Introduction University of Sunderland CSEM02 Harry R Erwin, PhD Peter Dunne, PhD.

Slides:



Advertisements
Similar presentations
Web Applications Development
Advertisements

Refreshing institutional policies around academic integrity: a focus on student training Dr Neil Morris Faculty of Biological Sciences.
COMP 5138 Relational Database Management Systems Sem2, 2007 Lecture 0 Course Overview.
Chapter 1  Introduction 1 Chapter 1: Introduction.
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Course Introduction.
Computer Security 1 [COMPGA01] Nicolas T. Courtois - University College London.
Some general principles in computer security Tomasz Bilski Chair of Control, Robotics and Computer Science Poznań University.
1 MM2711 Introduction to Marketing. 2 Teaching Staff LECTURER & SEMINAR LEADERCONSULTATION HOURS LEUNG Chi-hongTue: 14:30 – 16:30 Room: M912Thu: 13:30.
How to Prepare for the Fall Exam COM380/CIT304 Harry Erwin, PhD University of Sunderland.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Creation of Policies, Part.
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
Overview CSE 465 Information Assurance
Winter 2008Logistics1 Advanced Computer Networks Prof. Venus W. Samawi Welcome to Time: 2pm –5pm Tuesday Winter credits.
Academic Support for International Students in the Department of Psychology at the University of York Presented by: Kim Manderson, International Student.
Multidisciplinary Research Methods Training Professor Linda A Lawton Graduate School Leader & Director of PgCert Research Methods.
Teaching Security via Problem- based Learning Scenarios Chris Beaumont Senior Lecturer Learning Technology Research Group Liverpool Hope University College.
A First Course in Information Security
G53SEC Computer Security Introduction to G53SEC 1.
Intelligent Systems Programming COMM2M Harry R. Erwin, PhD University of Sunderland.
Computer Networks Paper Coordinator: Dr. Napoleon H. Reyes, Ph.D. Computer Science Institute of Information and Mathematical Sciences Rm
Introduction to COM379 COM379 University of Sunderland Harry R Erwin, PhD.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Chapter 1: Introduction to Project Management
© Yilmaz “Agent-Directed Simulation – Course Outline” 1 Course Outline Dr. Levent Yilmaz M&SNet: Auburn M&S Laboratory Computer Science &
Chapter 2 – Software Processes Lecture 1 1Chapter 2 Software Processes.
CSCE 727 Information Warfare
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
WXGE 6103 Digital Image Processing Semester 2, Session 2013/2014.
1 ECE 156 Computer Network Architecture Professor Krish Chakrabarty Department of Electrical and Computer Engineering Fall 2006.
Introduction University of Sunderland CIT304 Harry R Erwin, PhD.
Introduction to CSE301 CSE301 University of Sunderland Harry R Erwin, PhD.
SKU3033 / SKF3033 NETWORK & SYSTEM ADMINISTRATOR.
The Balance Between Theoretical and Practical Work Within Electrical and Computer Engineering Courses Dr. Bahawodin Baha March Development Partnerships.
Unit 1 University of Sunderland CSEM04 ROSCO Unit 1: Introduction to the module & its mode of operation CSEM04: Risk and Opportunities of Systems Change.
CIS 3360: Security in Computing Cliff Zou Spring 2012.
Intrusion Detection CSEM02 University of Sunderland Harry R. Erwin, PhD.
CS255 Communication Skills Aidan Mooney
SCHILLER INTERNATIONAL UNIVERSITY
Welcome! CSI 4118: Computer Networks and Protocols (3,0,0) Professor: Dr. Robert L. Probert Office: SITE 5098 Phone: x6709
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
Internet and Intranet Fundamentals William R. Mussatto.
CCM 4300 Lecture 1 Computer Networks: Wireless and Mobile Communication Systems Dr E. Ever School of Engineering and Information Sciences CCM4300_Autumn.
Dr. Jeff Cummings MIS323 Business Telecommunications.
Lecture 1 Page 1 CS 236 Online Introduction CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
1 NES554: Computer Networks Defense Course Overview.
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
Introduction to Web Technologies Module Introduction to Web Technologies – CS th January 2005 Dr Bogdan L. Vrusias
The Challenges of Teaching an Interdisciplinary IA Course Rose Shumba Indiana University of Pennsylvania EPASEC 2006.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
CET4884 Dr. Nabeel Yousef.  Dr. Nabeel Yousef  Located at the ATC campus room 107Q  Phone number 
Computer Engineering Department Islamic University of Gaza
Software Engineering (1)
CS101 Computer Programming I
COMP9024: Data Structures and Algorithms
Purpose of Class To prepare students for research and advanced work in security topics To familiarize students working in other networking areas with important.
CSE-C3400 Information security
DT249/4 Information Systems Engineering Lecture 0
Introduction to the course
Introduction to Computer Security II
T Information Security Technology
Presentation transcript:

Introduction University of Sunderland CSEM02 Harry R Erwin, PhD Peter Dunne, PhD

Purpose The purpose of CSEM02 is to prepare a post-graduate student for an entry-level network security position. We concentrate on the skills needed to do staff analyses of security requirements.

