Resilient Networks. 00. Preliminaries. Who is who. Organizational Issues. P2P, TK What do we do. Exercise course Rough time line Examination
|
|
- Gerard Wright
- 8 years ago
- Views:
Transcription
1 Resilient Networks 00. Preliminaries Who is who P2P, TK What do we do Organizational Issues Exercise course Rough time line Examination Fachbereich Informatik P2P Group and Telecooperation Group Thorsten Strufe and Mathias Fischer 1
2 Who is Who Prof. Dr. Thorsten Strufe Dr. Mathias Fischer Teaching Assistants We have none, you re depending on us alone :-) Questions? Feel free to contact any of the PhD students of TK-SSI or P2P Consultation Just drop us an , ask any PhD student, pass by our offices Fachbereich Informatik P2P Group and Telecooperation Group Thorsten Strufe and Mathias Fischer 2
3 What do we do? P2P Group Decentralized dist. systems (P2P) & online social networks (OSN)! P2P P2P extremely robust, resilient, and very efficient, so How can we learn from BitTorrent and Skype to make other systems better? Hence: understand the secrets behind P2P and apply them to other domains OSN Predominant service on the Internet today (fb has more hits than google) Used by entire population (even my dad at >70y! ;-) ) how do people use them? (make them better!) Extreme privacy threat Current research projects: QuaP2P (resilient p2p cloud), Safebook, Social P2P-IPTV Fachbereich Informatik P2P Group and Telecooperation Group Thorsten Strufe and Mathias Fischer 3
4 What do we do? Telecooperation Group Secure Smart Infrastructures Secure and resilient services Secure group communication Monitoring and intrusion detection Botnet resilience and detection Resilience in cyber physical systems Fachbereich Informatik P2P Group and Telecooperation Group Thorsten Strufe and Mathias Fischer 4
5 Course Schedule Lecture Tuesdays 11:40 am 1:20 pm Exercise course Thursdays 11:40 am 1:20 pm Summer semester 2013 starts April 1st and ends July 19th Lecture starts April 23th and ends July 16th Exercise starts May 2nd, ends July 18th Some exceptions: 09.05, Fachbereich Informatik P2P Group and Telecooperation Group Thorsten Strufe and Mathias Fischer 5
6 Some Words Regarding this Course Main topic of the course is the security of deployed, crucial networks, networking functions, and network protocols. Considering the Internet: networking is an essential service, hence the networking infrastructure is/may be the main target of attacks! Now what!? There will be some ex-cathedra parts, but please ask and discuss as much as possible! Slide history Based on several former courses given at TU Ilmenau, Uni Mannheim, and TU Darmstadt Heavily derived from Protection of Communication Infrastructures of/with Prof. G. Schäfer in Ilmenau Course Language Slides are in English, presentation as you prefer (we made an election) Fachbereich Informatik P2P Group and Telecooperation Group Thorsten Strufe and Mathias Fischer 6
7 Preliminary Course Overview 1. Introduction 2. Graph Theory 3. Resilient Network Design 4. Resilient Routing 5. Domain Name System (DNS) Security 6. Denial of Service Attacks and Countermeasures 7. Resilient Peer-to-Peer Networking 8. Intrusion Detection and Response Fachbereich Informatik P2P Group and Telecooperation Group Thorsten Strufe and Mathias Fischer 7
8 The Exercise Course Exercise course will be organized as a reading group Papers (links) available on the webpage (soon) Read papers early One paper with relation to lecture topics will be presented (by a random one of you!) and discussed (by you!) each week (please take note of the emphasize on YOU :-) ) Fachbereich Informatik P2P Group and Telecooperation Group Thorsten Strufe and Mathias Fischer 8
9 The Exam There will be an exam. Preferably an oral exam, if numbers permit You need to register! (with us! In addition to any other registrations, send me an by June 30th, please!) Procedures: Questions available in German (and English upon request) Answers given in German (and English upon request) No written material allowed (books, slides, notes) Except language dictionaries for non-native speakers (German/English), without any personal add-ons, handwritten comments, supplements, etc. If needed, we will provide a list of important equations Fachbereich Informatik P2P Group and Telecooperation Group Thorsten Strufe and Mathias Fischer 9
10 Questions? Fachbereich Informatik P2P Group and Telecooperation Group Thorsten Strufe and Mathias Fischer 10
Simulation and Evaluation of Computer Networks. 00. Preliminaries. Who is who TK What do we do. Organizational Issues. Rough time line Examination
Simulation and Evaluation of Computer Networks 00. Preliminaries Who is who TK What do we do Organizational Issues Rough time line Examination SS 14 Fachbereich Informatik Telecooperation Group SECoN Mathias
More informationSeminar TK: Ubiquitous Computing
Seminar TK: Ubiquitous Computing Seminar 4 CP, Summer Term 2014 Immanuel Schweizer schweizer@tk.informatik.tu-darmstadt.de Based on slides by Dr. Leonardo Martucci, Florian Volk General Information What?
More informationCOMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus
COMP-530 Cryptographic Systems Security *Requires Programming Background University of Nicosia, Cyprus Course Code Course Title ECTS Credits COMP-530 Cryptographic Systems 10 Security Department Semester
More informationPeer-to-Peer Systems. Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf
Peer-to-Peer Systems Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf Peer-to-Peer Systems Chapter 13 Online Social Networks Introduction to Online Social Networks
More informationTCOM 562 Network Security Fundamentals
TCOM 562 Network Security Fundamentals George Mason University Fall 2009 Jerry Martin Fairfax Campus Tel: (703) 993-3810 Email: gmartin@gmu.edu Office Hours: by appointment only 1. Announcements The class
More informationPeer-to-Peer Networks Organization and Introduction 1st Week
Peer-to-Peer Networks Organization and Introduction 1st Week Department of Computer Science 1 Peer-to-Peer Networks Organization 2 2 Web & Dates Web page http://cone.informatik.uni-freiburg.de/lehre/vorlesung/
More informationCSCI 4541/6541: NETWORK SECURITY
1 CSCI 4541/6541: NETWORK SECURITY COURSE INFO CSci 4541/6541 Tuesdays 6:10pm 8:40pm Bell Hall 108 Office Hours: Tuesdays 2:30pm 4:30pm Dr. Nan Zhang Office: SEH 4590 Phone: (202) 994-5919 Email: nzhang10
More informationCSSW REGISTRATION GUIDE FALL 2015. Tips, hints, and quick hits to help you navigate the Fall registration process.
CSSW REGISTRATION GUIDE FALL 2015 Tips, hints, and quick hits to help you navigate the Fall registration process. 1 Table of Contents FALL 2015 REGISTRATION... 3 INTRODUCTION... 3 REGISTRATION RESOURCES...
More informationCSSW REGISTRATION GUIDE SPRING 2015. Tips, hints, and quick hits to help you navigate the Spring registration process.
CSSW REGISTRATION GUIDE SPRING 2015 Tips, hints, and quick hits to help you navigate the Spring registration process. 1 Table of Contents SPRING 2015 REGISTRATION...3 INTRODUCTION...3 REGISTRATION RESOURCES...3
More informationAcademic Calendar 2015-2016
Academic Calendar 2015-2016 Fall 2015 - Full/TCAT Session August 24, 2015 - December 10, 2015 Fall 2015-1st Session August 24, 2015 - October 9, 2015 Fall 2015-2nd Session October 14, 2015 - December 10,
More informationCryptography & Network Security. Introduction. Chester Rebeiro IIT Madras
Cryptography & Network Security Introduction Chester Rebeiro IIT Madras The Connected World 2 Information Storage 3 Increased Security Breaches 81% more in 2015 http://www.pwc.co.uk/assets/pdf/2015-isbs-executive-summary-02.pdf
More information1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk
Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction
More informationIST359 INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS
IST359 INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS 1. COURSE DETAILS COURSE (SECTION): IST359 (M005) TERM: Fall 2012 INSTRUCTOR: Yang Wang PHONE: 443-3744 (Office) OFFICE: Hinds 342 EMAIL: ywang@syr.edu
More information(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS
COURSE PROFILE Course Name Code Semester Term Theory+PS+Lab (hour/week) Local Credits ECTS Network Security IT527 Fall 3 + 0 + 0 3 8 Prerequisites None Course Language Course Type Course Lecturer Course
More informationSoftware Defined Networking Seminar
Software Defined ing Seminar Introduction - Summer Term 2014 Net Jeremias Blendin jblendin@ps.tu-darmstadt.de Prof. Dr. David Hausheer hausheer@ps.tu-darmstadt.de PS Peer-to-Peer Systems Engineering Prof
More informationAdvanced Networking (MSCSP) + Wireless Internet (II, IN)
Advanced Networking (MSCSP) + Wireless Internet (II, IN) Summer Semester 2012 Integrated Communication Systems Group Ilmenau University of Technology Outline Motivation Objectives Organizational Stuff
More informationFaculty of Business Management. Graduate Programme English Courses - Descriptions
Faculty of Business Management Graduate Programme English Courses - Descriptions Summer Semester 2016 Fachhochschule Kiel - University of Applied Sciences Faculty of Business Management Christina Abraham
More informationMS Information Security (MSIS)
MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in
More informationCourse Title: ITAP 3471: Web Server Management
