CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan



Similar documents
CSCI 4541/6541: NETWORK SECURITY

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

CSC 474 Information Systems Security

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Cryptography and Network Security

CSE 5392 Sensor Network Security

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

Cryptography and Network Security Chapter 1

Cryptography and network security CNET4523

Table: Security Services (X.800)

COSC 472 Network Security

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Chap. 1: Introduction

CS 450/650 Fundamentals of Integrated Computer Security

Course Outline Computing Science Department Faculty of Science. COMP Credits Computer Network Security (3,1,0) Fall 2015

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

Boston University MET CS 690. Network Security

EE5723/EE4723. Computer & Network Security. Course Coverage. Prerequisites. Course Logistics. Truly a Network Security course

Weighted Total Mark. Weighted Exam Mark

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

Introduction to Security

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Cryptography and Network Security: Overview

CS 464/564 Networked Systems Security SYLLABUS

Notes on Network Security - Introduction

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.

IY2760/CS3760: Part 6. IY2760: Part 6

CS 203 / NetSys 240. Network Security

Computer and Network Security

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

Computer and Network Security

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Information System Security

TCOM 562 Network Security Fundamentals

CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; /6834)

CNT4406/5412 Network Security Introduction

Content Teaching Academy at James Madison University

CPSC 467: Cryptography and Computer Security

Lecture 1 - Overview

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

Information Security Course Specifications

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

CIS 250 NETWORK SECURITY JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS

CIS433/533 - Computer and Network Security Introduction

Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication

information security and its Describe what drives the need for information security.

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

CSCI 4250/6250 Fall 2015 Computer and Network Security. Instructor: Prof. Roberto Perdisci

Module: Introduction. Professor Trent Jaeger Fall CSE543 - Introduction to Computer and Network Security

Computer Security (EDA263 / DIT 641)

Computer and Network Security

Welcome to Information Systems Security (503009)

Bellevue University Cybersecurity Programs & Courses

EECS 588: Computer and Network Security. Introduction

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline

CIS 253. Network Security

Computer and Network Security PG Unit Outline School of Information Sciences and Engineering

CSC574 - Computer and Network Security Module: Introduction

Network Security. Network Security Hierarchy. CISCO Security Curriculum

Network Security SWISS GERMAN UNIVERSITY. Administration Charles Lim

CS 5490/6490: Network Security Fall 2015

Information Security Basic Concepts

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

CS 458 / 658 Computer Security and Privacy. Course mechanics. Course website. Module 1 Introduction to Computer Security and Privacy.

Evaluate the Usability of Security Audits in Electronic Commerce

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. March 19, 2015

Module: Introduction. Professor Patrick McDaniel Spring CMPSC443 - Introduction to Computer and Network Security

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

How To Pass A Credit Course At Florida State College At Jacksonville

Security + Certification (ITSY 1076) Syllabus

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Tele3119 Trusted Networks Course Outline 2013

A Framework for Secure and Verifiable Logging in Public Communication Networks

University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course

CSE 571S: Network Security CSE571S

Curran, K. Tutorials. Independent study (including assessment) N/A

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

Passing PCI Compliance How to Address the Application Security Mandates

Chapter 7 Transport-Level Security

Introduction to Information Technology ITP 101x (4 Units)

Introduction to Cyber Security / Information Security

Data Encryption and Network Security

Common Syllabus Revised

Syllabus COMP 517 Computer Security Penn State Harrisburg Fall 2009

CPSC 467b: Cryptography and Computer Security

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Network Security. Introduction. Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Implementing Cisco IOS Network Security

Data Security Incident Response Plan. [Insert Organization Name]

Transcription:

CNT5412/CNT4406 Network Security Course Introduction Zhenhai Duan 1

Instructor Professor Zhenhai Duan (duan@cs.fsu.edu) Office: 162 LOV Office hours: 1:00PM to 2:00PM, T/Th Or by appointment Email: duan@cs.fsu.edu Class website: Use blackboard http://campus.fsu.edu Discussion board Research area Computer networks and network security Homepage: http://www.cs.fsu.edu/~duan 2

Teaching Assistant Shiva Houshmand Office: MCH 106C Office hours 10:00AM 11:00AM, Wednesday Or by appointment Shuaiyuan Zhou Office: MCH 106C Office hours 10:00AM 11:00AM, Friday Or by appointment 3

Prerequisites COP4530: Data Structures, Algorithms, and Generic Programming Unofficial requirements Computer Networks CNT 4504 Intro to Computer Networks, or CNT 5505 Data and Computer Networks Programming Comfortable with programming using a high-level programming language such as C/C++ and Java. 4

Required Textbook : Course Material Network Security: Private Communication in a Public World (2 nd edition) by Kaufman, Perlman, and Speciner. Publisher: Prentice Hall PTR Recommended Reference Textbook : Handbook of Applied Cryptography, available online Cryptography and Network Security: Principles and Practice (5th Edition), by William Stallings. Lecture slides posted at the class website 5

