T-110.1234 T-110.1234 Some Fancy Technology (3 ECTS) Introduction See notes for comments.

Slides:



Advertisements
Similar presentations
INTERNET SHIELD COURSE F-SECURE ® ANTI-VIRUS CLIENT SECURITY 6.
Advertisements

MGF1106 Math for Liberal Arts Sections Course website: Lecturer: Jim Wooland Lectures: TR 8:00 – 9:15, 101 HCB Labs: Mondays,
Basic Communication on the Internet:
AS Automaatio- ja systeemitekniikan projektityöt.
Welcome To Hermiston ONLINE! Orientation for the 2012/2013 School Year.
Chapter 1  Introduction 1 Chapter 1: Introduction.
CMP206 – Introduction to Data Communication & Networks Lecture 1 - Networking Fundamentals.
Final Exam Review Exam time is Aug. 2 nd 2:00pm – 3:50pm in the same classroom. All semester’s content will be tested, but more on content after midterm.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
(4.4) Internet Protocols Layered approach to Internet Software 1.
Module 5: Configuring Access for Remote Clients and Networks.
Introduction to CS170. CS170 has multiple sections Each section has its own class websites URLs for different sections: Section 000:
January 2011 As a precaution, re-check the exam time in early January. Various rooms are used, your room will be on your personal timetable, available.
Contact Information Ms. Pilant
CMSC 414 Computer (and Network) Security Jonathan Katz.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
August 15 click! 1 Basics Kitsap Regional Library.
New experiences with teaching Java as a second programming language Ioan Jurca “Politehnica” University of Timisoara/Romania
Introduction. » How the course works ˃Homework ˃Project ˃Exams ˃Grades » prerequisite ˃CSCI 6441: Mandatory prerequisite ˃Take the prereq or get permission.
Mvt. Studies. Wk2_Intro to StudyNet_09_101 Movement Studies Introduction to StudyNet.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
SPA WORKSHOPS PRESENTS. STEP ONE: Devising your research question/topic. If there is a specific research question/topic given in your assignment, try.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
T Seminar on Network Security Today’s agenda 1.Overview and organization 2.English support 3.Course theme 4.Project topics 5.Timetable.
Mr C Johnston ICT Teacher
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
SKU3033 / SKF3033 NETWORK & SYSTEM ADMINISTRATOR.
Final Review. The exam Two double-sided letter size cheating sheets allowed Closed book, closed note McMaster calculator allowed Types of questions: –
Protecting Students on the School Computer Network Enfield High School.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Introduction. » How the course works ˃Homework ˃Project ˃Exams ˃Grades » prerequisite ˃CSCI 6441: Mandatory prerequisite ˃Take the prereq or get permission.
Introduction to Information Security J. H. Wang Sep. 10, 2013.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
T Seminar on Network Security Today’s agenda 1.Seminar arrangements 2.Advice on the presentation.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved Introduction.
Csci5233 computer security & integrity 1 Cryptography: an overview.
Mrs. Caple’s 7th Grade English Welcome!. Wednesday, August 20, 2014 Practice Prior Skills Write a few sentences about the highlight of your summer by.
Just Say NO! No Drinks or Food No Game Playing No Personal No Cell Phones Seen No Cell Phones Heard No Drinks or Food No Game Playing No Personal.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
CSCD 330 Network Programming Winter 2015 Lecture 1 - Course Details.
CSCI 6442 Database Management II INTRODUCTION Copyright 2016 David C. Roberts, all rights reserved.
Higher School of Economics, Moscow, 2015 HSE Academics for Exchange Students Orientation Spring
Dr. Jeff Cummings MIS323 Business Telecommunications.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Welcome to Introduction to Psychology! Let’s share a bit about where we are all from…
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
Computer Data Security & Privacy
Course Information Mark Stanovich Principles of Operating Systems
Exam Review.
NSE5 Dumps PDF Fortinet Network Security Expert 5 Written Exam (500) NSE5 DumpsNSE5 BraindumpsNSE5 Questions AnswersNSE5 Study Material.
CSCD 330 Network Programming Spring
Accelerated Introduction to Computer Science
T Information Security Technology
Final Exam Review Exam time is May. 2nd 1:00pm – 3:50pm in the same classroom. All semester’s content will be tested, but more on content after midterm.
Presentation transcript:

T T Some Fancy Technology (3 ECTS) Introduction See notes for comments

T Some Fancy Technology Prerequisites: ”Good general knowledge of our area of science” Basic understanding of operating systems, programming, computer networks etc. assumed Minimum requirement: T , T or equivalent knowledge

T Some Fancy Technology Goals: Introduce basic concepts and provide a general view on the field of our science Other goals

T Practical issues Please register in at OODI! (if you haven’t yet) –Needed for the home exercises Make sure you have right address in OODI –Otherwise we can’t contact you Monitor Noppa for information –noppa.aalto.fi/noppa/kurssi/t /

T Practical issues This is the preferred way to ask questions from course staff sent from personal accounts will not be replied to

T Course Staff Lecturer –Reception Mon 8-9 at Y193, Otakaari 1 Responsible teacher, PhD Teaching assistants –Reception Tue and Wed at cafeteria Pet dog

T Lectures Lecturer: N.N Lectures on Wednesdays at and Thursdays at in lecture room T1 –Lecture language is English Lectures are organized according to the course book Slides will be published on the course workspace

T Homework Homework, online You need –Computing center and Niksula user account Pass / fail grading The exercises are relatively easy (we think) and are intended to illustrate key concepts and enhance the learning experience

T Course Requirements Requirements for passing the course: –Homework Must do: 25 % of points for each assignment Must do: 50 % of points for all assignments 80 % of points increases the course grade by one point –The full exam or the two midcourse exams –Exam Lectures and lecture slides Book: Applied Cyberhydrodynamics Exercises Questions in Finnish and English Answer in Finnish, Swedish or English

T Exam: Question Formats Concepts and acronyms –Q: Firewall (1p) A: A device which limits traffic between two networks A: An implementation of the security policy, controls information flows –Q: MAC (1p) A: Mandatory Access Control, the system enforces access rules A: Message Authentication Code, a cryptographic checksum (hash) A: Message Authentication Code, ensures data integrity in communications –A short explanation of the concept or acronym is enough Justify the following statements either correct or false –Q: Bell - LaPadula is a model for information integrity (1p) A: False, it is a model for information confidentiality –Q: All systems should have antivirus protection (1p) A: Correct, Viruses may be transmitted over any media, like DVDs or A: False, a dedicated system like an Unix database server is not likely to have viruses –Both the correct and false answer may be accepted for a particular question, the key is in being able to justify your position

T Exam: Question Formats... Several short questions, like "How does a packet filtering firewall work? (3 p)" –A written reply, with a diagram if possible –Also questions which require applied knowledge, like "What would happen if message authentication codes (crypto checksums) were removed from a crypto protocol, like SSH, SSL or IPSec?". Essay (sometimes) –Requires you to show that you can discuss a subject in an intelligent manner. Bullet points or diagrams are not sufficient here, you should aim to write something that looks like an article, which could be published in a magazine.

T Exam: What to answer Points will not be given for answers, which: –Discuss the subject without actually answering the question –Are correctly remembered from the course book, but do not actually answer the question –Contain the right terms, but do not form meaningful sentences in English, Finnish or Swedish We try to ask questions which require applied knowledge, which means that just blindly memorizing the slides and book should not get you through the exam Knowing the meaning of a technology or a concept is worth more points than getting the name exactly right