Course Title: ITAP 3471: Web Server Management Semester Credit Hours: 4 (3,1) I. Course Overview The primary objective of this course is to give students a comprehensive overview of the tools and techniques
More informationCYBER SECURITY SPECIALIZATION. Dr. Andreas Peter Services, Cyber Security, and Safety Group
1 CYBER SECURITY SPECIALIZATION Dr. Andreas Peter Services, Cyber Security, and Safety Group 2 CYBER SECURITY Why Cyber Security? Our world increasingly becomes digital and connected Cyber Security is
More informationWireless Internet/Advanced Networking
Wireless Internet/Advanced Networking Master Ingenieurinformatik, Remote Engineering Track, 4 LP/credits Master Ingenieurinformatik, MIKS Track, 2 LP/credits Master Communications and Signal Processing,
More informationOnline Lecture Schedule Details from August 2015 to October 2015: Certificate Programs
Online Lecture Schedule Details from August 2015 to October 2015: Certificate Programs Sr. 1 2015-08-16 12:30:00 Sunday Business Communication and Etiquette Session 1 2 2015-08-22 19:00:00 Saturday Business
More informationINSPIRE: INcreasing Security and Protection through Infrastructure REsilience
INSPIRE: INcreasing Security and Protection through Infrastructure REsilience Salvatore D Antonio Consorzio Interuniversitario Nazionale per l Informatica saldanto@unina.it CRITIS 2008 - Frascati (Italy)
More informationMS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman bcn@isi.edu
MS in Computer Science with specialization in Computer Security Prof. Clifford Neuman bcn@isi.edu Computer Security Specialization Computer Security is a hot area of study with a critical need Needed by
More informationInformation, Network & Cyber Security
School COMSC Information, Network & Cyber Security Information security officers are faced with strategic decisions on a daily basis, and are required to make informed decisions on the security options
More informationNational Cyber League Certified Ethical Hacker (CEH) TM Syllabus
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
More informationNetwork Security Course Specifications2011-2012
Assiut University Faculty of Computers & Information Department of Information Technology Quality Assurance Unit Network Security Course Specifications2011-2012 Relevant program B.Sc. in Computers and
More informationNetwork Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7
1 of 7 Network Support This technical certificate program prepares the student for employment as PC Technician; Computer Support Specialist, and Network Support Technician systems and computer network
More informationPeer-to-Peer Networks
Peer-to-Peer Networks Chapter 1: Introduction Jussi Kangasharju Chapter Outline Course outline and practical matters Peer-to-peer (P2P) overview Definition of P2P What is P2P and how it is different from
More informationRandolph Community College INT 110 International Business Syllabus Spring 2008
Randolph Community College INT 110 International Business Syllabus Spring 2008 COURSE INFORMATION: Section 01, Tuesday & Thursday 11:40-1:00 PM, BEC 103 INSTRUCTOR INFORMATION: Dr. Ralphael L. Brown Program
More informationResearch Topics in the National Cyber Security Research Agenda
Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber
More informationCSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun
CSCI 454/554 Computer and Network Security Instructor: Dr. Kun Sun About Instructor Dr. Kun Sun, Assistant Professor of Computer Science http://www.cs.wm.edu/~ksun/ Phone: (757) 221-3457 Email: ksun@wm.edu
More informationTransatlantic Academic Programs in Mechanical Engineering: The TU Darmstadt and Virginia Tech bilateral senior year abroad and dual-ms degree programs
Transatlantic Academic Programs in Mechanical Engineering: The TU Darmstadt and Virginia Tech bilateral senior year abroad and dual-ms degree programs Prof. Jan Helge Bøhn, Ph.D. Mechanical Engineering
More informationKorea s experience of massive DDoS attacks from Botnet
Korea s experience of massive DDoS attacks from Botnet April 12, 2011 Heung Youl YOUM Ph.D. SoonChunHyang University, Korea President, KIISC, Korea Vice-chairman, ITU-T SG 17 1 Table of Contents Overview
More informationEuropean Network for Cyber Security
European Network for Cyber Security Cyber Security: a fundamental basis for Smart Grids Project Summary December 19, 2014 Introduction Smart grids are crucial to support the use of more sustainable energy
