Module: Introduction. Professor Patrick McDaniel Spring 2009. CMPSC443 - Introduction to Computer and Network Security



Similar documents
Module: Introduction. Professor Trent Jaeger Fall CSE543 - Introduction to Computer and Network Security

CSC574 - Computer and Network Security Module: Introduction

CIS433/533 - Computer and Network Security Introduction

Lecture 1 - Overview

CSE598k / CSE545 Advanced Network Security

Advanced Systems Security

CSC 474 Information Systems Security

CS 450/650 Fundamentals of Integrated Computer Security

CSCI 4250/6250 Fall 2015 Computer and Network Security. Instructor: Prof. Roberto Perdisci

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

CS 458 / 658 Computer Security and Privacy. Course mechanics. Course website. Module 1 Introduction to Computer Security and Privacy.

Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

Network Security ITP 457 (4 Units)

CSCI 4541/6541: NETWORK SECURITY

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

IT 101 Introduction to Information Technology

Common Syllabus Revised

Weighted Total Mark. Weighted Exam Mark

OPERATIONS, BUSINESS ANALYTICS & INFORMATION SYSTEMS

This four (4) credit hour. Students will explore tools and techniques used penetrate, exploit and infiltrate data from computers and networks.

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

DEPARTMENT OF CRIMINOLOGY AND CRIMINAL JUSTICE (301)

Boston University MET CS 690. Network Security

Applied Information Technology Department

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

Computer Programming & Information Systems BCS451 Virtualization / Cloud Computing. Outline

Netzwerksicherheit [NetSec] Systemsicherheit [SysSec]

Computer and Network Security

GRAPHIC DESIGN 1. ART 115 Course Syllabus Fontbonne University, St. Louis, MO COURSE INFORMATION COURSE DESCRIPTION COURSE OBJECTIVES PREREQUISITES

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

4ECE 320 Signals and Systems II Department of Electrical and Computer Engineering George Mason University Fall, 2015

MKTG 330 FLORENCE: MARKET RESEARCH Syllabus Spring 2011 (Tentative)

CS 1340 Sec. A Time: 8:00AM, Location: Nevins Instructor: Dr. R. Paul Mihail, 2119 Nevins Hall, rpmihail@valdosta.

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Discussion Board Post Grading Criteria

Business Ethics (BUS 105) Cycle II, Spring, 2012 Semester

Mgt 2020Y - Marketing Fall 2013 Wednesday: 6:00 8:50pm, S4037. Wednesdays 9:00-10:00pm or by appointment.

Information Security Course Specifications

GEOG 5200S Elements of Cartography : Serving the Community Through Cartography Spring 2015

CS 340 Cyber Security Weisberg Division of Computer Science College of Information Technology & Engineering Marshall University

(CSIS 2500 All Section ) Management Information Systems (3.0 Credits)

Required Text: Ciccarelli. Psychology: An Exploration. New Jersey: Pearson Education, Inc. ISBN:

THE UNIVERSITY OF CALGARY Faculty of Management. Management Information Systems 321 Course Outline -- Winter 1999

Computer and Network Security PG Unit Outline School of Information Sciences and Engineering

CS 525 Advanced Database Organization - Spring 2013 Mon + Wed 3:15-4:30 PM, Room: Wishnick Hall 113

Categorical Data Analysis

02-201: Programming for Scientists

CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; /6834)

Social Marketing. MGT 3250Y Fall 2013 Fridays 6:00 8:50 p.m. Room: S4037.

CS 464/564 Networked Systems Security SYLLABUS

EPI 820/CPH504: Epidemiology in Public Health (Online)

Texas A&M University-Commerce Syllabus Accounting Information Systems - Acct W & W

POLICIES AND PROCEDURES REGARDING TEACHING SCHEDULES, GRADING, AND ADVISING IN THE COLLEGE

San José State University Department of Electrical Engineering EE 112, Linear Systems, Spring 2010

Course Syllabus PSYCH 2C03: SOCIAL PSYCHOLOGY Department of Psychology, Neuroscience, and Behaviour McMaster University Spring 2014

Paralegal/042 Workers Compensation for Paralegals Spring 2016 Section 1660 CE 206 Saturdays 9:00 a.m. 1:00 p.m. March 12 June 4, 2016

(Please don t me assignments, I will not grade them).

