DSME6788 Cyber Security (3rd Trimester, 2019-20)
- Instructor: Sherman S. M. Chow
(firstname [at] (ie.)cuhk.edu.hk)
- Teaching Assistant: Donald Wong (donaldwong1996 [at] link.cuhk.edu.hk)
- Time: 2pm - 6pm, Saturday
- e-Venue: Meeting 899739137@cuhk.zoom.us (Password can
be found on Blackboard)
(Note that the e-venue for the mid-term will be different, check
Blackboard
or your email.)
- Class Composition: MSc (ITM) Full-time/Part-time
-
(Last year's homepage for reference)
Workload:
- Participation [10%]
(via uReply/Zoom in class)
- "Lab" Assignment
[15%]
(Due: April 12th 2020 11:59pm HK Time)
- Individual Written Assignment [15%]
(Due: May 25th 2020 11:59pm HK Time)
- Mid-Term [30%]
(May 30th 2020, Scope = everything before mid-term)
- Group Project [30%]
Project Report Deadline:
June 30th 2020 (hard deadline,
allow time for Veriguide check)
No prior knowledge of security, cryptography, or number theory is
required.
Class Schedule:
- 21/Mar: Introduction (1), Malicious software (6)
...
- 18/Apr:
Cryptography (2), Symmetric-key cryptography (20)
RC4 demo (2) // offline lecture uploaded to Blackboard
- 25/Apr:
User authentication (3), Access control (4)
Database (5) // offline lecture uploaded to Blackboard
- 2 May: Public-key cryptography and Key management (21+23)
...
-
16/May:
Public-key cryptography and Key management (cont.)
-
23/May:
Risk management framework (14)
Web security (11)
Security principles ("1": as a summary/reflection
before the mid-term examination)
-
30/May
["In-Class" Online Open-Everything Mid-Term Examination,
"3-hour" exam within 2-6pm]
-
6/Jun:
Network security:
Anonymous Communication (Tor),
Virtual Private Network (VPN),
Denial of Services (7), Intrusion Detection (8), and
Firewall (9)
-
13/Jun: Bitcoin, Blockchain, and Smart Contracts (Special Topics)
Required Textbook:
Computer Security: Principles and Practice
-
by William Stallings and Lawrie Brown
-
4th ed., Global Edition, Prentice Hall, 2018.
-
ISBN: 1-292-22061-9, 978-1-292-22061-1
Projects:
-
A study of the worldwide payment system -- SWIFT vs. Blockchain/Ripple
(H.Y.A. Ho, K.P. Pang, Y.C. Sam, C.H. Tam, T.T. Wong)
-
OWASP: Mobile App, IoT, Web App, and ZAP
(Y.W. Chan, Y.K. Chou, K.P. Law, C.M. Wong)
-
People are the weakest link -- How to protect your staff from phishing and
social engineering attack
(K.W. Chung, H.W. Lau, S.Y. Leung, S.P. Liu)
-
Study of a Mobile Payment Platform --
Are Digital Wallets Safe and Sound?
(M.M.N. Chan, Y.S. Lam, W.T. Yek, K.F. Yeung)
-
Security feature and Vulnerability of SAML
(W.C. Chu, W.C. Fan, W.K. Kwong, Y.K. Leung)
-
Privacy information security risk assessment method based on cryptography
theory
(J. Chai, J. Shen, Z. Yang, R. Yu)
-
Capital One Cyber Security Incident 2019 --
A Lesson Learnt on Cloud Adoption and Access Control
(H.F.J. Fung, W.S. Hui, T.S. Ko, L.H. Sham, L.K. Yi)
-
Analysis over Zoom Security Incidents
(D.S. Toche Foka, K.M. Yeung, K.M. Yung, Y. Zhou)
-
Study on Cyber Security in Hong Kong Small and Medium Enterprise
(C.T. Au, R.W.L. Cheng, M.H. Fung, H.M. Lam)