More informationCollaborative Research Center 2013-2017
MAKI - Multi-Mechanism Adaptation for the future Internet Collaborative Research Center 2013-2017 Antragsteller: Dr. rer. nat. Natalia Akchurina Prof. Alejandro Buchmann, Ph.D. Prof. Dr.-Ing. Wolfgang
More informationSecurity and Privacy in Cloud Computing
Security and Privacy in Cloud Computing Ragib Hasan Johns Hopkins University en.600.412 Spring 2010 Lecture 2 02/01/2010 Threats, vulnerabilities, and enemies Goal Learn the cloud computing threat model
More informationPenetration Testing. University of Sunderland CSEM02 Harry R Erwin, PhD
Penetration Testing University of Sunderland CSEM02 Harry R Erwin, PhD Resources Qinetiq Information Security Foundation Course (2002) Tittle, Stewart, and Chapple, 2004, CISSP: Certified Information Systems
More informationAUGUST 2014 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
AUGUST 2014 17 18 19 20 22 23 SEPTEMBER 2014 5 6 OCTOBER 2014 26 27 ACADEMIC CALENDAR 2014-2015 Fall Semester 2014 AUGUST 18 First Day for Faculty 22 Opening Convocation Payment Deadline, 5 pm 25 Classes
More informationThe Impact of Cybercrime on Business
The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted
More informationSeminar Algorithms of the Internet
HEINZ NIXDORF INSTITUT Seminar Algorithms of the Internet 2004-04-19 1 Motivation The Internet is the public global wide-area interconnection network for computers grows exponentially evolves The evolution
More informationNational Cyber League Certified Ethical Hacker (CEH) TM Syllabus
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
More informationCOURSE CATALOG. BS Networking and System Administration
COURSE CATALOG BS Networking and System Administration Program Overview Networking, the technology of interconnecting computing devices so information can flow between them, includes the design, deployment,
More informationTextbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.
CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and
More informationCIS 6930/4930 Computer and Network Security. Dr. Yao Liu
CIS 6930/4930 Computer and Network Security Dr. Yao Liu About Instructor Dr. Yao Liu, Office: ENB 336 Phone: 813-974-1079 Email: yliu@cse.usf.edu URL: http://www.cse.usf.edu/~yliu/ Office hour: TR 2:00pm
More informationICBA Summary of FFIEC Cybersecurity Assessment Tool
ICBA Summary of FFIEC Cybersecurity Assessment Tool July 2015 Contact: Jeremy Dalpiaz Assistant Vice President Cyber Security and Data Security Policy Jeremy.Dalpiaz@icba.org www.icba.org ICBA Summary
More informationInformation Security Course Specifications2011-2012
Assiut University Faculty of Computers & Information Information Systems Department Quality Assurance Unit Information Security Course Specifications2011-2012 Relevant program Department offers the program
More informationArchitecture and Implementation of Database Systems
Architecture and Implementation of Database Systems Winter 2010/11 Wilhelm-Schickard-Institut für Informatik Universität Tübingen 1.1 Chapter 1 Preliminaries and Architecture and Implementation of Database
More informationEECS 588: Computer and Network Security. Introduction January 14, 2014
EECS 588: Computer and Network Security Introduction January 14, 2014 Today s Class Welcome! Goals for the course Topics, what interests you? Introduction to security research Components of your grade
More informationInformation for EPE master students (beginners 2012/2013) Servicezentrum FB 18 Dr.-Ing. Andreas Haun building S3 06, room 36
Information for EPE master students (beginners 2012/2013) Servicezentrum FB 18 Dr.-Ing. Andreas Haun building S3 06, room 36 WS 2012/2013 Fachbereich 18 Servicezentrum Dr.-Ing. Andreas Haun 1 topics Students
More informationEnd-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich
End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless
More informationIntermediate Economics II: Macroeconomics Economics 512: ONLINE Spring 2015
Intermediate Economics II: Macroeconomics Economics 512: ONLINE Spring 2015 Purdue University Krannert School of Management Department of Economics Instructor Matthew Hoelle E-mail: Skype: Google Hangout:
More informationPSY 272 Introduction to Industrial/Organizational Psychology Spring 2009 Monday, Wednesday, Friday: 10:30 11:20 UNIV 317.
