Skip to Main Content
Idaho State University

Teaching Considerations

  1. SUGGESTED SCHEDULE:
  2. The following sample module plan is based on the offering of three to five and a half hours of lectures:

    1. Overview 0.5 hours
    2. Threats 1.0 to 2.0 hours
    3. Countermeasures 1.0 to 2.0 hours
  3. Tradeoffs - Costs and Benefits 0.5 to 2.0 hour
  4. Network Design 1.0 to 2.0 hours
  • HOMEWORK AND LAB EXERCISES
  • A specific lab exercise on protection cannot be justified in this module. It would be more appropriate to incorporate security concepts in the lab exercises used in the general data communications course. Specify the facilities available at a particular location.

  • CASE STUDIES
  • Two possible forms of case studies are suggested. The first is based around a particular application, such as a remote login or electronic funds transfer. The particular vulnerabilities and countermeasures of that application are studied. The other form of a case study is analysis of the security and vulnerabilities and features of an existing network, such as the ARPAnet.