Introduction to CSS 322 Security and Cryptography. Dr Steve Gordon ICT, SIIT

Similar documents
Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Cryptography and network security CNET4523

CS 450/650 Fundamentals of Integrated Computer Security

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

Computer and Network Security PG Unit Outline School of Information Sciences and Engineering

Computer and Network Security

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

Computer and Network Security

CRYPTOG NETWORK SECURITY

SE 4472a / ECE 9064a: Information Security

University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course

CSCI 4541/6541: NETWORK SECURITY

Weighted Total Mark. Weighted Exam Mark

Network Security Course Specifications

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; /6834)

Course Outline Computing Science Department Faculty of Science. COMP Credits Computer Network Security (3,1,0) Fall 2015

Tele3119 Trusted Networks Course Outline 2013

Network Security SWISS GERMAN UNIVERSITY. Administration Charles Lim

CRYPTOGRAPHY AND NETWORK SECURITY

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

Common Syllabus Revised

NETWORK ADMINISTRATION AND SECURITY

Data Encryption and Network Security

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

Information Security Course Specifications

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Network Security Essentials:

CSCI 4250/6250 Fall 2015 Computer and Network Security. Instructor: Prof. Roberto Perdisci

Lecture 1 - Overview

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

CS 5490/6490: Network Security Fall 2015

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

Cryptography and Key Management Basics

Computer Security: Principles and Practice

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

MCS5813 Cryptography Spring and select CRN 3850

Why Security Matters. Why Security Matters. 00 Overview 03 Sept CSCD27 Computer and Network Security. CSCD27 Computer and Network Security 1

CS 464/564 Networked Systems Security SYLLABUS

Boston University MET CS 690. Network Security

Course Syllabus. Course code: Academic Staff Specifics. Office Number and Location

CSCI-E46: Applied Network Security. Class 1: Introduction Cryptography Primer 1/26/16 CSCI-E46: APPLIED NETWORK SECURITY, SPRING

Spring 2015: Gordon State College. Barnesville, GA Online Course: Econ 2106 Microeconomics. Course Meeting Time and Location: Internet (D2L)

Content Teaching Academy at James Madison University

Information and Communications Technology Courses at a Glance

Spring 2013 CS 6930 Advanced Topics in Web Security and Privacy - 3 Credit Hours Syllabus and Course Policies

Chapter 8. Network Security

EECS 588: Computer and Network Security. Introduction

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline

MW , TU 1-3; and other times by appointment

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

CISCO IOS NETWORK SECURITY (IINS)

IT Networks & Security CERT Luncheon Series: Cryptography

Multimedia & the World Wide Web

CSE331: Introduction to Networks and Security. Lecture 1 Fall 2006

Lecture 1: Introduction. CS 6903: Modern Cryptography Spring Nitesh Saxena Polytechnic University

Course Design Document. IS403: Advanced Information Security and Trust

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Curran, K. Tutorials. Independent study (including assessment) N/A

CCNA Security 2.0 Scope and Sequence

Table of Contents. Introduction. Audience. At Course Completion

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

CCA CYBER SECURITY TRACK

Key Management and Distribution

Introduction to Security and PIX Firewall

How To Protect Your Data From Attack

Certificate in Cyber Security

CIS433/533 - Computer and Network Security Introduction

Module: Introduction. Professor Trent Jaeger Fall CSE543 - Introduction to Computer and Network Security

College Algebra Online Course Syllabus

Key Management and Distribution

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

Client Server Registration Protocol

Network Security Technology Network Management

F21CN: Computer Network Security: Overview

Syllabus COMP 517 Computer Security Penn State Harrisburg Fall 2009

CSC 474 Information Systems Security

CSE/EE 461 Lecture 23

Wireless Mobile Internet Security. 2nd Edition

The University of Akron Department of Mathematics. 3450: COLLEGE ALGEBRA 4 credits Spring 2015

DePaul University School of Accountancy and MIS ACC Online

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Lecture 9: Application of Cryptography

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

CS Final Exam

Overview of Public-Key Cryptography

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Transcription:

Introduction to CSS 322 Security and Cryptography Dr Steve Gordon ICT, SIIT

Welcome To a first course on the theory and technologies that provide secure computers and networks A 3 rd year course for computer scientists Course website available from http://ict.siit.tu.ac.th/drupal/css322 CSS 322 - Course Introduction 2