PSY 272 Introduction to Industrial/Organizational Psychology Spring 2009 Monday, Wednesday, Friday: 10:30 11:20 UNIV 317 Instructor: Rustin Meyer, M.S. Office: PSY 2192 Office Hours: Wednesdays 1:00-2:00
More informationComputer and Information Security
Computer Computer and Information Lecture 1 Introduction Computer Course Description Course Work Course Description This course builds on Operating Systems Network and System Administration 1 Lectures
More informationCYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION MATIJA STEVANOVIC PhD Student JENS MYRUP PEDERSEN Associate Professor Department of Electronic Systems Aalborg University,
More informationAdvanced Digital Forensics ITP 475 (4 Units)
Advanced Digital Forensics ITP 475 (4 Units) Description In 2007, the FBI reported that over 200 major companies reported a loss of over 60 million dollars due to computer crime. Computers are becoming
More informationP2P-Enabling for Critical Infrastructure Protection
AUTONOMICS 2009 P2P-Enabling for Critical Infrastructure Protection Abdelmajid Khelil, Hamza Ghani, Daniel Germanus and Neeraj Suri Technische Universität Darmstadt, Germany Cyprus, Sept. 10, 2009 Dependable
More informationPeer-to-Peer Networks. Chapter 2: Initial (real world) systems Thorsten Strufe
Chapter 2: Initial (real world) systems Thorsten Strufe 1 Chapter Outline Overview of (previously) deployed P2P systems in 3 areas P2P file sharing and content distribution: Napster, Gnutella, KaZaA, BitTorrent
More informationSeminar: Security Metrics in Cloud Computing (20-00-0577-se)
Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr. 10 64289 Darmstadt Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Topics Descriptions
More informationWelcome to Distributed Systems Engineering
Welcome to Distributed Systems Engineering Help during the semester Ms Irina Karadschow Secretary of Prof. Fetzer (chairman of the examination board) room APB 3107 se@mailbox.tu-dresden.de Phone: 0351
More informationPeer-to-Peer Systems. Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf
Peer-to-Peer Systems Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf Peer-to-Peer Systems Organizational Information Organisational matters Lecturer Jun.-Prof.
More informationUVic Department of Electrical and Computer Engineering
UVic Department of Electrical and Computer Engineering COURSE OUTLINE Elec 567 Advanced Network Security and Forensics Spring 2014 Instructor: Office Hours: Dr. Issa Traore Days: Monday, Thursday Phone:
More informationCryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1 Acknowledgments Lecture slides are based on the slides created by Lawrie Brown Chapter 1 Introduction The art of war teaches us to rely not on the likelihood
More informationOrientation Program for Students of Our MSc. Programs Business Administration, Economics and MEMS. Information Systems. Prof. Dr.
