Lecture 1 - Overview

Similar documents
Module: Introduction. Professor Patrick McDaniel Spring CMPSC443 - Introduction to Computer and Network Security

CSE598k / CSE545 Advanced Network Security

CSC574 - Computer and Network Security Module: Introduction

Advanced System Security

Module: Introduction. Professor Trent Jaeger Fall CSE543 - Introduction to Computer and Network Security

CIS433/533 - Computer and Network Security Introduction

Advanced Systems Security

CSC 474 Information Systems Security

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

CS 450/650 Fundamentals of Integrated Computer Security

CSCI 4250/6250 Fall 2015 Computer and Network Security. Instructor: Prof. Roberto Perdisci

Spring 2013 CS 6930 Advanced Topics in Web Security and Privacy - 3 Credit Hours Syllabus and Course Policies

Syllabus: IST451. Division of Business and Engineering. Penn State Altoona

Network Security Course Specifications

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

TCOM 562 Network Security Fundamentals

Statistics and Research Methods in Psychology ROWAN UNIVERSITY. Fall MW 1:45-4:30 MW 4:45-7:15 Robinson 102 Robinson 102

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

CS 458 / 658 Computer Security and Privacy. Course mechanics. Course website. Module 1 Introduction to Computer Security and Privacy.

Common Syllabus Revised

Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

PA5003, Spring 2008 Introduction to Financial Analysis and Management

CSCI 4541/6541: NETWORK SECURITY

CNT4406/5412 Network Security Introduction

Outline Overview. Course Description

CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; /6834)

OPERATIONS, BUSINESS ANALYTICS & INFORMATION SYSTEMS

Make only as much as the customer will buy. Don't make things the customer won t buy - Taiichi Ohno.

Information Security Course Specifications

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

MAT Elements of Modern Mathematics Syllabus for Spring 2011 Section 100, TTh 9:30-10:50 AM; Section 200, TTh 8:00-9:20 AM

Teaching large lecture classes online: Reflections on engaging 200 students on Blackboard and Facebook

Research Methods in Advertising and Public Relations COMM 420 Spring Earth & Eng. Sci. W/F 12:20 PM to 2:15 PM

ABET Criterion 3: Outcomes Met By Course Content

COURSE SYLLABUS. Instructor Background: M.S. Computer Information Systems, Nova Southeastern University

Course: ITM 125.C2 Course Title: Essentials of Business Information Systems Spring C2 2012

CRJU Introduction to Criminal Justice (CRN 20933) Course Syllabus Spring 2015

CS 1340 Sec. A Time: 8:00AM, Location: Nevins Instructor: Dr. R. Paul Mihail, 2119 Nevins Hall, rpmihail@valdosta.

PSC 5170 Problems in Public Administration: Grants and Contracts Online University of Oklahoma Department of Political Science Summer 2014

Network Security. Text. Administrative. My Information. Course Focus. Evaluation CEN

PSYCH 460 CLINICAL CHILD PSYCHOLOGY SPRING 2013

Management 525 Marketing Analytics 1. Course Description and Objectives

CS 464/564 Networked Systems Security SYLLABUS

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

Canisius College Richard J. Wehle School of Business Department of Marketing & Information Systems Spring 2015

CIS/MKTG4500 Customer Relationship Management

COURSE SYLLABUS INTRODUCTION TO INTERNATIONAL BUSINESS, MGT ONLINE FALL 2013

Computer Science 401 Introduction to Computers Spring 2012 Syllabus

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

THE UNIVERSITY OF TEXAS AT AUSTIN Department of Aerospace Engineering and Engineering Mechanics. EM 311M - DYNAMICS Spring 2012 SYLLABUS

Strategic Use of Information Technology (CIS ) Summer /

IVY TECH COMMUNITY COLLEGE REGION 03 SYLLABUS MATH 136: COLLEGE ALGEBRA SUMMER Instructor: Jack Caster Telephone: ext.