Steve Gordon Contact details: Who Am I? Email: steve@siit.tu.ac.th Office: 2304-7, Bangkadi (IT&MT Building) Phone: ext 2014 Mobile: 0817227288 Windows Live Messenger: stevengordon07@hotmail.com Google Talk: steve.siit@gmail.com When can you contact me? Anytime CSS 322 - Course Introduction 3

Prerequisites There are no formal prerequisites, but I assume you know: Discrete mathematics (logic, prime numbers, ) Basics of data communications (OSI 7-layers) Operating system concepts (processes, RPC, ) Software design principles (divide-and-conquer, functions, ) Programming languages (e.g. C, C++, Java or similar) CSS 322 - Course Introduction 4

What will you learn in CSS 322? The role of security in computers and networks Theory and concepts behind secure systems Cryptography Details of important and popular algorithms DES, AES, RSA, Digital Signatures, Internet security techniques and attacks Layered security, viruses, spyware, Details of Internet security protocols IPsec, SSL/TLS, PGP, Legal and ethical issues and current trends CSS 322 - Course Introduction 5

Topics Introduction to Security Classical Encryption Techniques Block Ciphers and DES Advanced Encryption Standard More on Symmetric Ciphers Confidentiality using Symmetric Key Encryption Introduction to Number Theory Public Key Cryptography Public Key Management Authentication and Hash Functions Authentication Applications Internet Security Firewalls Malicious Software Web and Other Security Issues CSS 322 - Course Introduction 6

Why is CSS 322 Useful? It will help you get a job! Designing and writing secure applications Designing and managing secure systems (networks, computers) Security certifications (e.g. CISSP, GIAC) are much more valuable than networking/computer certifications (e.g. Microsoft, Cisco) You will have an understanding of: The concepts behind most of today s security protocols Details of popular Internet security protocols and systems Techniques for attacking and defending networks Legal and ethical issues that arise in computer security CSS 322 - Course Introduction 7

Lectures 3 hours per week Self study At least 6 hours per week Course Structure Browsing lecture notes BEFORE and AFTER class, reading the textbook and other materials, studying for quizzes and exams, preparing assignments, consultations, group discussions, Assessment CSS 322 - Course Introduction 8

Quizzes Assessment 10 minute quizzes at the beginning of selected lectures Cover the topics since the last quiz Test your understanding of lectures, reading materials and homework problems Closed book 7 quizzes; 5 best marks will count 20% total (4% each) Assignment Set of problems for you to complete over a number of weeks Test your in-depth understanding of concepts and protocols Open book 20% CSS 322 - Course Introduction 9

Mid-term Exam Closed book 30% Final Exam Closed book 30% For advice: Assessment Closed book assessment is not a memory test (e.g. I won t test your ability to remember S-boxes) it s a test of understanding We will discuss types of questions and topics before exam CSS 322 - Course Introduction 10

What is it? Academic Misconduct Plagiarism, cheating, copying, lending, Examples Copying assignment answers from friend (verbal or written) Giving your assignment (or some answers) to a friend Looking at neighbours answers during quiz/exam Copying sentences/paragraphs/code from textbooks/internet without acknowledgement Results If detected, questions or entire assessment item may get 0 marks Discussion with friends is encouraged; telling your friends answers is not! CSS 322 - Course Introduction 11

Learning Materials Lectures Attend, listen and ask questions! Will include examples and demonstrations Lecture notes PDF of Powerpoint slides Available on website and from document services Aim to have available 1 day before lecture Make your own notes Recommended Textbook Cryptography and Network Security by Stallings 4 th Edition (90% of my content is based on this) Other Useful Textbooks Earlier editions of Stallings textbook Network Security by Kaufman, Perlman, Speciner These other textbooks should only be used as supplementary readings CSS 322 - Course Introduction 12

Recommended Readings Learning Materials For selected topics I will list papers/chapters/websites/standards that should be read These will be publicly available on the Internet or available through the Library (electronic or hardcopy) Course Website All materials will be available from the website Announcements, selected solutions will be on the website Mailing list (access via course website) You must subscribe (as will be used for announcements) CSS 322 - Course Introduction 13

Is This Course Difficult? Computer and network security looks very hard! Theory of computer security includes lot of mathematics Example: Stallings textbook contains details of many algorithms Network security protocols can be very complex Example: IPsec (and associated IKE) 200+ pages of standards I will try to make it look easy! Not all mathematical details will be covered Go through algorithms S L O W L Y, using examples Combine technical details of protocols/algorithms with demonstrations of real systems Cover only selected (interesting!) protocols May adapt topics based on your feedback (including quiz results) CSS 322 - Course Introduction 14