Computer and Network Security



Similar documents
Computer and Network Security

CSE 571S: Network Security CSE571S

CSCI 4541/6541: NETWORK SECURITY

CSE 571S: Network Security CSE571S

CSC 474 Information Systems Security

CSE 571S: Network Security CSE571S. Overview. Cyber Security Facts. Cyber Security Opportunities

CSE 571S: Network Security CSE571S

CS 450/650 Fundamentals of Integrated Computer Security

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

CSE 473s Introduction to Computer Networks

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

CS 5490/6490: Network Security Fall 2015

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

Candidates should attempt FOUR questions. All questions carry 25 marks.

Professor s Contact Information Office Phone Other Phone n/a Office Location ECS South Address

University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

Network Security. Text. Administrative. My Information. Course Focus. Evaluation CEN

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

CSE 5392 Sensor Network Security

Network Security. Introduction. Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015

Dr. Arjan Durresi. Baton Rouge, LA These slides are available at:

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Boston University MET CS 690. Network Security

Cryptography and network security CNET4523

CompTIA Network+ (Exam N10-005)

Computer Networks and the Internet

CSCI 4250/6250 Fall 2015 Computer and Network Security. Instructor: Prof. Roberto Perdisci

CCNA Security 2.0 Scope and Sequence

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

EE5723/EE4723. Computer & Network Security. Course Coverage. Prerequisites. Course Logistics. Truly a Network Security course

SSVP SIP School VoIP Professional Certification

Network Security Welcome and introduction. T Network security Nov-Dec 2012 Tuomas Aura Aalto University

Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA DDoS and IP Traceback. Overview

Tele3119 Trusted Networks Course Outline 2013

CS335 Sample Questions for Exam #2

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028

Information and Network Security Certificate Program

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

Raritan Valley Community College Academic Course Outline. CISY Advanced Computer Networking

How To Pass The Information And Network Security Certificate

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

CSE 123: Computer Networks Fall Quarter, 2014 MIDTERM EXAM

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Network Security Welcome and introduction. T Network security Nov-Dec 2013 Tuomas Aura Aalto University

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

CSE 3461 / 5461: Computer Networking & Internet Technologies

WAN Data Link Protocols

NETWORK SECURITY (W/LAB) Course Syllabus

Securing IP Networks with Implementation of IPv6

IT4405 Computer Networks (Compulsory)

Overview. SSL Cryptography Overview CHAPTER 1

CSE/EE 461 Lecture 23

IT Data Communication and Networks (Optional)

Network Security Course Specifications

CDA Introduction to Computer Networks

Packet Level Authentication Overview

CS 464/564 Networked Systems Security SYLLABUS

Netzwerksicherheit [NetSec] Systemsicherheit [SysSec]

Network Security Administrator

CCNA Security v1.0 Scope and Sequence

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Cryptography and Network Security

F21CN: Computer Network Security: Overview

Communication Networks MAP-TELE 2012/13

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Internet Packets. Forwarding Datagrams

CMPSCI 453 Computer Networking. Professor V. Arun Department of Computer Science University of Massachusetts Amherst

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

Lecture 1: Course Introduction" CSE 222A: Computer Communication Networks Alex C. Snoeren

Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network.

TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX

Module: Introduction. Professor Trent Jaeger Fall CSE543 - Introduction to Computer and Network Security

Cipher Techniques on Networks. Amit Konar Math and CS, UMSL

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Random Access Protocols

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

GATE CS Topic wise Questions Computer Network

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

A TOP-RATED UNIVERSITY FOR EMPLOYABILITY. MSc Information and Network Security. T:

CSCI-E46: Applied Network Security. Class 1: Introduction Cryptography Primer 1/26/16 CSCI-E46: APPLIED NETWORK SECURITY, SPRING

Data Encryption and Network Security

Network Security Informik Version

Curran, K. Tutorials. Independent study (including assessment) N/A

CS 5480 Computer Networks

Wireless Mobile Internet Security. 2nd Edition

Weighted Total Mark. Weighted Exam Mark

ICT Infrastructure & Network Management

Cisco Discovery 1: Networking for Home and Small Business (ITCC 1310)

EE3414 Multimedia Communication Systems Part I

NETWORK DESIGN BY USING OPNET IT GURU ACADEMIC EDITION SOFTWARE

Information Security Course Specifications

e-code Academy Information Security Diploma Training Discerption

Bachelor of Information Technology (Network Security)

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

Transcription:

