Network Security
2011-2012 - IMT4581 - 10 ECTS

On the basis of

Some knowledge of cryptology course.

Expected learning outcomes

 The student is expected to have insight into:

  • why network security is important and why it should not be neglected
  • which mechanisms are required and available for protection of networked systems
  • how these mechanisms are used to solve security challenges in particular systems

The course will provide the student with the foundation required for implementing protection systems and for continuing research in the field.


 Part I Introduction :

  •  Network infrastructure and security threats

 Part II Protection methods :

  •  Encryption, device authentication, message authentication and protection of integrity.
  • Key management: symmetric keys, public key infrastructure, certificates, revocation, and key escrows.
  • Distributed access control
  • Anatomy of attacks, firewalls, and protection against attacks

 Part III Applications of security mechanisms  

  •  Internet security (PGP, IPsec, NLS)
  • Mobile security (GSM/UMTS architectures and security objectives, security functions of USIM, management of anonymity in mobile networks, use of USIM security to protect other systems)
  • Non-repudiation (principles, collection of evidence, example of protocols)
  • Payment systems (CyberCash, NetBill, Ecash)

Teaching Methods


Form(s) of Assessment


Form(s) of Assessment (additional text)

An overall evaluation is based on a 100 point scale, where the essay counts 50 points and the final exam (3 hours) counts 50 points. Conversion from 100 point scale to A-F scale according to recommended conversion table. In specific circumstances, emneansvarlig can slightly adjust the limits in the conversion table to enforce compatibility with the qualitative descriptions on the A-F scale

Grading Scale

Alphabetical Scale, A(best) – F (fail)

External/internal examiner

Internal examiner

Re-sit examination

For the final exam: Ordinary re-sit examnination.

Examination support


Coursework Requirements


Teaching Materials

Available via Fronter.

Replacement course for