CIS/TCOM 551 Computer and Network Security Slide Set 1 Carl A. Gunter Spring 2004.

Slides:



Advertisements
Similar presentations
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Course Introduction.
Advertisements

CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010.
CAS CS 558 Network Security. Administrativia 6/14/2015Gene Itkis, CS558: Computer Network Security3 General info Instructor: Gene Itkis itkis+cs558 cs.bu.eduitkis+cs558.
Carnegie Mellon Communications, Organizations & Technology Course Organization Syllabus Prithvi N. Rao H. John Heinz III School of Public Policy.
1 1DT066 Distributed Information Systems Dr. Edith C.-H. Ngai Department of Information Technology Uppsala University.
6/19/2015 Prof. Ehud Gudes Security Ch 1 1 Chapter 0 - Overview.
Introduction to Modern Cryptography Instructor: Amos Fiat Strongly based on presentation and class by Benny Chor School of Computer Science Tel- Aviv Univ.
現代密碼學 Contemporary Cryptography. 2 Course Information Instructor: 左瑞麟 (Raylin Tso) Office: 大仁樓
A Network Security Overview Thomas Kernes November 1, 2000.
Data Communication and Networks Lecture 0 Administrivia September 7, 2006.
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
INTRODUCTION TO NETWORK SECURITY l.Tahani Aljehani.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
CSE 331 CSE 331: Introduction to Networks and Security Fall 2001 Instructor: Carl A. Gunter Slide Set 1.
Information Security Principles (ESGD4222)
Acknowledgements: William Stallings.William Stallings All rights Reserved Session 0 Syllabus Network Security Essentials Applications and Standards 5 th.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Introduction to Information Security J. H. Wang Sep. 15, 2014.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Applied Security Breno de Medeiros Florida State University Fall 2005.
Network Security CS nd Term Course Syllabus Cairo University Faculty of Computers and Information.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Advanced Internet Services Henning Schulzrinne Dept. of Computer Science Columbia University Fall 2003.
Contact Information Cryptography 8/10/2015 | pag. 2 Professor Assistant Office Webpage Course Text Ann Dooms Adriaan Barri
@Yuan Xue CS 285 Network Security Fall 2008.
Steve Wicker Cornell University 1 TRUST Autumn 2011 Conference.
Introduction University of Sunderland CSEM02 Harry R Erwin, PhD Peter Dunne, PhD.
Computer Networking A few notes on reading Dr Sandra I. Woolley.
1DT057 Distributed Information Systems Dr. Edith C.-H. Ngai Department of Information Technology Uppsala University.
Sun Yat-Sen University Introduction1 Advanced Topics on Computer Networking (现代计算机网络) Instructor: Di Wu (吴迪)
Introduction to Information Security J. H. Wang Sep. 10, 2013.
CIS 3360: Security in Computing Cliff Zou Spring 2012.
© Uppsala University, IT Dept. Computer Networks I / DT014/1TT821 Computer Networks I Dr. Edith C.-H. Ngai Department of Information Technology.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
The Data Encryption Standard (DES) By Danny Gibbs 4/19/2005.
1DT057 Distributed Information System Dr. Edith C.-H. Ngai Department of Information Technology Uppsala University.
Scott CH Huang COM 5336 Cryptography Lecture 0 Scott CH Huang COM 5336 Cryptography Lecture 0 Some Admin.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
Presented by Prof. Danilo Gligoroski MSc in Telematics Specialization in Information Security.
Polytechnic University Introduction1 CS 393/682: Network Security Professor Keith W. Ross.
CCM 4300 Lecture 1 Computer Networks: Wireless and Mobile Communication Systems Dr E. Ever School of Engineering and Information Sciences CCM4300_Autumn.
Mohammad Alauthman 1/22/20162 This 3-credit first course for computer science & IT majors, which provides students the basic understanding.
1 Introduction to Data Communication Networks ISQS 3349, Spring 2000 Instructor: Zhangxi Lin Office: BA 708 Phone: Homepage:
Presented by : Dr. Sarah Mustafa Eljack Babiker
1 1DT066 Distributed Information Systems Dr. Edith C.-H. Ngai Department of Information Technology Uppsala University.
Lecture 1 Page 1 CS 236 Online Introduction CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Information Security Prof. David Zhang Department of Computing Hong Kong Polytechnic University Tel: PQ809
© Uppsala University, IT Dept. Computer Networks I / DT052 Computer Networks I Dr. Edith C.-H. Ngai Department of Information Technology Uppsala.
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
@Yuan Xue CS 285 Network Security Fall 2013 Yuan Xue.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Distributed Systems 0. Overview Simon Razniewski Faculty of Computer Science Free University of Bozen-Bolzano A.Y. 2014/2015.
CEN 621 Cryptography and Network Security Spring Term CEN 621 Cryptography and Network Security Spring Term INTERNATIONAL BURCH UNIVERSITY.
Applied Security Breno de Medeiros Florida State University Spring 2007.
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-1 Overview and Introduction.
CSE 331: Introduction to Networks and Security
Cryptography and Network Security
Purpose of Class To prepare students for research and advanced work in security topics To familiarize students working in other networking areas with important.
Introduction to Information Security
STUDY SKILLS AND INTRODUCTION TO THE USE OF COMPUTERS
CAS CS 558 Network Security.
Introduction to the course
CNT 4704 Analysis of Computer Communication Networks
Cryptology Design Fundamentals
Data and Applications Security Developments and Directions
Overview and Introduction (Lecture Contents Summary)
Presentation transcript:

