T Information Security Technology

Slides:



Advertisements
Similar presentations
COMP 5138 Relational Database Management Systems Sem2, 2007 Lecture 0 Course Overview.
Advertisements

Computer Security 1 [COMPGA01] Nicolas T. Courtois - University College London.
Slide 01-1COMP 7370, Auburn University COMP 7370 Advanced Computer and Network Security Dr. Xiao Qin Auburn University
Humboldt University Berlin, University of Novi Sad, University of Plovdiv, University of Skopje, University of Belgrade, University of Niš, University.
Lecture 1: IntroductionIntro to IT COSC1078 Introduction to Information Technology Lecture 2 Overview James Harland
6/19/2015 Prof. Ehud Gudes Security Ch 1 1 Chapter 0 - Overview.
Lecture 1: IntroductionIntro to IT COSC1078 Introduction to Information Technology Lecture 1 Introduction James Harland
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
1 Exam Details IMS 5043 IT in Organisations. 2 Location Check the web Make sure you know WHERE the exam will be held HOW to get there WHEN it starts Do.
Object-Oriented Programming Dr. Napoleon H. Reyes, Ph.D. Computer Science Institute of Information and Mathematical Sciences Rm QA, IIMS, Albany.
G53SEC Computer Security Introduction to G53SEC 1.
Lecture 1 Page 1 CS 111 Summer 2015 Introduction CS 111 Operating System Principles.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
T Seminar on Network Security Today’s agenda 1.Overview and organization 2.English support 3.Course theme 4.Project topics 5.Timetable.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
Introduction University of Sunderland CSEM02 Harry R Erwin, PhD Peter Dunne, PhD.
CSCD 330 Network Programming Fall/Winter/Spring 2014 Lecture 1 - Course Details.
T Seminar on Internetworking. Overview Paper finalization (deadline was 17.4.) –Proceedings has been send for printing Seminar day on
SKU3033 / SKF3033 NETWORK & SYSTEM ADMINISTRATOR.
T Seminar on Network Security. Overview Paper finalization (deadline ) –Final check, images, references, style –Note the changed date of.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved Introduction.
Share information Making own lecture materials WEB Discussions Tutorials Self-evaluations Simulation Feedback Course database Objectives:
 Course Overview Distributed Systems IT332. Course Description  The course introduces the main principles underlying distributed systems: processes,
Introduction to Information Security J. H. Wang Sep. 18, 2012.
King Saud University1 CSC 112 Java Programming I Introduction.
GE 306Dr SaMeH1 Engineering Report Writing (GE 306) Associate Professor of Environmental Eng. Civil Engineering Department Engineering College Almajma’ah.
{ COMI Thursday night 5:30 – 10:30 Room 6054.
SST UG2 Exam Revision The exam will be ● closed book ● 2 hours plus 5 minutes reading time ● 2 sections A and B each with 3 questions ● Answer 2 questions.
FINANCIAL MODELS (APPLICATIONS)
Computer Network Fundamentals CNT4007C
CS101 Computer Programming I
POC Open House Welcome to the POC Open House. My name is _____ and today we will learn about the iPad Courses for the Month of September. If you have any.
CNT 4704 Computer Communication Networking (not “analysis”)
CSE-C3400 Information security
It’s called “wifi”! Source: Somewhere on the Internet!
MIS323 Business Telecommunications
CNT 4704 Computer Communication Networking (not “analysis”)
CSC 111 Course orientation
COMI Friday 9:00 – 1:50 Room 2108.
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
EECE 310 Software Engineering
CSCD 330 Network Programming Spring
S Wireless Personal, Local, Metropolitan and Wire Area Networks - Exercises Mika Husso /
SWE 205 Software Usability Analysis and Design
CSCD 330 Network Programming Spring
CNT 4704 Analysis of Computer Communication Networks
MIS323 Business Telecommunications
CSC227: Operating Systems
Tonga Institute of Higher Education IT 141: Information Systems
COMS 261 Computer Science I
CSCD 330 Network Programming Spring
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
Introduction To CPSC 233 James Tam Event driven software
Guide: Report results Version of Ladok by the latest update:
SWE 205 Software Usability Analysis and Design
Tonga Institute of Higher Education IT 141: Information Systems
Guide: Certify results Version of Ladok by the latest update:
Introduction To CPSC 233 James Tam Event driven software
CS144K An Introduction to Computer Networks
CSE 444 Database Management Systems Autumn 1997 University of Washington Introduction and Welcome © 1997 UW CSE 12/12/2019.
Presentation transcript:

T-110.4206 Information Security Technology Aalto University, autumn 2013

My background Lecturer: Tuomas Aura Research areas: PhD from Helsinki University of Technology in 2000 Microsoft Research, UK, 2001–2009 Professor at Aalto 2008– Research areas: Security of new technologies Network security, DoS resistance NFC applications, ticketing and payment Privacy of mobile users Security protocol engineering Security of mobility protocols (Mobile IPv6, SEND, etc.)

Lectures Lecturer: Tuomas Aura 12 lectures in Sep-Oct 2013 Tuesdays 12:15-14 T1 Thursdays 14:15-16 T1 Attendance not mandatory but some material will only be covered in the lectures Lecture slides published in Noppa after each lecture Published slides include some additional pages No tutorial or exercise sessions to attend

T-110.2100 Johdatus tietoliikenteeseen, kevät 2010 Exercises Goal: broadening the scope of the course with hands-on experience (sorry, no prep questions for the exam) 6 exercise rounds, starting next week, continuing to exam week Exercise problems in Noppa by Sunday each week (first round on 15 September) Deadline on the following Sunday 23:59; reports to be returned to Rubyric Course assistants Aapo Kalliola and Markku Antikainen email: t-110.4206@tkk.fi Course assistants available in the Playroom for advice and equipment: Wednesdays 16:15-18 room A120 Thursdays 16:15-18 room A120 (these are the corrent times)

Advice for the exercises Programming skills are a prerequisite for this course Try to solve all problems at least partly Individual work: It is ok to discuss with other students but do not copy or even read the written solutions of other students. Do all practical experiments independently If you quote any text written by someone else, mark it clearly as a ”quotation” and give the source, e.g. [RFC 1234, section 5.6.7]

Assessment Examination Thu 24 Oct 2013 at 13:00-16:00 in T1 Remember to register for the exam two weeks earlier! Examination scope: lectures, recommended reading material, exercises, good general knowledge of the topic area Some old exams in Noppa under Additional Reading Exercises are not mandatory but strongly recommended Marking: exam max. 30 points exercises max 6 x 10 = 60 points grading based on total points = exam + roundup(exercises / 10) (total max 30+6=36 points) Course feedback is mandatory

Goals You are familiar with the fundamental concepts and models of information security. You can analyze threats, know common security technologies, and understand how they can be applied to protect against the threats. You are able to participate in practical security work Understand the limitations of security technologies to use them right Be aware of many pitfalls in security engineering Learn the adversarial mindset of security engineering Starting point for learning more

Approximate course contents Computer security overview Access control models and policies Operating system security Software security User authentication Applied cryptography Certificates and network security Encrypting stored data Identity management Threat modeling Payment systems Privacy

Recommended reading Dieter Gollmann, Computer Security, 3rd ed., 2011 (good overview) Ross Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd ed., 2008 (fun real-life stories) Matt Bishop, Introduction to computer security, 2004/2005 (for research students)

Course development In 2014, this course will be CSE-C3400 Information Security From 3 cr to 5 cr; more exercises on software security No major changes to the course content this year. Annual updates to the content What has or has not changed based on 2012 student feedback? Students liked the hands-on exercises. Some found the exercises to be a lot of work, others way too easy. Only minor changes were for this year as it is still only a 3-cr course. There is a fine line between the course assistant giving advice on the exercises and giving you the solution outright. We’ll try to find the right balance. Students liked discussion in the lectures. Please do continue to tell about your experiences and do ask questions. Sorry, I won’t publish model answers to the exam questions. There are many ways to answer the problems, and writing short model answers would create more questions than it answers. Some slides are in the handouts but not shown during lectures. This is intentional. They are supporting material.