Workload and Grading Policies 1. Five homework assignments 40% 8% for each assignment Including both written and programming assignments 2. Two exams 45% Midterm: 20% Final Exam - 25% 3. One course project 15 % Group up to 3 students A group must consist of either all undergraduate students or graduate students. 6

Link to final letter grades Final Letter Grades 7

Accounts Computer Science account (<yourid>@cs.fsu.edu) For doing assignments (linprog1 to linprog4.cs.fsu.edu) http://www.cs.fsu.edu/sysinfo/newstudent.html FSU account (<yourid>@fsu.edu) For receiving class announcements For submitting assignments For getting your grades http://www.ucs.fsu.edu/getstarted.html Access to blackboard For class materials, discussion board, grades etc. Through your FSU account http://campus.fsu.edu 8

Academic Integrity Means No copying from anywhere Don t solve assignments for others Don t ask/give solutions. Protect your solutions Don t distribute assignments/exams to others (in a later semester) Moss: An automated tool for comparing code will be used. Please read the policies on course web page Dishonesty Not fair to others. You may get a grade of F. Its better to submit an imperfect assignment than to submit a copied one. Partial points are always possible 9

Course Policies Attendance is mandatory Good attendance = missing 3 or fewer lectures Let the Instructor know in advance when possible Missed exams: No makeup exams will be given except in emergencies with appropriate document Incomplete No incomplete grade I will be given Except in emergencies with appropriate document 10

To ask or not to ask? Me and TA are not psychics Please let us know if You are lost You don t understand something You don t have the background Class can be improved in certain ways Feel free to give anonymous feedback online Though direct feedback is always welcome! 11

Course Overview Introduction to network security Secure network services Security mechanisms Threats, attacks, countermeasures Networking & secure channels Introduction to cryptography and encryption Authentication Cryptographic Protocols Strong authentication, key exchange 12

Course Overview (Cont d) Analysis of protocols Standards SSL/TLS SSH IPSEC, IKE Kerberos, S/Key Public Key Infrastructures PKI: X.509 PGP 13

Course Overview (Cont d) Network security systems and applications Packet filtering/firewalls Traffic monitoring and intrusion detection Routing protocols Distributed Denial of Service attacks Network forensics/ vulnerability assessment 14

Course Overview (if time) Privacy Freenet and Tor Web security Java, cookies, HTTP/HTTPS Web objects DNS security Wireless security VoIP security Worms and botnets Smartcards/Biometrics 15

What is Security? Definitions from the Amer. Herit. Dict. : Freedom from risk or danger; safety Measures adopted to prevent a crime such as burglary or assault. Network security measures: Mechanisms to prevent, detect, and recover from network attacks, or for auditing purposes. Keeping operations within the network secure for users of the network 16

Terminology Network assets & liabilities Policies Security breaches Threats Vulnerabilities Attacks Threat intensity Security attack: a threat Security services: eg. data confidentiality Security mechanisms; eg. encryption 17

A Secured Network A network is secured if it has deployed adequate measures for prevention of, detection of, and recovery from attacks. Adequate = commensurate with the value of the network s assets and liabilities, and the perceived threat intensity. 18

Security Goals C onfidentiality I ntegrity A vailability Other important security goals include auditability 19

Data confidentiality Security Services Protection from unauthorized disclosure Data integrity No modification, insertion, deletion, replay, etc. Availability Authentication Entity is who it claims to be. Nonrepudiation Protection against party to transaction claiming it wasn t me Access control Resources that can be used 20

Security Mechanisms Encipherment Traffic padding Digital signature Hashing for data integrity Event detection (breaches) & recovery Audit trail Access control mechanisms 21

Security operations Prevention against adversarial or accidental capture and/or modification of information. Audit of data accesses/modifications, and of privileged operations. Detection of all improper access to data and system resources. Recovery from unauthorized access, restoring data values, system integrity, and identifying compromised data/resources. Retaliation (legal, PR, info. warfare) 22

Authentication / Data Integrity Authentication mechanisms comprise a substantial portion of this course. Used to prevent impersonation and detect unauthorized data modifications. Some mechanisms to provide data integrity will not be considered: Enforcement of safe data manipulation methods (file system protection mechanisms, database protection mechanisms). 23

Availability Continuous service, quality of service, resource wastefulness reduction Typical attack: DoS, DDoS Prevention by removal of bottlenecks Detection of attacks Recovery of service provisionability Audit of service requests 24

Concrete Security Measures Securing an open network requires adoption of a myriad of measures: Policies, audit and evaluation Personnel training Physical security/ EM emanation shielding Authentication and access control Communication security: Cryptography-based techniques focus of this course 25

Reading Assignment Chapter 1 Paper [VK1983] 26