Orientation Program for Students of Our MSc. Programs Business Administration, Economics and MEMS Information Systems Prof. Dr. Stefan Lessmann Agenda What it is about Information Systems Who we are What
More informationCNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan
CNT5412/CNT4406 Network Security Course Introduction Zhenhai Duan 1 Instructor Professor Zhenhai Duan (duan@cs.fsu.edu) Office: 162 LOV Office hours: 1:00PM to 2:00PM, T/Th Or by appointment Email: duan@cs.fsu.edu
More informationAfter completing SI- 539, students will have a working personal portfolio website in production.
SI 539, Fall 2014 Complex Web Design Lecture: Friday: 1:00pm 3:00pm *Must leave by 3:15 Discussion Sections Varies Office Hours*: Tues: 11:35 12:35 Wed mornings *Please check my Google Calendar for updates
More informationHow To Become A Computer Scientist
EIT Education & the EIT ICTLabs Master School Prof. Fabrizio Granelli Local Master School Coordinator, UNITN Education, EIT & UNITN Maurizio Marchese Fabrizio Granelli Director of Education Local MS coordinator
More informationExternal Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
More informationSoran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification
1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer
More informationAcademic Calendar for Faculty
Summer 2013 Term June 3, 2013 (Monday) June 3-4, 2013 (Monday Tuesday) June 5, 2013 (Wednesday) June 5-6, 2013 (Wednesday Thursday) June 6, 2013 (Thursday) July 3, 2013 (Wednesday) July 4, 2013 (Thursday)
More informationNetwork Security Welcome and introduction. T-110.5241 Network security Nov-Dec 2012 Tuomas Aura Aalto University
Network Security Welcome and introduction T-110.5241 Network security Nov-Dec 2012 Tuomas Aura Aalto University Course learning objectives Know common communications systems, classic security protocols
More informationMS in Medical Physiology Required Course Descriptions Total of 18 Credit Hours (30 Credit Hours Required for the Degree)
MS in Medical Physiology Required Course Descriptions Total of 18 Credit Hours (30 Credit Hours Required for the Degree) Medical Physiology I and II (PHOL 481 and 482, 6 credit hours each, a total of 12
More informationMajor prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.
Elective course in Computer Science University of Macau Faculty of Science and Technology Department of Computer and Information Science SFTW498 Information Security Syllabus 2nd Semester 2011/2012 Part
More informationVIA COLLAGE Deployment Guide
VIA COLLAGE Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...
More informationAshok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.
Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech
More informationHUMAN RESOURCE MANAGEMENT SYLLABUS
HUMAN RESOURCE MANAGEMENT SYLLABUS HRM 305 Section 002 6:00-8:45 p.m. Tuesday Fall 2015 Micron Business and Economics Building Room 1209 Gundars (Gundy) Kaupins Description Strategic Management Workforce
More informationHow To Write A Cybersecurity Framework
NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order
More informationTechnology Courses. The following chart outlines the required courses in each of these three categories for the Ph.D. curriculum:
ITP PH.D. PROGRAM CONTENTS Overview... 2 Course Requirements... 3 Core Course Requirement... 4 Technology Course Requirement... 5 Business/Economic/Policy Course Requirement... 6 Preliminary Exam... 7
More informationCS 5480 Computer Networks
CS 5480 Computer Networks Professor Sneha Kumar Kasera School of Computing 1 My Background PhD - Computer Science dept, UMass Amherst (1999) Bell Labs research (1999 2003) research interests computer networks
More informationThe FBI and the Internet
The FBI and the Internet Special Agent Robert Flaim Federal Bureau of Investigation Presentation Goals To give you a better understanding of: The FBI Cyber Division, its priorities, and its mission The
More informationCryptography and Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Shinu Mathew John http://shinu.info/ Chapter 1 Introduction http://shinu.info/ 2 Background Information Security requirements
More informationCyber-Physical System Security of the Power Grid
Course on: Cyber-Physical System Security of the Power Grid April 9-11, 2013 at KTH Royal Institute of Technology, Stockholm, Sweden Background Cyber Security is essential to today s power grid operation