John Moreno Senior Adjunct Professor Ageno School of Business GOLDEN GATE UNIVERSITY

Tuskegee University Department of Computer Science Course No: CSCI 390 (Computer Forensics) Fall MWF 1:00-2:300, BRIM 301

Categorical Data Analysis

Guidelines for Graduate Teaching Assistants. College of Agriculture and Life Sciences

(CSIS 2500 All Section ) Management Information Systems (3.0 Credits)

Department of Management College of Business and Economics California State University Northridge. Course Syllabus, Fall 2010

Belk College of Business Administration, University of North Carolina at Charlotte. INFO : MANAGEMENT INFORMATION SYSTEMS Spring 2012

This four (4) credit hour. Students will explore tools and techniques used penetrate, exploit and infiltrate data from computers and networks.

IST359 INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS

EE 210 Introduction to Electrical Engineering Fall 2009 COURSE SYLLABUS. Massimiliano Laddomada, PhD Assistant Professor

SFWR ENG 4C03 - Computer Networks & Computer Security

Professor s Contact Information Office Phone Other Phone n/a Office Location ECS South Address

GB 401 Business Ethics COURSE SYLLABUS: Fall nd 8 Week Syllabus Mr. Robert Wells COURSE OVERVIEW

PSYC*3250, Course Outline: Fall 2015

Course Outcomes Guide. Course/Program Title: PLS 101 Introduction to Paralegal Studies 2014

Mgt 2020Y - Marketing Fall 2013 Wednesday: 6:00 8:50pm, S4037. Wednesdays 9:00-10:00pm or by appointment.

CSci 4211: Data Communications and Computer Networks. Time: Tuesday and Thursday 8:15 to 9:30 am Location: Phyics 170 Spring 2015, 3 Credits

EPI 820/CPH504: Epidemiology in Public Health (Online)

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline

San José State University CS160, Software Engineering, Sections 1, 2, and 4, Fall, 2015

ECE475 Control System Analysis ABET Syllabus. ECE 326. Prerequisite topics: knowledge of Laplace transforms and Bode plots.

INTRODUCTION TO INFORMATION TECHNOLOGY

Network Security ITP 457 (4 Units)

Investment Management Course

General Psychology. Course Syllabus

TECH 4101 HUMAN RESOURCES FOR ADMINISTRATIVE AND TECHNOLOGY MANAGERS (R1 section) Course Syllabus Fall 2015

ISM and 05D, Online Class Business Processes and Information Technology SYLLABUS Fall 2015

MCS5813 Cryptography Spring and select CRN 3850

MKTG 330 FLORENCE: MARKET RESEARCH Syllabus Spring 2011 (Tentative)

Learn how to store and analyze Big Data Learn about the cloud and its services for Big Data

CST 244 Computer Forensics and Investigation Spring, 2010

Summer 2015 Course Title & credit hours: Information Security, CET2830C (hybrid); 3 credit hours

SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE. CODE NO. : MTH131-4 SEMESTER: Two

Syllabus : CHM 234, General Organic Chemistry II : Spring 2015 Online/Hybrid Class SLN 15207

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

Weighted Total Mark. Weighted Exam Mark

Applied Network Security Course Syllabus Spring 2015

CMST 2010 Section 4 Spring 2014 Interpersonal Communication ONLINE ONLY Instructor Office Hours:

Course title and number: CISK 450 Management Information Systems Term: Fall 2014 Meeting times: MW 4:00 pm 5:15 pm Meeting location: WH 308

Syllabus. No: CIS 200. Title: Fundamentals of Network Security. Credits: 4. Coordinator: Dr. B. Dike-Anyiam, Computer Science & Networking Lecturer

San José State University Department of Electrical Engineering EE 112, Linear Systems, Spring 2010

CS 340 Cyber Security Weisberg Division of Computer Science College of Information Technology & Engineering Marshall University

GB 401 Syllabus Fall 2015 Ms. Robin

COURSE OUTLINE. MBA 560 Small Business Management Fall 2015

Transcription:

Lecture 1 - Overview CMPSC 443 - Spring 2012 Introduction to Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/

