Network Security SWISS GERMAN UNIVERSITY Administration Charles Lim Charles.lims@gmail.com
Agenda Administrative Course Information Lecturing Information Getting to know each other Questions & Answers 2
About me Charles Lim, Msc., ECSA, ECSP, ECIH, CEH, CEI Researcher Information Security Research Group and Lecturer, Swiss German University Head of Information Technology Laboratories charles_lims@gmail.com and charles.lim@sgu.ac.id Organization Involvement Indonesia Honeynet Project Chapter Lead (http://www.honeynet.or.id) Technical Member Komite Akreditasi Nasional (KAN) of BSN Technical Member to KEMKOMINFO for regulating Web Applications, Public Key Infrastructure Member of Academy CSIRT (Computer Security Incident Response Team) http://www.acad-csirt.or.id Independent Researcher of IDSIRTII (http://www.idsirtii.or.id) S W I S S G E R M A N U N I V E R S I T Y
Objective Course Information To introduce the course covers theory and practice of network security, focusing in particular on the security aspects of the web and Internet. To learn cryptographic tools used to provide security including symmetric encryption, public key encryption, key exchange, and digital signature To learn how to secure network application using protocols and applications such as Kerberos, SSL, IPSEC, TLS, PGP, S/MIME, SET, and others. System security issues, such as viruses, intrusion, firewalls, and others will also be covered. Prerequisites Computer Networks Basic Mathematics Eagerness to learn 4
Learning Outcome Students should master the following topics: Understand security threats to computer systems and computer networks and how to identify countermeasures to the threats in accordance to security goals Understand and strategize a plan to the right security tools to reduce risks of the threats Understand that decision and action taken to countermeasures the threats also need to comply to the regulations and professional ethics 5
Lectures Week #1 Lectures & Laboratory Monday 9:00 10:30 & 11:00 12:30 Wednesday 13:30 15:00 & 15:30 17:00 Friday 9:00 10:30 & 11:00 12:30 Week #2 Wednesday 9:00 10:30 & 11:00 12:30 Room Resources http://people.sgu.ac.id/charleslim/ostfalia 6
Wk. Ses. Lecture Schedules Topics 1 1 Overview, Network Threats & Attacks 1 2 Cryptography 1 3 Cryptography 1 4 Authentication, Kerberos 7
Wk. Ses. Lecture Schedules Topics 1 5 IP Security, Email Security 1 6 Web Security 2 7 Intruders, Malware 2 8 Firewalls 8
Lecture contents & styles Lecture Notes Presented at each session Stored in pdf format Discussions Misc. Video Real world examples URL http://people.sgu.ac.id/charleslim/ostfalia/ 9
Student Participations Attendance is an absolute for this course, it counts toward your grade Each student is responsible for sharing questions and insights with other class members. 10
Review Questions A handout of review questions will be distributed at the end of class or provided online Use these questions for review the materials we discussed in class These review questions will come in handy to prepare for Final Exam 11
More Practical Resources SANS Reading Room http://www.sans.org Seminar Purdue University CERIAS video seminars on various security issues http://cerias.purdue.edu/news_and_ev ents/events/security_seminar/ 12
Schedule Final Exam Friday 9:00 10:30 Comprehensive (covering all lectures) Review questions after every lecture 13
Text Book & References Computer & Network Security Theory and Practice, Jie Wang, Springer Network Security Essentials Applications & Standards, 4 th edition, William Stallings, Pearson References Cryptography & Network Security, 4 th edition, William Stallings, Pearson Security in Computing, 4 th edition, Charles Pfleeger, Prentice Hall 14
Lecturer Information Charles Lim, Msc., ECSA, ECSP, ECIH, CEH, CEI Email charles.lims@gmail.com <preferred> Questions/Communication During Office Hours Via Email or Group Web site Posting Resources http://www.people.sgu.ac.id/charleslim/ostfalia 15
Grading FINAL EXAM 100% Use your review questions as guide to your final exam 16
Acknowledgement Many of the lecture notes are adapted from those of the textbook authors: Jia Wang & William Stallings 17