@Yuan Xue CS 285 Network Security Fall 2013 Yuan Xue.

Slides:



Advertisements
Similar presentations
Chapter 1  Introduction 1 Chapter 1: Introduction.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Course Introduction.
Introduction and Logistics Amir Houmansadr CS660: Advanced Information Assurance Spring 2015.
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Authentication James Walden Northern Kentucky University.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010.
6/19/2015 Prof. Ehud Gudes Security Ch 1 1 Chapter 0 - Overview.
Welcome to CS 450 Internet Security: A Measurement-based Approach.
Applied Cryptography for Network Security
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
“Network Security” Introduction. My Introduction Obaid Ullah Owais Khan Obaid Ullah Owais Khan B.E (I.T) – Hamdard University(2003), Karachi B.E (I.T)
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Computer Network Fundamentals CNT4007C
EECS 354 Network Security Introduction. Why Learn To Hack Understanding how to break into computer systems allows you to better defend them Learn how.
Cryptography and Network Security
Computer Networks CEN 5501C Spring, 2008 Ye Xia (Pronounced as “Yeh Siah”)
Introduction to Information Security J. H. Wang Sep. 15, 2014.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
CSCE 727 Information Warfare
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
@Yuan Xue CS 285 Network Security Fall 2008.
Cryptography, Authentication and Digital Signatures
Working Connection Computer and Network Security - Introduction - Dr. Hwajung Lee Radford University.
Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since.
Another perspective on Network Security Network Security Essentials: Applications and Standards, 4/E William Stallings ISBN-10: ISBN-13:
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
Introduction to Information Security J. H. Wang Sep. 10, 2013.
Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
CIS 3360: Security in Computing Cliff Zou Spring 2012.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
MAT 279 Data Communication and the Internet Prof. Shamik Sengupta Office New Building
Polytechnic University Introduction1 CS 393/682: Network Security Professor Keith W. Ross.
1 CDA 4527 Computer Communication Networking (not “analysis”) Prof. Cliff Zou School of Electrical Engineering and Computer Science University of Central.
CSCE 824 Secure (and Distributed) Database Management Systems FarkasCSCE
Web Application (In)security Note: Unless noted differently, all scanned figures were from the textbook, Stuttard & Pinto, 2011.
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
Computer Networks CNT5106C
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
MAT 279 Data Communication and the Internet Prof. Shamik Sengupta Office 4210 N Fall 2010.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
@Yuan Xue CS 283Computer Networks Spring 2011 Instructor: Yuan Xue.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles Course administration.
Computer Network Fundamentals CNT4007C
Computer Networks CNT5106C
Introduction to Information Security
Information Security.
Data & Network Security
CS/ECE 478 Introduction to Network Security Dr. Attila Altay Yavuz
Computer Networks CNT5106C
CNT 4704 Analysis of Computer Communication Networks
Introduction to Computer Security II
Computer Networks CNT5106C
Presentation transcript:

@Yuan Xue CS 285 Network Security Fall 2013 Yuan Xue

@Yuan Xue Course Information When and Where Tuesday/Thursday 1:10pm-2:25pm 298 Featheringill HallFeatheringill Hall Instructor: Yuan Xue Office: 383 Jacobs Hall, Phone: Office hours: Tuesday/Thursday 3:00pm-4:00pm or by appointment. TA: Li Li Office: 385 Jacobs Hall, Office hours: Monday/Wednesday 1:00pm-2:30pm or by appointment. Web: fall fall201

@Yuan Xue Books and References Textbook [WS] Cryptography and Network Security: Principles and Practice (4 th /5th Edition) by William Stallings Reference books [DM] The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws, by Dafydd Stuttard and Marcus Pinto [MZ] The Tangled Web: A Guide to Securing Modern Web Applications by by Michal Zalewski [KPS] Network Security: Private Communication in a Public World (2nd Edition), by Charlie Kaufman, Radia Perlman, Mike Speciner [AND] Security Engineering: A Guide to Building Dependable Distributed Systems, by Ross J. Anderson [CSP] Security in Computing (3rd Edition), by Charles P. Pfleeger, Shari Lawrence Pfleeger [BIS] Computer Security: Art and Science, by Matthew A. Bishop

@Yuan Xue Course Component Lecture Slides + white board Take note Online digest/slides Participation Discussion Presentation Homework 5 assignments Pencil/paper + programming Midterm Project Important component Start early Potential topics Grading Policy  Participation: 10%  Homework: 35%  Midterm: 25%  Project: 30%

@Yuan Xue What you will learn from this course What is “ Security ” ? Where the security problems come from?  Potential threats to a system or an application What are the solutions? Apply an appropriate mix of security measures Knowing what has worked, what has failed Both theory, design, principle as well as hands-on experience Security involves many aspects -Operating system, programming language, administration and policy Our Focus: Network Security (Algorithm, protocol, mechanism) We will also discuss OS, programming related security issues.

@Yuan Xue Course Topics Security Basics and Principles Symmetric/ Asymmetric Cryptography Basic concept, algorithm, mechanism, Design principles Security Practices Secure protocols, systems and applications (SSL, IPSec, PGP) Hand-on experiences (system/network exploits, defenses) Hot Topics and Recent Development Web security, Wireless Network security, Smartphone, Cloud computing, Worm, DoS attack, etc.

@Yuan Xue Survey and Feedback Your input is important Online Survey  Feedback

@Yuan Xue What is security? In general, security is the condition of being protected against danger or loss. (Wikipedia) In computer security and network security What are the subjects that need to be protected? Let’s start with some terms System  computer, network, application, data, resource Principal: an entity that participate in a system  user, person

@Yuan Xue What is security? Computer Security Confidentiality means that only authorized people or system can access the data or resource.  it’s about the receiver Integrity refers to the trustworthiness of data or resources.  about the source  Data integrity means that data can only be modified by authorized people or system in authorized ways  Origin integrity (also called source authentication) means that the source of the data is trustworthy.  Message authentication (= data integrity + origin integrity) means messages received are exactly as sent (i.e. no modification, insertion, deletion, or replay), and the ID of the sender is valid.  Note: timing information (timestamp) is also considered as part of the message. Availability means that people has the ability to use the information or resource desired. Refer to [MB]1.1

@Yuan Xue Where the security problem comes from? Let’s look at some example systems Bank Bookkeeping  Core operations customer account, journals recording the transactions  Who has the access to the information? Bank’s own staff – what if they cheat? ATM  Authenticate users based on card and ID number Let’s go Internet  The user – how do we know they are the “real” (authenticate) user?  Protect web servers and bookkeeping database

@Yuan Xue Where the security problem comes from? Hospital Patient record system  Who can access the record? – Many parties – insurance company, care giver, researcher, Complicated -- role can change Privacy issue – HIPPA Anonymize the record for research  Is it sufficient? Show me all records of 59-year-old males who were treated for a broken collarbone on September 15, 1966 Drug management Let’s go to Internet/Web  Patient Portal, Electronic Medical Record

@Yuan Xue Where the security problem comes from? In real world where systems interact with each other… imagine physical systems controlled by computers, communicated via networks (cyber-physical system) Let’s watch a video clip..