From small vulnerabilities come... 2

People are part of the problem... 3

And the rest... Hardware E.g., Ford Pinto E.g., ext2 Physical Access E.g., ATMs Users E.g., Phishing E.g., Social engineering E.g., Misplaced trust 4

Where is all of this going? We are at a unique point in history. We have little security. We have little usable theory on what is secure. We have little knowledge of how to get it. Workable tools are rudimentary, but sometimes effective. However, we have a huge amount of risk riding on computer and network security. Financial Medical Personal... Every computing system we use is insecure... 5

This course We are going to explore the tools that the address these frequent and expected vulnerabilities. Why are we doing so poorly in computing systems at protecting our users and data from inadvertent or intentional harm? The answer: stay tuned! 6

This course This course is an applied applied systems course covering introductory topics in computer and network security. We will investigate the tools and problems of contemporary security: This course provides an introduction to the theory and application of security in computer and network environments. Students will develop the skills necessary to formulate and address the security needs of enterprise and personal environments. The course will begin by describing the goals and mechanisms of security as motivated by recent incidents in the area. Topics will cover cryptography, authentication, secure programming, security in operating systems, network security, secure storage, access control, denial-of-service, and file systems, and conclude with emerging trends in secure systems design. 7

You need a basic understanding of IP Networks Operating Systems Discrete Mathematics Basics of systems theory and implementation E.g., File systems, distributed systems, networking, operating systems,... Programming in C/Linux 8

Why are we here? -- Goals Our goal: to provide you with the tools to apply current and future approaches to computer security. Formulating a security strategy Basic technologies Engineering trade-offs This is going to be a hard course. The key to success is sustained effort. Failure to keep up with readings and assignments will likely result in poor grades, and little understanding of the course material. Pay-off: security competence is a necessary, rare, valuable skill 9

Course Challenges Security is relative Good understanding of other computer technologies are necessary Security is terminology Each application of security has different terms for concepts Security is defensive Consider the function available to the attacker not the user 10

Course Materials Website - We are maintaining the course website at http://www.cse.psu.edu/~tjaeger/cse443-s12 Course assignments, slides, and other artifacts will be made available on the course website. Course textbooks Kaufman, C., Perlman, R. and Speciner, M., Network Security (Private Communication in a Public World), 2nd edition, Prentice Hall 2002. Selected readings from: Jaeger, T., Operating System Security, Morgan & Claypool, 2008. Available online. Go to http://www.morganclaypool.com/toc/spt/1/1 Select Operating System Security (works within Penn State network) 11

Course Calendar The course calendar as all the relevant readings, assignments and test dates Please check the website frequently for announcements and changes to the schedule. Students are responsible for any change on the schedule (we will try to make announcements in class). 12

Grades Grading policy 20% Mid-term exam (TBD - 8th week) 35% Course Projects (4-5) 15% Quizzes and Class Participation 30% Final exam (end of semester) Lateness policy - Assignments are assessed a 10% per-day late penalty, up to a maximum of 4 days. Unless the problem is apocalyptic, don't give us excuses. Students with legitimate reasons who contact the professor before the deadline may apply for an extension. 13

Ethics Statement This course considers topics involving personal and public privacy and security. As part of this investigation we will cover technologies whose abuse may infringe on the rights of others. As an instructor, I rely on the ethical use of these technologies. Unethical use may include circumvention of existing security or privacy measurements for any purpose, or the dissemination, promotion, or exploitation of vulnerabilities of these services. Exceptions to these guidelines may occur in the process of reporting vulnerabilities through public and authoritative channels. Any activity outside the letter or spirit of these guidelines will be reported to the proper authorities and may result in dismissal from the class. When in doubt, please contact the instructor for advice. Do not undertake any action which could be perceived as technology misuse under any circumstances unless you have received explicit permission from Professor Jaeger. 14

And the rest of this course Outline 1. Overview 2. Basics 3. Cryptography/Authentication 4. Software Security 5. Systems Security 6. Network Security 7. Misc Topics 15