More informationProgramme Specification (Postgraduate)
Programme Specification (Postgraduate) 1. Programme Title(s): MSc/PGDip*/PGCert* Data Analysis for Business Intelligence *Exit awards only 2. Awarding body or institution: University of Leicester 3. a)
More informationComputer and Network Security
Computer and Network Security Dr. Arjan Durresi Louisiana State University Baton Rouge, LA 70810 Durresi@csc.LSU.Edu These slides are available at: http://www.csc.lsu.edu/~durresi/csc4601_07/ Louisiana
More informationNetwork Security in Building Networks
Network Security in Building Networks Prof. Dr. (TU NN) Norbert Pohlmann Institute for Internet Security - if(is) Westphalian University of Applied Sciences Gelsenkirchen, Germany www.if-is.net Content
More informationIntroduction to Organizational Behavior (Business 260)
Introduction to Organizational Behavior (Business 260) Faculty of Business Administration University of Regina Professor Dr. Sandeep Mishra Faculty of Business Administration E-mail: mishrs@gmail.com Office
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 1 September 2, 2015 CPSC 467, Lecture 1 1/13 Protecting Information Information security Security principles Crypto as a security
More informationWelcome in the Master programme
Welcome in the Master programme Prof. Axel Görlitz, HHU Düsseldorf 19.10.2015 Master Programme in Physics Physics Focus (Schwerpunkt) Plasma Physics, Quantum Optics and Quantum Information, Solid State
More informationBIO 226: APPLIED LONGITUDINAL ANALYSIS COURSE SYLLABUS. Spring 2015
BIO 226: APPLIED LONGITUDINAL ANALYSIS COURSE SYLLABUS Spring 2015 Instructor: Teaching Assistants: Dr. Brent Coull HSPH Building II, Room 413 Phone: (617) 432-2376 E-mail: bcoull@hsph.harvard.edu Office
More informationSOUTHWESTERN MICHIGAN COLLEGE SCHOOL: Arts and Sciences Niles, Michigan COURSE SYLLABUS Fall Semester 2014
SOUTHWESTERN MICHIGAN COLLEGE SCHOOL: Arts and Sciences Niles, Michigan COURSE SYLLABUS Fall Semester 2014 COURSE TITLE: Spanish for the Workplace COURSE # Spanish 170 SECTION# 2859 CREDITS/CONTACTS: FINAL
More informationECE PhD Program Orientation
1 / 10 ECE PhD Program Orientation Prof. Kathleen E. Wage Electrical and Computer Engineering Department George Mason University August 27, 2015 2 / 10 Outline 1 Introduction 2 Program Requirements 3 Things
More informationSoftware Systems Engineering
Software Systems Engineering Introductory Meeting WS 2011/2012 Prof. Gerhard Lakemeyer, Ph.D. Dipl.-Inform. Stefan Schiffer, Patrick Selders RWTH Aachen University Knowledge-Based Systems Group (Lehr-
More informationStrategic Information Management
Strategic Information Management Course Profile Type Lecture + Tutorial Lecturer Prof. Dr. Nils Urbach Hours per Week 2 + 1 SWS ECTS 6 Language English Start date April 08 th, 2014 Course Description The
More informationBusiness Information Technology Bachelor of Science in Business Information Technology
Bachelor of Science in Career profile that is relevant and knowledge that is up to date are key drivers of business success. Efficient information and communication systems support innovative business
More informationWeb Hosting 101. with Patrick McNeil
Web Hosting 101 with Patrick McNeil Alphabet soup Why learn the technical side? To help your clients solve problems To help you work better with your tech team To better understand how the web works To
More informationChapter 11 Cloud Application Development
Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How
More informationthe Council of Councils initiative
Author: Andrea Renda, Senior Research Fellow, Centre for European Policy Studies May 3, 2013 Editor's note: This brief is a feature of the Council of Councils initiative, gathering opinions from global
More informationAdvanced Mobile Communication Networks
Advanced Mobile Communication Networks (replaces previous courses Advanced Networking for MSCSP, Mobile Comm. Networks for RCSE and Wireless Internet for II & IN) Course Description and Introduction Integrated
More informationSummer School on Fuzzy Cognitive Maps Methods, Learning Algorithms and Software Tool for Modeling and Decision Making. 4-8 July 2015 (5 days)
Summer School on Fuzzy Cognitive Maps Methods, Learning Algorithms and Software Tool for Modeling and Decision Making 4-8 July 2015 (5 days) Organized by Prof. Elpiniki Papageorgiou Technological Educational
More information