COMPX304-23A (HAM)

Advanced Networking and Cyber Security

15 Points

Edit Header Content
Division of Health Engineering Computing & Science
School of Computing and Mathematical Sciences
Department of Computer Science

Staff

Edit Staff Content

Convenor(s)

Lecturer(s)

Administrator(s)

: maria.admiraal@waikato.ac.nz
: buddhika.subasinghe@waikato.ac.nz

Placement/WIL Coordinator(s)

Tutor(s)

Student Representative(s)

Lab Technician(s)

Librarian(s)

: alistair.lamb@waikato.ac.nz

You can contact staff by:

  • Calling +64 7 838 4466 select option 1, then enter the extension.
  • Extensions starting with 4, 5, 9 or 3 can also be direct dialled:
    • For extensions starting with 4: dial +64 7 838 extension.
    • For extensions starting with 5: dial +64 7 858 extension.
    • For extensions starting with 9: dial +64 7 837 extension.
    • For extensions starting with 3: dial +64 7 2620 + the last 3 digits of the extension e.g. 3123 = +64 7 262 0123.
Edit Staff Content

What this paper is about

Edit What this paper is about Content

An advanced study of computer networks and cyber security supported by practical examples. This paper provides students with an advanced comprehension of Internet operation, its key protocols and security technologies, as well as an understanding of common security issues present in software, operating systems, hardware, and human nature.

The learning outcomes for this paper are linked to Washington Accord graduate attributes WA1-WA11. An explanation of the graduate attributes can be found at: https://www.ieagreements.org/
Edit What this paper is about Content

How this paper will be taught

Edit How this paper will be taught Content

The course is delivered via in-person lectures. The lectures are supplemented with laboratory exercises that expand on important topics found in lecture slides and ground the lectures with practical exercises.

The lecture slides and recordings will be made available on Moodle some time after the lecture. The laboratories will not be recorded, and attendance is required. Students are expected to view all lectures and complete the laboratory each week.

Edit How this paper will be taught Content

Required Readings

Edit Required Readings Content
Required readings will be identified in class, be publicly available, and found online.
Edit Required Readings Content

Learning Outcomes

Edit Learning Outcomes Content

Students who successfully complete the course should be able to:

  • Students will be able to configure, monitor and test small computer networks (WA3,WA5)
    Linked to the following assessments:
    Participation in Laboratory Exercises (1)
    Assignment 1: Routing with OSPF (2)
    Assignment 2: Routing with BGP (3)
    Test 1: Networking (4)
  • Students will be able to implement a protocol for securely exchanging information over an insecure channel (WA3, WA4)
    Linked to the following assessments:
    Assignment 3: Quantum Key Exchange (5)
  • Students will have an understanding of security vulnerabilities (WA2, WA4, WA6)
    Linked to the following assessments:
    Participation in Laboratory Exercises (1)
    Assignment 3: Quantum Key Exchange (5)
    Assignment 4: Side channel attacks (6)
    Test 2: Security (7)
  • Students will have an understanding of software security best practices (WA1, WA3)
    Linked to the following assessments:
    Participation in Laboratory Exercises (1)
    Assignment 4: Side channel attacks (6)
    Test 2: Security (7)
  • Students will improve their understanding of central aspects of the Internet including as TCP/IP, DNS, addressing, routing, and routing protocols (WA1, WA2)
    Linked to the following assessments:
    Participation in Laboratory Exercises (1)
    Assignment 1: Routing with OSPF (2)
    Assignment 2: Routing with BGP (3)
    Test 1: Networking (4)
Edit Learning Outcomes Content
Edit Learning Outcomes Content

Assessments

Edit Assessments Content

How you will be assessed

Edit How you will be assessed Content

The laboratory tasks and assignment work is strongly linked to the theory covered in lectures. Viewing the lectures and completing the laboratory and assignment work will result in the best learning outcomes.

The "Routing with BGP" assignment follows on from the "Routing with OSPF" assignment. Submitting the OSPF assignment will therefore help students complete the BGP assignment.

Please note that, as part of any assessment, students may be asked to complete an oral examination (viva voce) at a later date.
Edit How you will be assessed Content

The internal assessment/exam ratio (as stated in the University Calendar) is 100:0. There is no final exam. The final exam makes up 0% of the overall mark.

The internal assessment/exam ratio (as stated in the University Calendar) is 100:0 or 0:0, whichever is more favourable for the student. The final exam makes up either 0% or 0% of the overall mark.

Component DescriptionDue Date TimePercentage of overall markSubmission MethodCompulsory
1. Participation in Laboratory Exercises
10
  • Hand-in: In Lab
2. Assignment 1: Routing with OSPF
12.5
  • Online: Submit through Moodle
3. Assignment 2: Routing with BGP
12.5
  • Online: Submit through Moodle
4. Test 1: Networking
6 Apr 2023
3:00 PM
20
  • In Class: In Lecture
5. Assignment 3: Quantum Key Exchange
12.5
  • Online: Submit through Moodle
6. Assignment 4: Side channel attacks
12.5
  • Online: Submit through Moodle
7. Test 2: Security
1 Jun 2023
3:00 PM
20
  • In Class: In Lecture
Assessment Total:     100    
Failing to complete a compulsory assessment component of a paper will result in an IC grade
Edit Assessments Content