Computer and Network Security Dr. Arjan Durresi Louisiana State University Baton Rouge, LA 70810 Durresi@csc.LSU.Edu These slides are available at: http://www.csc.lsu.edu/~durresi/csc4601_07/ Louisiana State University 1- Introduction - 1 Overview How What When Why Louisiana State University 1- Introduction - 2

Overview How am I going to grade you? What are we going to cover? When are you going to do it? Why you should take this course? Louisiana State University 1- Introduction - 3 Grading Learning-centered course: The first priority: Maximize learning Your grade will depend on how much you have learned Final Exam 40% Class participation 10% Questions and discussions in class give you points and improve the quality of teaching Homework 25% Project or lab 25% Possibility of one extra-assignment to improve the final grade up to one point Louisiana State University 1- Introduction - 4

Frequently Asked Questions Yes, I do use curve. Your grade depends upon the performance of the rest of the class. All homeworks are due at the beginning of the next class. All late submissions must be preapproved. All quizzes are open-book and extremely time limited. Exams consist of numerical as well as multiple-choice (true-false) questions. There is negative grading on incorrect multiple-choice questions. Everyone are graded the same way. Louisiana State University 1- Introduction - 5 What Is This Course About? Understanding of basic issues, concepts, principles, and mechanisms in information security. Security goals and threats to networking infrastructure and applications. Introduction to cryptography. Network security applications. System security applications. Exposure to commercial as well as research security technologies. Louisiana State University 1- Introduction - 6

Text Book Network security: PRIVATE communication in a PUBLIC world by Kaufman, Perlman, and Speciner. Second Edition 2002, ISBN 0-13-046019-2 This book is very comprehensive. I will follow it as much as possible. Louisiana State University 1- Introduction - 7 Supplementary Text Supplementary Text Network security essentials: Applications and Standards by William Stallings. Third Edition 2003 This book contains more recent technologies and will be used for the second half of the course. Internet Security: Cryptographic Principles, Algorithms and Protocols by Man Young Rhee Wireless Security Essentials: Defending Mobile Systems from Data Piracy by Russell Dean Vines Louisiana State University 1- Introduction - 8

Background: Course Outline Review of networking technologies Network security threats and counter measures Cryptography: Secret key cryptography Hashes and message digests Public key cryptography Information hiding Louisiana State University 1- Introduction - 9 Course Outline (Cont) Network and system security applications: Authentication and security handshakes pitfalls IP security Web and E-commerce Attacks to routing infrastructures and counter measures DDoS and traceback Virus/worm detection, firewalls, intrusion detection. Hacking and forensics Writing secure code Louisiana State University 1- Introduction - 10

Prerequisites Networking, operating systems, discrete mathematics, and programming (C or C++, Java). The right motivations. Louisiana State University 1- Introduction - 11 Office Hours Tuesday, Thursday 3-4 p.m. Telephone: (225)-578-3902 Email: durresi@csc.lsu.edu Course web page: http://www.csc.lsu.edu/~durresi/put/security-06 TA: Office:, Tel.: Email: Louisiana State University 1- Introduction - 12

Summary There will be a lot of self-reading Goal: To prepare you for a career in network security Get ready to work hard Louisiana State University 1- Introduction - 13 Quiz 0: Prerequisites True or False? T F Datalink refers to the 2nd layer in the ISO/OSI reference model Category 5 unshielded twisted pair cable is better than category 3 cable. Finding path from one node to another in a large network is a transport layer function. It is impossible to send 3000 bits/second through a wire which has a bandwidth of 1000 Hz. Bit stuffing is used so that characters used for framing do not occur in the data part of the frame. For long delay paths, on-off flow control is better than window flow control. Ethernet uses a CSMA/CD access method. 10Base2 runs at 2 Mbps. The packets sent in a connection-oriented network are called datagrams. Spanning tree algorithm is used to find a loop free path in a network. Marks = Correct Answers - Incorrect Answers = Louisiana State University 1- Introduction - 14

Thank You! Louisiana State University 1- Introduction - 15 Quiz 0: Solution True or False? T F Datalink refers to the 2nd layer in the ISO/OSI reference model Category 5 unshielded twisted pair cable is better than category 3 cable. Finding path from one node to another in a large network is a transport layer function. It is impossible to send 3000 bits/second through a wire which has a bandwidth of 1000 Hz. Bit stuffing is used so that characters used for framing do not occur in the data part of the frame. For long delay paths, on-off flow control is better than window flow control. Ethernet uses a CSMA/CD access method. 10Base2 runs at 2 Mbps. The packets sent in a connection-oriented network are called datagrams. Spanning tree algorithm is used to find a loop free path in a network. Louisiana State University 1- Introduction - 16