CSE-C3400 Information security

Slides:



Advertisements
Similar presentations
COMP 5138 Relational Database Management Systems Sem2, 2007 Lecture 0 Course Overview.
Advertisements

Computer Security 1 [COMPGA01] Nicolas T. Courtois - University College London.
Humboldt University Berlin, University of Novi Sad, University of Plovdiv, University of Skopje, University of Belgrade, University of Niš, University.
6/19/2015 Prof. Ehud Gudes Security Ch 1 1 Chapter 0 - Overview.
CSCD 330 Network Programming Winter 2012 Lecture 1 - Course Details.
G53SEC Computer Security Introduction to G53SEC 1.
CPT: Prelim/01 Computer Programming Techniques v Objectives –to give some background on this subject CPT, Semester Preliminaries.
CS.402 Embedded Systems Introduction Duncan Smeed.
T Seminar on Network Security Today’s agenda 1.Overview and organization 2.English support 3.Course theme 4.Project topics 5.Timetable.
Introduction University of Sunderland CSEM02 Harry R Erwin, PhD Peter Dunne, PhD.
CSCD 330 Network Programming Fall/Winter/Spring 2014 Lecture 1 - Course Details.
Communications Introduction Duncan Smeed. Administrivia  Resources  Syllabus  Textbook  Lecture Notes  One-Minute Papers  Tutorials  Practicals.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved Introduction.
King Saud UniversityCSC112 - First Semester CSC 112 Java Programming I Introduction.
Share information Making own lecture materials WEB Discussions Tutorials Self-evaluations Simulation Feedback Course database Objectives:
CSCD 330 Network Programming Winter 2015 Lecture 1 - Course Details.
1 CDA 4527 Computer Communication Networking (not “analysis”) Prof. Cliff Zou School of Electrical Engineering and Computer Science University of Central.
Cheating The School of Network Computing, the Faculty of Information Technology and Monash as a whole regard cheating as a serious offence. Where assignments.
King Saud University1 CSC 112 Java Programming I Introduction.
Low Level Programming Introduction & Recap Duncan Smeed.
{ COMI Thursday night 5:30 – 10:30 Room 6054.
MSc in Advanced Computer Science Induction 2016/17
Computer Network Fundamentals CNT4007C
CS101 Computer Programming I
CSCE 715: Network Systems Security
POC Open House Welcome to the POC Open House. My name is _____ and today we will learn about the iPad Courses for the Month of September. If you have any.
02086 Writing Inspirations Aalto University
Computer Networks CNT5106C
CNT 4704 Computer Communication Networking (not “analysis”)
CNT 4704 Computer Communication Networking (not “analysis”)
E 96 Introduction to Engineering Design Peter Reiher UCLA
It’s called “wifi”! Source: Somewhere on the Internet!
Monday, September 25, 2017 Independent Time
CNT 4704 Computer Communication Networking (not “analysis”)
Computer Science 102 Data Structures CSCI-UA
Using MyMathLab Features
CPSC 441: Computer Communications
CSE/INFO 100: Fluency in Information Technology
Planning for Exam Revision
Computer Networks CNT5106C
The School Point of View
EECE 310 Software Engineering
CSCD 330 Network Programming Spring
SWE 205 Software Usability Analysis and Design
CSCD 330 Network Programming Spring
CNT 4704 Analysis of Computer Communication Networks
CNT 4704 Analysis of Computer Communication Networks
Introduction to Computer Security II
MIS323 Business Telecommunications
CSC227: Operating Systems
Welcome to CS1046 Approachable Apps
Tonga Institute of Higher Education IT 141: Information Systems
ECE 8823: GPU Architectures
CSCD 330 Network Programming Spring
Computer Networks CNT5106C
Introduction To CPSC 233 James Tam Event driven software
T Information Security Technology
SWE 205 Software Usability Analysis and Design
Tonga Institute of Higher Education IT 141: Information Systems
Introduction To CPSC 233 James Tam Event driven software
CSE 444 Database Management Systems Autumn 1997 University of Washington Introduction and Welcome © 1997 UW CSE 12/12/2019.
Presentation transcript:

