CSE 331 CSE 331: Introduction to Networks and Security Fall 2001 Instructor: Carl A. Gunter Slide Set 1.

Slides:



Advertisements
Similar presentations
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Course Introduction.
Advertisements

Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
CIS/TCOM 551 Computer and Network Security Slide Set 1 Carl A. Gunter Spring 2004.
CAS CS 558 Network Security. Administrativia 6/14/2015Gene Itkis, CS558: Computer Network Security3 General info Instructor: Gene Itkis itkis+cs558 cs.bu.eduitkis+cs558.
CSE331: Introduction to Networks and Security Lecture 15 Fall 2002.
Carnegie Mellon Communications, Organizations & Technology Course Organization Syllabus Prithvi N. Rao H. John Heinz III School of Public Policy.
E-commerce Introduction. What is E-commerce? The use of the Internet and WWW to transact business? The use of the Internet and WWW to transact business?
A Network Security Overview Thomas Kernes November 1, 2000.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Telecommunication and Networks
Data Communication and Networks Lecture 0 Administrivia September 7, 2006.
CSCD 330 Network Programming Winter 2012 Lecture 1 - Course Details.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
2° cycle degree programme (lm) in Telecommunications Engineering Principles Models and Applications for Distributed Systems Prof. Maurelio Boari
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Sarah Breton CSC December 13, Societal Topics Weeks 7 & 8  Internet Regulation : Internet regulation is restricting specific aspects of.
A First Course in Information Security
Cryptography and Network Security
Information Security Principles (ESGD4222)
Introduction to Information Security J. H. Wang Sep. 15, 2014.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Applied Security Breno de Medeiros Florida State University Fall 2005.
Network Security CS nd Term Course Syllabus Cairo University Faculty of Computers and Information.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Advanced Internet Services Henning Schulzrinne Dept. of Computer Science Columbia University Fall 2003.
Contact Information Cryptography 8/10/2015 | pag. 2 Professor Assistant Office Webpage Course Text Ann Dooms Adriaan Barri
@Yuan Xue CS 285 Network Security Fall 2008.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
CSCD 330 Network Programming Fall/Winter/Spring 2014 Lecture 1 - Course Details.
SKU3033 / SKF3033 NETWORK & SYSTEM ADMINISTRATOR.
University of Palestine Faculty of Applied Engineering and Urban Planning Software Engineering Department INTRODUCTION TO COMPUTER NETWORKS Dr. Abdelhamid.
Introduction 1-1 Lecture 1 University of Nevada – Reno Computer Science & Engineering Department Fall 2015 CPE 400 / 600 Computer Communication Networks.
Introduction to Information Security J. H. Wang Sep. 10, 2013.
 Introduction – Consumer Market  Benefits – Operational Cost & Flexibility  Challenges – Quality of Service & Securing VOIP  Legal Issuers  Risk.
Welcome! CSI 4118: Computer Networks and Protocols (3,0,0) Professor: Dr. Robert L. Probert Office: SITE 5098 Phone: x6709
EMIS 7300 Course Policies Updated 17 August 2006.
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
Computer Science, FSU1 CNT5505 DATA/COMUTER COMMUNICATIONS FALL 2008 Time: 3:35AM-4:50AM, MW Location: Love 103 Fall 2008, 3 credits.
Scott CH Huang COM 5336 Cryptography Lecture 0 Scott CH Huang COM 5336 Cryptography Lecture 0 Some Admin.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
Lecture Topics: 12/06 SSL Final Exam HW 7 & 8 Important concepts in 410 Other references Evaluations.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
© 2003 Prentice Hall, Inc.4-1 Chapter 4 Telecommunications and the Internet Information Systems Today Leonard Jessup & Joseph Valacich.
CSCD 330 Network Programming Winter 2015 Lecture 1 - Course Details.
1 CDA 4527 Computer Communication Networking (not “analysis”) Prof. Cliff Zou School of Electrical Engineering and Computer Science University of Central.
CCM 4300 Lecture 1 Computer Networks: Wireless and Mobile Communication Systems Dr E. Ever School of Engineering and Information Sciences CCM4300_Autumn.
Mohammad Alauthman 1/22/20162 This 3-credit first course for computer science & IT majors, which provides students the basic understanding.
Computer Science, FSU1 CNT5505 DATA/COMUTER COMMUNICATIONS Fall 2010.
ECE 374: Computer Networks & Internet Introduction Spring 2015 Prof. Michael Zink.
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
ECE 374: Computer Networks & Internet Introduction Spring 2012 Prof. Michael Zink.
Network Security and Cryptography
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
E-Commerce & Bank Security By: Mark Reed COSC 480.
@Yuan Xue CS 285 Network Security Fall 2013 Yuan Xue.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-1 Overview and Introduction.
CSE 331: Introduction to Networks and Security
Cryptography and Network Security
CNT 4704 Computer Communication Networking (not “analysis”)
Data Communication Muhammad Waseem Iqbal Assistant Professor
Computer Data Security & Privacy
CAS CS 558 Network Security.
Introduction to the course
CSCD 330 Network Programming Spring
Introduction to Course
Overview and Introduction (Lecture Contents Summary)
Presentation transcript:

CSE 331 CSE 331: Introduction to Networks and Security Fall 2001 Instructor: Carl A. Gunter Slide Set 1

Personnel l Carl A. Gunter - Lecturer   Office hour: 3:30 to 4:30 in 370 Moore GRW. l Marc Corliss    Office hours: 1-2 Tuesday, 4-5 Thursday, location TBD. l Class web page 

Course Pre-Requisites l You would like to understand network and security fundamentals. l You have knowledge of Java programming. You like programming and want to know how to build secure networked systems. l You did not take TCOM 500 and you are not registered for it now. l If you complete TCOM 500, I look forward to seeing you in CIS/TCOM 551 this spring.

Assessment l Meet the Prof. l Exams. l Projects.

Meet The Prof Requirement l You must come and see the professor during at least one of his office hours before the second exam. l What to talk about: describe a computer-related project you did, are doing now, or plan to do. l How long? About minutes.

Exams l Two in-class midterm exams.  Wednesday October 10 from 11:00 to 11:50.  Wednesday November 7 from 11:00 to 11:50 l A 120 minute final exam.  As determined by registrar.

Projects l Assorted programming and essay projects.  Early project: packet analysis. l Some projects will allow teams. l Important rule: team members cannot be “reused”. l It will be wise to know your classmates!

Make-Up Lecture l There will be an extra lecture on Wednesday, December 12. Material in this lecture will not be covered by exams or projects.

Recommended Reading l Computer Networks, A Systems Approach. Second Edition. Larry L. Peterson and Bruce S. Davie. Morgan Kaufmann l Handbook of Applied Cryptography. Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. CRC l Secure Electronic Commerce. Warwick Ford and Michael S. Baum. Prentice Hall l Network Security Essentials: Applications and Standards. William Stallings. Prentice Hall 2000.

Reading for Fun and Profit l Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage. Clifford Stoll. Pocket Books l Crypto : How the Code Rebels Beat the Government -- Saving Privacy in the Digital Age. Steven Levy. Viking Press l Cryptonomicon. Neal Stephenson. Harperperennial Library 2000.

History of Cryptology l The Codebreakers; The Comprehensive History of Secret Communication from Ancient Times to the Internet. David Kahn. Scribner l The Code Book : The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Simon Singh. Anchor Books 2000.

What is a Network? l Dictionary definition: A group or system of electric components and connecting circuitry designed to function in a specific manner.

Mainframe and terminals

Telephone network

Video cable network

The Four Major Networks l Telephone l Television l Radio l Internet

Computer networks l Computer networks are built mainly from general-purpose programmable hardware. l They support an extensible class of applications. l We will focus on networks consisting of  hosts, which provide programmability,  physical networks, which support direct communication, and  network elements, which support communication between networks

Computer network

Applications l Electronic mail l File transfer and remote terminals l World-wide web (WWW) l Telephony (IP and POTS) l Document facsimile (FAX) l Network video (NV)

What Is Security? l Dictionary definition: protection or defense against attack, interference, espionage, etc.

System Vs. Environment (Safety) Environment System

System Vs. Environment (Security) System Environment

Goals of Security DATA Integrity DATA Availability DATA Confidentiality

Access Matrix Principals Objects RR/W0R R/W0RR R00R/W 0RR/WR/W ABCD Fred Joe Bow-Yaw Sarah

Denial of Service Principals Objects RR/W0R R/W0RR R00R/W 0RR/WR/W ABCD Fred Joe Bow-Yaw Sarah 0

Breach of Confidentiality Principals Objects RR/W0R R/W0RR R00R/W 0RR/WR/W ABCD Fred Joe Bow-Yaw Sarah R

Breach of Integrity Principals Objects RR/W0R R/W0RR R00R/W 0RR/WR/W ABCD Fred Joe Bow-Yaw Sarah W

Overlapping Goals Availability IntegrityConfidentiality Loss of Confidence Difficulty of use and poor performance Ability to Corrupt

Networks and Security l Early views of computer security were mainly motivated by time sharing.  Protect a user’s files and processes. l Security concerns extended to electronic commerce with EDI (Electronic Data Interchange) over VANs (Value Added Networks).  Proper transaction processing. l Concerns are now focused on security over the public Internet and wireless devices.

Internet Security Concerns l Confidentiality of transmitted data, such as passwords and credit card numbers. l Integrity of network information, such as routing tables and DNS bindings. l Authentication of users who have contact only via the Internet. l Thwarting Denial of Service (DoS) attacks. l Aiding security of host systems using firewalls, etc.

Aim of This Course l Teach networking basics, mainly as they are relevant to security. (Reduced emphasis on performance.) l Teach security basics, mainly as they apply to the Internet.