CIS/TCOM 551 Computer and Network Security Slide Set 1 Carl A. Gunter Spring 2004

Contact Information l Course web page: l Gunter  Office: 509 Levine  Telephone:  Office hour: 2 to 3 on Mondays  l Michael May   Web:

Pre-Requisites l TCOM 500 (or 512) is a pre-requisite for enrollment in CIS/TCOM 551 l CIS 500 is recommended l Programming  Some programming background is expected.  Distributed programming is desirable but we will teach it if you need to learn.

Course Scope l Design l Analysis l Programming Availability Integrity Confidentiality

Questions (Technical) l How does the security for these things work?  The ATM for my bank  The card reader on door of Levine  The fob for opening the doors on my minivan  My PennKey  The card purchase I made over the web  My active badge  The wireless network in SEAS  My Starbucks card and my DC subway pass

Questions (Policy and Industry) l How can we identify ourselves on the Internet? l How can I  Control the privacy of my data?  Properly use private data for commercial gain?  Properly use private data for enterprise management or research? l Will legislation help us with spam or DoS? l How can we secure computers attached to the Internet?

Organization of Lectures l Security threats, requirements, and models l Cryptology l Protocols l Internet and web architectures and security standards  Enterprise perimeters (firewalls and VPNs)  Electronic commerce (SSL and web services) l Security topics  Smart cards and biometrics  Security for ubiquitous computing and wireless networks  Topics as time allows

As Time Allows l Denial of Service (DoS) l Viruses l Access control systems l Spam l Legislative and international issues for cybersecurity l Intrusion detection l Privacy (technical and otherwise) l RFID tags

Possible References l Secure Electronic Commerce. Warwick Ford and Michael S. Baum. Prentice Hall l Network Security Essentials: Applications and Standards. William Stallings. Prentice Hall l Firewalls and Internet Security: Repelling the Wily Hacker, WR Cheswick and SM Bellovin, Addison-Wesley, l Security in Computing, CP Pfleeger and SL Pfleeger, 3 rd Edition, 2002.

Handbooks l Handbook of Applied Cryptography. Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. CRC l Applied Cryptography, Second Edition, Bruce Schneier, 1996.

History of Cryptology l The Codebreakers; The Comprehensive History of Secret Communication from Ancient Times to the Internet. David Kahn. Scribner l The Code Book : The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Simon Singh. Anchor Books 2000.

Reading for Fun and Profit l Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage. Clifford Stoll. Pocket Books l Crypto : How the Code Rebels Beat the Government -- Saving Privacy in the Digital Age. Steven Levy. Viking Press l Cryptonomicon. Neal Stephenson. Harperperennial Library l Secrets and Lies, Bruce Schneier, 2000.

Exams and Projects l Exams  First midterm: Feb 10 (drop date is Feb 13) 60 min 15%  Second midterm: March 25: 60 min, 15%  Final exam: Somewhere between April 29 and May 7, 120 minutes, 30% l Projects  3 or 4 term projects, 25%  Final project, due May 7, 15%