CSE-C3400 Information security Welcome to the course! Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2015

Goals Learn the key concepts and abstractions of information security Understand the purpose and function of several security technologies, as well as their limitations e.g. security policies , authentication, access control, cryptography, network security Be able to model threats and analyze the security of a system critically, from the viewpoint of an attacker Have some hand-on experience of security flaws in software Learn the adversarial mindset of security engineering Starting point for learning more

My background Lecturer: Tuomas Aura Research areas: Professor at Aalto 2008– Microsoft Research, UK, 2001–2009 PhD from Helsinki University of Technology in 2000 Research areas: Security analysis of new technologies Security for ubiquitous computing, e.g. displays Security protocol engineering Network protocol security, DoS resistance Security without expensive infrastructure Privacy of mobile users Security of mobility protocols (Mobile IPv6, SEND, etc.)

Lectures Lecturer: Tuomas Aura 12 lectures in Sep-Oct 2015 Tuesdays 14:15-14 TU1 (TUAS building) Thursdays 14:15-16 AS1 (TUAS building) Attendance not mandatory but some material will only be covered in the lectures Lecture slides published in Noppa after each lecture Published slides include some additional pages not covered in the lectures No tutorial or exercise sessions to attend

T-110.2100 Johdatus tietoliikenteeseen, kevät 2010 Weekly exercises Goal: broadening the scope of the course with hands-on experience especially in software security Different from the content covered in the lectures and exam 6 exercise rounds, first round on second lecture week, last round on exam week Exercise problems in My Courses by Sunday each week (first round on 13 September 2015) Deadline one week later on Monday at 12:00 noon. Reports to be returned to Rubyric Course assistants Sanna Suoranta, Thanh Bui, Sid Rao, Debopam Bhattacherjee, Andi Bidaj email: cse-c3400@aalto.fi Course assistants available for advice in the Playroom: Tuesday, Wednesdays and Thursday at 16:15-18 in room A120

Advice for the exercises Programming skills are a prerequisite for this course Try to solve all problems at least partly Each exercise round has (a) and (b) parts, each worth 5 points. If you find the exercises hard, try to do the (a) part in every round as well as you can! Individual work: It is ok to discuss with other students but do not copy or even read the written solutions of other students. Do all practical experiments independently If you quote any text written by someone else, mark it clearly as a ”quotation” and give the source, e.g. [RFC 1234, section 5.6.7]

Assessment Examination Thu 22 Oct 2015 Remember to register for the exam two weeks earlier! Examination scope: lectures, recommended reading material, exercises, general knowledge of the topic area Marking: exam max. 30 points exercises max 6 x 10 = 60 points grading based on total points = exam + roundup(exercises / 5) (total max 30+12=42 points) Exercises are not mandatory but strongly recommended Try to do at least the (a) part of each exercise round. If you find the workload too high, not doing the (b) parts will cost some points, but you should still be able to pass the course Course feedback is mandatory

Approximate course contents Computer security overview Access control models and policies Operating system security Cryptography User authentication Threat analysis Certificates and network security Data encryption Identity management Privacy Payment systems Current topics Subject to change

Recommended reading Dieter Gollmann, Computer Security, 3rd ed., 2011 (easy-to-read overview) Ross Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd ed., 2008 (fun real-life stories) Matt Bishop, Introduction to computer security, 2004/2005 (for prospective research students)

Course development 2014 feedback Students liked the hand-on exercises, helpful course assistants, lectures, threat analysis Some found the exercises hard (take lots of time, require programming skills) – that is why we now have the (a) and (b) parts Too hard to install Linux and Windows in VM for the first exercise round Exercise server down – we were lucky last year with few outages, but the lecturer and CSC caused some Not all material covered in the lectures – true, I always have many extra slides and don’t know what exactly can be covered Some ask for the lecture slides in advance – sorry, I make last minute changes Some have taken a course on security before and don’t learn much new (typically exchange students or double-degree students) Access control models are boring – abstractions will be useful later in your career but, to be honest, we start with the boring stuff to reduce the student numbers New in 2015 >260 registered students, big challenge to run the exercises smoothly, please be patient and email the course alias if the server is down! Major and minor updates to the lectures