Teaching large lecture classes online: Reflections on engaging 200 students on Blackboard and Facebook

SYLLABUS PSYCHOLOGY 2AA3: SURVEY OF CHILD DEVELOPMENT Department of Psychology, Neuroscience, and Behaviour McMaster University Fall Term 2013

How To Protect Your Data From Attack

Standard: Information Security Incident Management

IS Management Information Systems

LaGuardia Community College City University of New York Social Science Department General Psychology: SSY

ACG (10061) INTERMEDIATE THEORY III (3 credit hours) Tentative Syllabus spring 2012 Class hours: Wednesdays, 7:10 p.m. 10:00 p.m.

BUAD : Corporate Finance - Spring

Class Day & Time: Tuesday & Thursday, 10:25 am 1:25 pm Office Location: INST 2014 Classroom: INST 2014

BA 561: Database Design and Applications Acct 565: Advanced Accounting Information Systems Syllabus Spring 2015

QUEEN S UNIVERSITY DEPARTMENT OF SOCIOLOGY SOCY 273 SOCIAL PSYCHOLOGY WINTER Tuesdays 8:30-10:00 am, Fridays 10:00-11:30 am Botterell Hall, B147

Course: ITM 125.C2 Course Title: Essentials of Business Information Systems Spring C2 2012

Introduction to Information Technology ITP 101x (4 Units)

CRJU Introduction to Criminal Justice (CRN 20933) Course Syllabus Spring 2015

Introduction to General Psychology Spring 2014 PSY , Mon. & Wed.: 6-7:15

CIS 160 ST: Web Design and Technology

Canisius College Richard J. Wehle School of Business Department of Marketing & Information Systems Spring 2015

Psych 211: Developmental Psychology WINTER Course Location : Arts Lecture Hall 116 Meeting Times: Mondays & Wednesdays, 4:30pm to 5:50pm

FLORIDA INTERNATIONAL UNIVERSITY

Colorado School of Mines Spring 2014 Principles of Economics EBGN 201

San José State University Department of Electrical Engineering EE 198B, Senior Design Project II, All Sections, Spring 2015

Kennesaw State University KSU 2290: Transfer Student Seminar Section 02 Fall 2013

IVY TECH COMMUNITY COLLEGE REGION 03 SYLLABUS MATH 136: COLLEGE ALGEBRA SUMMER Instructor: Jack Caster Telephone: ext.

SYLLABUS PSYCHOLOGY 2C03: SOCIAL PSYCHOLOGY Department of Psychology, Neuroscience, and Behaviour McMaster University Winter 2011

CS 5490/6490: Network Security Fall 2015

CNT4406/5412 Network Security Introduction

ECE475 Control System Analysis ABET Syllabus. ECE 326. Prerequisite topics: knowledge of Laplace transforms and Bode plots.

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Transcription:

CMPSC443 - Introduction to Computer and Network Security Module: Introduction Professor Patrick McDaniel Spring 2009 1

Some bedtime stories 2

People are the problem. I have seen the ememy and it is us. - Walt Kelley (Pogo) 3

This course We are going to explore why these events are not isolated, infrequent, or even unexpected. Why are we doing so poorly in computing systems at protecting our users and data from inadvertent or intentional harm? The answer: stay tuned! 4

This course... This course is a systems course covering general topics in computer and network security. We will investigate the tools and problems of contemporary security. Topics will include: network security, authentication, security protocol design and analysis, key management, program safety, intrusion detection, DDOS detection and mitigation, architecture/operating systems security, security policy, group systems, biometrics, web security, language-based security, and other emerging topics (as time permits) 5

You need to understand... IP Networks Modern Operating Systems Discrete Mathematics Basics of systems theory and implementation E.g., File systems, distributed systems, networking, operating systems,... 6

Goals My goal: to provide you with the tools to understand and evaluate research in computer security. Basic technologies Engineering/research trade-offs How to read/write/present security research papers This is going to be a hard course. The key to success is sustained effort. Failure to keep up with readings and project will likely result in poor grades, and ultimately little understanding of the course material. Pay-off: security competence is a rare, valuable skill 7

