts
Tech Channel
-
The IEEE Computer Society 2022 Report (predictions)
- Dan Kaminsky's Black Ops Series
- Dan
Kaminsky: Black Ops of TCP IP 2008 (Defcon 16, 2008)
- Dan
Kaminsky: Black Ops of TCP IP 2011 (Defcon 19, 2011)
- Dan
Kaminsky: Black Ops of TCP IP 2013 (Defcon 20, 2012)
- Relevant Videos
- Whitfield Diffie: Information
Security - Before and After Public-Key Cryptography; Computer
Museum
- Vint Cerf on
the History of Packets(video)
- NSA: Tell
No One by James Bamford [31c3, Dec. 2014]
- Innervation
- Dr.
Chuck's iPad Steering Wheel Mount
-
the ill-fated Clipper Chip
- Miscellaneous
-
PRPL's: Security Guidance for Critical Areas of Computing ,
January, 2016
-
Dylan Curran, Are you ready? Here is all the data Facebook and
Google have on you , The Guardian, March 30, 2018
- Bruce
Schneier: The Security Mirage (Online TED presentation)
- Recommended References: (although not required, these are standard
references for computer and internet security).
- Brian Carrier, File System Forensic Analysis, Addison-Wesley,
Reading
- Charles Kozierok, TCP/IP Guide, NoStarch Press, San Francisco
(2014)
- Sherri Davidoff and Jonathan Ham, Network Forensics: Tracking
Hackers through Cyberspace, Prentice-Hall (2012)
- Laura Chappell, Wireshark Network Analysis: The Official Wireshark
Certified Network Analyst Study Guide, Laura Chappell University
(2010)
- Laura Chappell, Wireshark Network Analysis, 2nd ed., Chappell
University (2012) [she has several good books on Wireshark, but this
is the best IMHO]
- Charles and Shari Pfleeger, Security in Computing, Prentice Hall
(2007)
- Gordon Fyodor Lyon, NMAP Network Scanning, Nmap Project (2009)
(partially online @ nmap.org)
- John Vacca (ed.): Computer and Information Secutiy Handbook,
Elsevier (2013) [a useful, encyclopedic approach]
- Dave Roberts, Internet Protocols Handbook, Coriolis Group (1996)
[an oldie and a goodie - still a useful introduction to TCP/IP. If
you can find it.]
Course Outcomes:
- By the end of the term, you will:
- Understand Internet Fundamentals
- Understand the operation of packet-based networks
- Understand the function of core protocols in the TCP/IP
Protocol Suite
- Understand the OSI and TCP/IP network models and their
inter-relationship
- Understand the security challenges of related TCP/IP environments like WiFi, VoIP, and drone avionics
- Understand Computer Fundamentals
- Understand Basic Security Vulnerabilities associated with the BIOS, Operating Systems and Applications Software of modern computers
- Understand the Security roles of security hardware and software
including anti-virus, intrustion detection and prevention systems, registry and process monitors, file change monitors, etc.
- Understand the security differences between popular operating systems
- Understand the role of risk management and the law in computing
security
- Understand the economics of computing and network security
- Understand how one measures the value of security
- Understand the legal issues in network security
- Understand how digital security is deployed in the public and
private sector
- Understand the tradeoff between security and usability
- Understand best practices for program security
- Understand various models of digital security and security
appliances
- Understand the difference between open source and proprietary
security software
- Understand the security implications of open source vs. closed
source (proprietary) software
- Understand the relationship between hardware and software
vis-a-vis computing security
- Understand the levels of packet inspection that are used to
detect anomalous network traffic
- Understand the role of major categories of network appliances
(e.g., IPS, IDS, firewall, router, gateway, etc.)
- Understand such concepts as defense-in-depth, time-based
security,
- Understand trusted vs. untrusted systems
- Understand how network topologies are developed and hardened
- Understand varieties of threat vectors in computing and networking
security
- Understand traditional categories of malware (malicious
software)
- Understand phishing and pharming, doxing, VoIP swatting, pretexting
- Understand spyware, pixelated anchors, cookies,
- Understand how to detect out-of-band traffic, protocol
bending,
- Understand modern digital crime including online fraud
- Understand how digital money laundering works
- Understand how programs may be written insecurely
- Understand main classes of network security vulnerabilities
- Understand main classes of computer security vulnerabilities
- Understand modern cyberwarfare strategies and tactics
- Understand what is involved in auditing and monitoring networks and
computers
- Understand network scanning
- Understand port scanning
- Understand computer baseline analysis and patch maintenance
- Understand network reconnaissance
- Understand the complexity of network auditing
- Understand traditional methods of data hiding:
- Understand basic cyptography, encryption standards, and
metaphors
- Understand the role of steganography and watermarking in data
hiding
- Understand the roles and types of anonymizers and remailers
- Understand the threats on personal privacy:
- Understand how digital surveillance technology is used
- Understand the major categories of threats on personal privacy
- Understand the major categories of treats from digital
telematics
- Understand how business data surveillance is deployed (e.g.,
cell phone tracking, OnStar, etc.)
