Canada Post Strike Updates
Skip to main contentSkip Navigation or Skip to Content
Thompson Rivers University
Thompson Rivers University

COMP 3261: Internet and Security Issues

This course presents the most practical of Internet/Intranet technologies and techniques to students. It covers Internet protocols, addressing and architecture, Intranet and Extranet design, installation and management, as well as all aspects of Internet/Intranet security and user/data authentication.

Learning outcomes

Students will have sound understanding of Transmission Control Protocol/Internet Protocol suite and Internet/Intranet techniques, and have necessary knowledge and skills for network-related professions and advanced studies.

  • Have sound understanding of Transmission Control Protocol/Internet Protocol suite and Internet/Intranet techniques, and have necessary knowledge and skills for network-related professions and advanced studies.
  • Classify computer network vulnerabilities and types of attacks.
  • Define security goals and their meanings.
  • Explain useful tools commonly used by an attacker.
  • Explain common techniques used for launching the Denial of Service and Distributed Denial of Service attacks, as well as techniques to prevent them.
  • Explain the characteristics of viruses, worms and malware.
  • Explain the basic concepts and techniques for protecting and designing a private network.
  • Identify types of firewall implementation suitable for differing security requirements.
  • Apply and explain simple filtering rules based on IP and TCP header information.
  • Distinguish between firewalls based on packet-filtering routers, application-level gateways, and circuit-level gateways.
  • Compare and contrast symmetric and asymmetric encryption systems and their vulnerability to attack, and explain the characteristics of hybrid systems.
  • Explain what is meant by data integrity, and give reasons for its importance.
  • Describe the use of hash functions, and explain the characteristics of one-way and collision-free functions.
  • Explain the role of third-party agents in the provision of authentication services.
  • Explain some widely-used techniques and protocols for secure communications.
  • Discuss the effectiveness of passwords in access control and the influence of human behaviour.
  • Be aware of future trends in the field of network security.

Course topics

  • Unit 1: Introduction to Network Security
  • Unit 2: Network Endpoint Security
  • Unit 3: Cryptography
  • Unit 4: Securing Transaction — Digital Signature, Security Protocols and Virtual Private Networks
  • Unit 5: Emerging Areas of Network Security

Required text and materials

Students require the following e-textbook, which can be purchased directly from the TRU bookstore site at: https://thebookstore.tru.ca/site_digital.asp

  1. Stallings, W. (2020). Cryptography and Network Security: Principles and Practice (8th ed.). Saddle River, NJ: Pearson/Prentice Hall.
    Type: E-Textbook. ISBN: 978-0-13-5764176

Assessments

Please be aware that should your course have a final exam, you are responsible for the fee to the online proctoring service, ProctorU, or to the in-person approved Testing Centre. Please contact exams@tru.ca with any questions about this.

To successfully complete this course, students must achieve a passing grade of 50% or higher on the overall course, and 50% or higher on the final mandatory exam.

Assignment 1: Introduction to Network Security 10%
Assignment 2: Network Endpoint Security 10%
Assignment 3: Cryptography 10%
Assignment 4: Securing Transactions 10%
Assignment 5: Emerging Areas of Network Security 10%
Final Exam (mandatory) 50%
Total 100%

Open Learning Faculty Member Information

An Open Learning Faculty Member is available to assist students. Students will receive the necessary contact information at the start of the course.

Search To Top