Course Materials Website - I am maintaining the course website at http://www.cse.psu.edu/~mcdaniel/cse543-s09/ Course assignments, slides, and other artifacts will be made available on the course website. Course textbook Kaufman, C., Perlman, R. and Speciner, M., Network Security (Private Communication in a Public World), 2nd edition, Prentice Hall 2002. 8

Course Calendar The course calendar as all the relevant readings, assignments and test dates The calendar page contains electronic links to online papers assigned for course readings. Please check the website frequently for announcements and changes to the schedule. Students are responsible for any change on the schedule (I will try to make announcements in class). 9

Grading The course will be graded on exams, assignments, a final course project, and class participation in the following proportions: 35% Course Assignments 25% Mid-term Exam 30% Final Exam 10% Class Participation 10

Collaboration All assignments are to be completed be each student independently. Any collaboration not explicitly allowed by Prof. McDaniel is a violation of the class rules and will result in dismissal from the class and an assignment of an 'F' grade. Please review the Academic Integrity Policy below for more information. 11

Readings There are a large amount of readings in this course covering various topics. These assignments are intended to: Support the lectures in the course (provide clarity) Augment the lectures and provide a broader exposure to security topics. Students are required to do the reading! About 10-20% of questions on the tests will be off the reading on topics that were not covered in class. You better do the reading or you are going to be in deep trouble when it comes to grades. 12

Ethics Statement This course considers topics involving personal and public privacy and security. As part of this investigation we will cover technologies whose abuse may infringe on the rights of others. As an instructor, I rely on the ethical use of these technologies. Unethical use may include circumvention of existing security or privacy measurements for any purpose, or the dissemination, promotion, or exploitation of vulnerabilities of these services. Exceptions to these guidelines may occur in the process of reporting vulnerabilities through public and authoritative channels. Any activity outside the letter or spirit of these guidelines will be reported to the proper authorities and may result in dismissal from the class and or institution. When in doubt, please contact the instructor for advice. Do not undertake any action which could be perceived as technology misuse anywhere and/or under any circumstances unless you have received explicit permission from Professor McDaniel. 13

Academic Integrity Policy Students are required to follow the university guidelines on academic conduct at all times. Students failing to meet these standards will automatically receive a 'F' grade for the course--no second chances or explanations will be accepted. The instructor carefully monitors for instances of offenses such as plagiarism and illegal collaboration, so it is very important that students use their best possible judgement in meeting this policy. The instructor will not entertain any discussion on the discovery of an offense, and will assign the 'F' grade and refer the student to the appropriate University bodies for possible further action. Note that students are explicitly forbidden to copy anything off the Internet (e.g., source code, text) for the purposes of completing an assignment or the final project. Also, students are forbidden from discussing or collaborating on any assignment except were explicitly allowed in writing by the instructor. 14

Assignment #0 (Due 1/15) Please review these slides and the website policies and send the instructor an email acknowledging that you have read and agree to these policies. Example: To: mcdaniel@cse.psu.edu From: xxx111@psu.edu Subject: CMPSC443 Course Policy (Spring 2009) I have read and understand the course policies regarding grades, integrity and ethics. I accept these policies and commit to behaving within the letter and spirit. I further understand that any failure to act within these policies with result in the reception of an F for the course. -Student Van Hauten 15

Assignment #1 (Due 1/27) You will be completing assignment #,1 which teaches you how to use cryptographic functions. Please review handout in class. You will need to find a UNIX machine to work on. Bo will help you with this if you need it. Bo is going to provide some slides on using make and tar 16

OK, what is security? In class: define online security? Be prepare to discuss: Explain why you think this definition is correct. What are the objective criteria for security? Name a couple of secure applications/systems? 17

What is security? Garfinkel and Spafford (1991) A computer is secure if you can depend on it and its software to behave as expected. Harrison, Ruzzo, Ullman (1978) Prevent access by unauthorized users Not really satisfactory does not truly capture that security speaks to the behavior of others Expected by whom? Under what circumstances? 18