- Understand the nature of government data surveillance
(Echelon, Carnivore, PRISM, etc.)
- Understand major categories of vulnerabilities from
surveillance (stalking, blackmail, extortion, threats to
journalists, etc.)
- Professional Ethics and Certifications
- Understand the importance of professional ethics
- Familiarization with the ACM Code of Ethics and Professional
Conduct
- Familiarization with SANS security training programs
- Become familiar with digital security certifications and
programs
- Become familiar with computer organizations that support digital
security (ACM, IEEE-CS, etc.)
Core Competencies
- You will know where to look for industry best practices in
computer and network security
- You will know where to look for legal advice in computer and
network security
- You will be familiar with the main categories of malware and how
they're deployed
- You will understand the basic approaches to hardening computers
and networks
- You will understand the characteristics of a secure network
topology
- You will understand the characteristics of standard encryption
systems and their suitability for specific computing environments
- You will understand the role of standards and certifications in
computing security
- You will understand the vulnerabilities of common desktop
operating systems
- You will understand the core issues involved in administering
security
- You will understand the legal, privacy and ethical issues in
computing security
Syllabus
note: The UNLV IEEE Xplore digital
library and ACM digital library institutional licenses allow open access to UNLV students from any UNLV IP
address). If a syllabus link to an assigned reading is fractured, use the title as a search term on the relevant portal.
Whenever possible, I will provide alternative convenient
links consistent with copyright laws, but I cannot guarantee the
persistence of the links.
Week of August 25 - Internet Realities
- General Introduction to Course.
- PaSsWoRdZ
- Lecture Notes on Dark Web/Deep State
- Lecture Notes on Net Neutrality
- Reading Assignments
-
Net Neutrality Reloaded IEEE Computer, October, 2017; DOI: 10.1109/MC.2017.3641632
- What
is More Dangerous - the Dark Web or the Deep State? , IEEE
Computer, July, 2017; DOI: 10.1109/MC.2017.215
- Oh,
What a Tangled Web: Russian Hacking, Fake News, and the 2016 US
Presidential Election , IEEE Computer, September, 2017; DOI: 10.1109/MC.2017.3571054
- Study Guide to Assigned Readings - continuously updated throughtout the term
Week of September 1-- Phishing and Trolling (note UNLV is closed for Labor Day on September 1 )
Week of September 8 -- The Darker Side of Computing and Networking -
- Lecture Notes
- Reading Assignments
- Weaponizing
Twitter Litter: Abuse Forming Networks and Social Media,
IEEE Computer, April, 2018; DOI: 10.1109/MC.2018.2141019
- Malice
Domestic: The Cambridge Analytica Dystopia , IEEE Computer, May,
2018; DOI: 10.1109/MC.2018.2381135
- Huawei,
BIS, and the IEEE: It's Deja Vu All Over Again , IEEE Computer,
October, 2019; DOI: 10.1109/MC.2019.2927074
- Through the PRISM Darkly, IEEE Computer, 46:7, pp. 86-90, July, 2013 DOI: 10.1109/MC.2013.253
- The QAnon Phenomenon: The Storm Has Always Been Among Us, IEEE Computer, 55:5, pp. 93-100, 2022. DOI: 10.1109/MC.2022.3154125
Week of September 15 - Digital Crime
- Lecture Notes
- Reading Assignments
- The Future of Digital Money Laundering, IEEE Computer, August, 2014; DOI: 10.1109/MC.2014.225
- The State of the Art in Identity Theft, Advances In Computers, v. 83, 2011;
DOI: 10.1016/B978-0-12-385510-7.00001-1
- Fungible Credentials and Next-Generation Fraud, Communications of the ACM, December, 20006; DOI: 10.1145/1183236.1183252
- Identity Theft and Financial Fraud: Some Strangeness in the Proportions, IEEE Computer, 2012, DOI: 10.1109/MC.2012.16
Week of September 22 - The Hacking Landscape
September 29 : EXAM I - Note: All
exams are closed book, closed notes, all electronic devices turned off. Failure to observe may result in a course
grade of F.). The current version of the course Study Guide for this exam is rev: 050725.. Remember to refresh your browser cache in preparation for the exam.