TEL381 Homework Assignments. Outline Grading Format Ethics HW #1 Describe 3 Information Assurance Jobs HW #2 Describe 3 Network Protocols HW #3 Describe.

Slides:



Advertisements
Similar presentations
DDoS A look back from 2003 Dave Dittrich The Information School / Computing & Communications University of Washington I2 DDoS Workshop - August 6/
Advertisements

Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Instructor & Todd Lammle
CCNA 1 v3.1 Module 11 Review.
Firewalls and Intrusion Detection Systems
1 Packet Sniffers Prepared By: Amer Alhorini Supervised By: Dr. Lo'ai Tawalbeh NYIT New York Institute of Technology.
TEL205 Homework Assignments. Outline HW#1 How Do You Use the Internet? HW#2 Describe 3 Standards Organizations. HW#3 Review and Summarize a RFC. HW#4.
Welcome to EECS 354 Network Penetration and Security.
Welcome to CS 450 Internet Security: A Measurement-based Approach.
Instructor & Todd Lammle
Practical Network Security: Experiences with ntop Luca Deri Stefano Suin.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
TEL382 Homework Assignments. Outline HW#1 Find and Review/Describe 3 Existing IS Policy Manuals HW#2 Perform Qualitative Risk Analysis for Organization.
ECE Prof. John A. Copeland fax Office: Klaus 3362.
Copyright © Center for Systems Security and Information Assurance
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Click to edit Master subtitle style Chapter 6: Introduction to the IP Protocol Instructor:
CS 350 Chapter-6. A brief history of TCP/IP 1983 TCP/IP came to ARPAnet ARPAnet and MILNET dissolved in 1990 BSD UNIX.
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Week 8-1 Week 8: Denial of Service (DoS) What is Denial of Service Attack? –Any attack that causes a system to be unavailability. This is a violation of.
IIT Indore © Neminath Hubballi
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2013.
Linux Networking and Security Chapter 11 Network Security Fundamentals.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
CS 458 Internet Engineering Instructor: Prof. Jörg Liebeherr University of Virginia.
1 CDA6938 Special Topic: Research in Computer and Network Security (spring’07) Class Overview.
TEL581. Outline “Divide and Conquer” Potential Topic Areas Teams Schedule Grading Benefits Assistance Lecture Slides Lab Assignment Homework Assignment.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Chapter 9 & 10 TCP/IP. TCP/IP Model Application Transport Internet Internet Access.
TCP/IP fundamentals Unit objectives Discuss the evolution of TCP/IP Discuss TCP/IP fundamentals.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
TEL382 Paper/Presentation. Outline Format Grading Ethics Potential Topics.
Packet Filtering COMP 423. Packets packets datagram To understand how firewalls work, you must first understand packets. Packets are discrete blocks of.
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
Instructor & Todd Lammle
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
8/25/2010CS 686 Course Outline and Questionnaire EJ Jung CS 686 Special Topics in CS Privacy and Security.
McLean HIGHER COMPUTER NETWORKING Lesson 13 Denial of Service Attacks Description of the denial of service attack: effect: disruption or denial of.
4061 Session 26 (4/19). Today Network security Sockets: building a server.
Unit 9: Distributing Computing & Networking Kaplan University 1.
Inferring Denial of Service Attacks David Moore, Geoffrey Volker and Stefan Savage Presented by Rafail Tsirbas 4/1/20151.
1 CDA 4527 Computer Communication Networking (not “analysis”) Prof. Cliff Zou School of Electrical Engineering and Computer Science University of Central.
Web Security Introduction (Some of the slides were adapted from Oppliger’s online slides at
Chapter 8 The TCP/IP Protocols Cisco Learning Institute Network+ Fundamentals and Certification Copyright ©2005 by Pearson Education, Inc. Upper Saddle.
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
1 NES554: Computer Networks Defense Course Overview.
Machine Learning for Network Anomaly Detection Matt Mahoney.
or call for office visit,
Exam 2 Review CS461/ECE422 Fall Exam guidelines Same as for first exam A single page of supplementary notes is allowed  8.5x11. Both sides. Write.
NETWORK INTRUSION SECURITY BREACHES, THAT MAKE NETWORKS VULNERABLE TO UNAUTHORIZED ATTACKS.
Introduction1-1 CS 494/594 Internetworking Protocols.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
Course Overview 1 MAT 279 Data Communication and the Internet Prof. Shamik Sengupta Office 4210 N
TCP/IP (Original) Application Transport Internet Network Access TCP/IP
CNT 4704 Computer Communication Networking (not “analysis”)
Managing Secure Network Systems
or call for office visit,
Chapter 4 Core TCP/IP Protocols
Internet & Web.
Information Assurance & Network Security Certificate
Prepared by: Adeel Ahmad
Chapter 2.1: Introduction to TCP/IP
Mobile Networking Through Mobile IP
Presentation transcript:

TEL381 Homework Assignments

Outline Grading Format Ethics HW #1 Describe 3 Information Assurance Jobs HW #2 Describe 3 Network Protocols HW #3 Describe 3 (In)Famous Attacks HW #4 Describe 3 Viruses, Worms, Trojans HW #5 Describe 3 Windows, Unix Vulnerabilities HW #6 Describe 3 Novell, Web Vulnerabilities HW #7 Describe 3 Applications of Cryptography HW #8 Summarize 3 Steganography Articles HW #9 Describe 3 Commercial Firewall Products HW #10 Describe 3 Commercial VPN Products HW #11 HW #12

Grading Each Assignment Worth 1.0 Points Homework Assignments Due Week they are Assigned –Special Circumstances: pre-arranged with Instructor –1 Week Late: minus 0.4 point –2 Weeks Late: minus 0.6 point –>2 Weeks Late: minus 1.0 points Criteria –Minor Grammar/Spelling Problems: minus 0.1 points –Minor Formatting Problems: minus 0.1 points –Minor Plagiarism: minus 0.4 points –Major Grammar/Spelling Problems: minus 0.2 points –Major Formatting Problems: minus 0.2 points –Minor Plagiarism: minus 1.0 points

Format Follow Format in Syllabus Title Page Must Contain: –Course Number and Title –Homework Title –Homework Number –Date Due –Student Name Separate Page for Each Major Area List of References (Where did you get this information?)

Ethics Homework Assignments Accomplish a Number of Things: –Research/Read –Think/Evaluate –Writing –Good Job Skills Students Who Merely “Cut and Paste” From the Internet or Textbooks Will Receive a Zero (0) for That Assignment and May Not Be Given the Opportunity to Repeat the Assignment

HW #1 Describe 3 Information Assurance Jobs Use WWW job search engines (monster, dice, computerjobs, hotjobs, etc.) Search on “Information Assurance” or “Network Security” Summarize available jobs in format: –Job title –Responsibilities –Education/Preparation Required –Salary, if available –Exact detailed web page where found Use separate page for each job

HW #2 Describe 3 Network Protocols Use WWW or textbook resources From TCP/IP related protocols we have talked about, describe 3 in more detail (e.g., SMTP, FTP, TFTP, SNMP, Telnet, ARP, DNS, ICMP, etc.) Summarize protocols in format: –Protocol name –History –How it works –Exact detailed web page or textbook citation where found Use separate page for each protocol

HW #3 Describe 3 Attack Methods Use WWW or textbook resources Describe the details of 3 attack methods (e.g., DoS, DDoS, Buffer Overflow, Out-of-Bounds,, Spoofing, etc.) –For example, just within DoS there are: Boink, Bonk, Hanson, Jolt, Land, NewTear, Pong, Puke, Teardrop, Smurf, Winnuke, Ping of Death, etc. – For example, just within Spoofing there are: Ip Address, Sequence Number, Session Hijacking, Man-in-Middle, DNS Poisoning, Redirects, etc. Summarize attack in format: –Attack name –How it works, attack characteristics –Possible Defenses –Exact detailed web page or textbook citation where found Use separate page for each attack

HW #4 Describe 3 Viruses, Worms, Trojans Use WWW or textbook resources Describe the details of 3 viruses, worms or trojans Summarize viruses, worms or trojans in format: –Virus, worm or trojan name –What it does –How it works –Characteristics used to detect –Exact detailed web page or textbook citation where found Use separate page for each virus, worm or trojan

HW #5 Describe 3 Windows, Unix Vulnerabilities Use WWW or textbook resources Describe the details of 3 specific vulnerabilities within any version of Windows or Unix Summarize vulnerabilities in format: –Vulnerability name –What happens –How was it or could it be fixed –Exact detailed web page or textbook citation where found Use separate page for each vulnerability

HW #6 Describe 3 Novell, Web Vulnerabilities Use WWW or textbook resources Describe the details of 3 specific vulnerabilities within Novell Netware or any Web Servers/Browsers Summarize vulnerabilities in format: –Vulnerability name –What happens –How was it or could it be fixed –Exact detailed web page or textbook citation where found Use separate page for each vulnerability

HW #7 Describe 3 Applications of Cryptography Use WWW, magazine, journal or textbook resources Summarize 3 cryptography applications in format: –What is cryptography used for –How is it employed (pictures can be helpful) –Exact detailed web page, magazine, journal or textbook citation where found Use separate page for each application summary

HW #8 Summarize 3 Steganography Articles Use WWW, magazine, journal or textbook resources Summarize 3 steganography articles in format: –Article Title –Exact detailed web page, magazine, journal or textbook citation where found –What does article say Use separate page for each article summary

HW #9 Describe 3 Commercial Firewall Products Use WWW, magazine, journal or textbook resources Describe 3 Firewall products in detail Summarize products in format: –Product name –Who manufactures it –Features –Cost –Exact detailed web page or textbook citation where found Use separate page for each product

HW #10 Describe 3 Commercial VPN Products Use WWW, magazine, journal or textbook resources Describe 3 VPN products in detail Summarize products in format: –Product name –Who manufactures it –Features –Cost –Exact detailed web page or textbook citation where found Use separate page for each product

HW #11

HW #12