CSE 331 CSE 331: Introduction to Networks and Security Fall 2001 Instructor: Carl A. Gunter Slide Set 1
Personnel l Carl A. Gunter - Lecturer Office hour: 3:30 to 4:30 in 370 Moore GRW. l Marc Corliss Office hours: 1-2 Tuesday, 4-5 Thursday, location TBD. l Class web page
Course Pre-Requisites l You would like to understand network and security fundamentals. l You have knowledge of Java programming. You like programming and want to know how to build secure networked systems. l You did not take TCOM 500 and you are not registered for it now. l If you complete TCOM 500, I look forward to seeing you in CIS/TCOM 551 this spring.
Assessment l Meet the Prof. l Exams. l Projects.
Meet The Prof Requirement l You must come and see the professor during at least one of his office hours before the second exam. l What to talk about: describe a computer-related project you did, are doing now, or plan to do. l How long? About minutes.
Exams l Two in-class midterm exams. Wednesday October 10 from 11:00 to 11:50. Wednesday November 7 from 11:00 to 11:50 l A 120 minute final exam. As determined by registrar.
Projects l Assorted programming and essay projects. Early project: packet analysis. l Some projects will allow teams. l Important rule: team members cannot be “reused”. l It will be wise to know your classmates!
Make-Up Lecture l There will be an extra lecture on Wednesday, December 12. Material in this lecture will not be covered by exams or projects.
Recommended Reading l Computer Networks, A Systems Approach. Second Edition. Larry L. Peterson and Bruce S. Davie. Morgan Kaufmann l Handbook of Applied Cryptography. Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. CRC l Secure Electronic Commerce. Warwick Ford and Michael S. Baum. Prentice Hall l Network Security Essentials: Applications and Standards. William Stallings. Prentice Hall 2000.
Reading for Fun and Profit l Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage. Clifford Stoll. Pocket Books l Crypto : How the Code Rebels Beat the Government -- Saving Privacy in the Digital Age. Steven Levy. Viking Press l Cryptonomicon. Neal Stephenson. Harperperennial Library 2000.
History of Cryptology l The Codebreakers; The Comprehensive History of Secret Communication from Ancient Times to the Internet. David Kahn. Scribner l The Code Book : The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Simon Singh. Anchor Books 2000.
What is a Network? l Dictionary definition: A group or system of electric components and connecting circuitry designed to function in a specific manner.
Mainframe and terminals
Telephone network
Video cable network
The Four Major Networks l Telephone l Television l Radio l Internet
Computer networks l Computer networks are built mainly from general-purpose programmable hardware. l They support an extensible class of applications. l We will focus on networks consisting of hosts, which provide programmability, physical networks, which support direct communication, and network elements, which support communication between networks
Computer network
Applications l Electronic mail l File transfer and remote terminals l World-wide web (WWW) l Telephony (IP and POTS) l Document facsimile (FAX) l Network video (NV)
What Is Security? l Dictionary definition: protection or defense against attack, interference, espionage, etc.
System Vs. Environment (Safety) Environment System
System Vs. Environment (Security) System Environment
Goals of Security DATA Integrity DATA Availability DATA Confidentiality
Access Matrix Principals Objects RR/W0R R/W0RR R00R/W 0RR/WR/W ABCD Fred Joe Bow-Yaw Sarah
Denial of Service Principals Objects RR/W0R R/W0RR R00R/W 0RR/WR/W ABCD Fred Joe Bow-Yaw Sarah 0
Breach of Confidentiality Principals Objects RR/W0R R/W0RR R00R/W 0RR/WR/W ABCD Fred Joe Bow-Yaw Sarah R
Breach of Integrity Principals Objects RR/W0R R/W0RR R00R/W 0RR/WR/W ABCD Fred Joe Bow-Yaw Sarah W
Overlapping Goals Availability IntegrityConfidentiality Loss of Confidence Difficulty of use and poor performance Ability to Corrupt
Networks and Security l Early views of computer security were mainly motivated by time sharing. Protect a user’s files and processes. l Security concerns extended to electronic commerce with EDI (Electronic Data Interchange) over VANs (Value Added Networks). Proper transaction processing. l Concerns are now focused on security over the public Internet and wireless devices.
Internet Security Concerns l Confidentiality of transmitted data, such as passwords and credit card numbers. l Integrity of network information, such as routing tables and DNS bindings. l Authentication of users who have contact only via the Internet. l Thwarting Denial of Service (DoS) attacks. l Aiding security of host systems using firewalls, etc.
Aim of This Course l Teach networking basics, mainly as they are relevant to security. (Reduced emphasis on performance.) l Teach security basics, mainly as they apply to the Internet.