Network Security
2009-2010 - IMT4581 - 10 ECTS


Some knowledge of cryptology course.

Expected learning outcomes

The student shall gain insight into:
• why network security is important and why it should not be neglected
• which mechanisms are required and available for protection of networked systems
• how these mechanisms are used to solve security challenges in particular systems

The course will provide the student with the foundation required for implementing protection systems and for continuing research in the field.


Part I Introduction :
• Network infrastructure and security threats

Part II Protection methods :
• Encryption, device authentication, message authentication and protection of integrity.
• Key management: symmetric keys, public key infrastructure, certificates, revocation, and key escrows.
• Distributed access control
• Anatomy of attacks, firewalls, and protection against attacks

Part III Applications of security mechanisms
• Internet security (PGP, IPsec, NLS)
• Mobile security (GSM/UMTS architectures and security objectives, security functions of USIM, management of anonymity in mobile networks, use of USIM security to protect other systems)
• Non-repudiation (principles, collection of evidence, example of protocols)
• Payment systems (CyberCash, NetBill, Ecash)

Teaching Methods


Form(s) of Assessment


Form(s) of Assessment (additional text)

An overall evaluation is based on a 100 point scale, where the essay counts 50 points and the final exam counts 50 points. Conversion from 100 point scale to A-F scale according to recommended conversion table. In specific circumstances, emneansvarlig can slightly adjust the limits in the conversion table to enforce compatibility with the qualitative descriptions on the A-F scale

Grading Scale

Alphabetical Scale, A(best) – F (fail)

External/internal examiner

Internal examiner

Re-sit examination

For the final exam: Ordinary re-sit examnination.

Coursework Requirements


Teaching Materials

Available via Fronter.

Replacement course for