Responsibility Dr. Harry Erwin is the Module Leader for CSEM02 at the University of Sunderland. Dr. Peter Dunne is the co-Module Leader. Dr. Erwin has 35 years of experience as a software systems engineer and security engineer (mostly at TRW) for high-reliability systems. He supervises final year/MSc projects and PhD research in intelligent systems, security, and software engineering. or

Responsibility (II) Dr. Dunne has expertise in numerical analysis and software engineering, a background in cryptography, and is the programme leader for a number of MSc programmes.

Objectives To develop a critical awareness of the current state of information system security: –Threats –Legal policies –Security technology –Security architectures

Learning Outcomes Knowledge –An understanding of the processes of security engineering, including risk analysis, requirements analysis and trust analysis. –An awareness of the tradeoffs involved in producing a security solution and architecture definition. –An understanding of the technologies available to implement a proposed security solution. –An awareness of developments in security technology. Abilities –Produce security solutions for particular situations. –Implement simple security solutions for small networks.

Indicative Content 1.Security engineering processes - risk, trust and security analysis. 2.Security policies. 3.Legal context. 4.Security objectives and mechanisms. 5.Symmetric and asymmetric cryptography. 6.Access control, authentication and audit mechanisms. 7.Secure programming techniques. 8.Firewalls and intrusion detection systems. 9.Security testing. 10.Incident response.

Outline 24 Lectures 12 Tutorials 12 Practical sessions Students will do individual presentations (30%). One group project (30%, not programming). We use problem-based learning (PBL). A comprehensive take-home assessment (40%). We can use for communication, discussions, and submitting coursework.

Administrivia The module handbook is posted here: M02HandbookMB.html M02HandbookMB.html and is also posted here: g4.sunderland.ac.uk/~harryerw/CSEM02Ha ndbookMB.htmlhttp://scat-he- g4.sunderland.ac.uk/~harryerw/CSEM02Ha ndbookMB.html We may use WebCT to communicate:

Textbooks Key text that students must buy: –Matt Bishop, 2003, Computer Security: Art and Science, Addison-Wesley, ISBN: Reference text that students must be able to access readily: –Simson Garfinkel, Gene Spafford and Alan Schwartz, 2003, Practical Unix and Internet Security, 3rd Edition, O`Reilly, ISBN:

Support Texts Other texts you should know where to find: –B. Schneier, 2000, Secrets and Lies, Wiley. –P. Neumann, 1995, Computer-Related Risks, Addison- Wesley. –Anderson, 2001, Security Engineering, Wiley, ISBN: (Available free electronically) –Rescorla, E., 2001, SSL and TLS, Pearson Education. –Amoroso, 1999, Intrusion Detection, Intrusion.net. –Barrett and Silverman, 2001, SSH, the Secure Shell, O’Reilly. –Niels Ferguson, Bruce Schneier, 2003, Practical Cryptography, Wiley. –Scott Oakes, 2001, Java Security, 2nd Edition, O`Reilly

Material Covered Probabilistic Risk Analysis Trust Analysis (Sloman and Grandison) Legal Issues and Policies The Security Analysis Process Chapter 1, Overview Chapter 2, Access Control Chapter 3, Foundations Chapter 4, Security Policies

Material Covered Chapter 9, Basic Cryptography Chapter 10, Key Management Chapter 11, Cipher Techniques Chapter 13, Design Principles Chapter 14, Identity Chapter 15, Access Control (optional) Chapter 18, Assurance

Material Covered Chapter 23, Vulnerability Analysis (optional) Chapter 24, Auditing Chapter 25, Intrusion Detection Chapter 26, Network Security Chapter 27, System Security Chapter 28, User Security (optional) Chapter 29, Program Security (optional) Java Security

Lectures and Tutorials We are planning on about minute lectures. Be here on time, please. There will be breaks. We are planning tutorials and discussion sessions in DGIC-220.

Course Marking Everything is coursework. Coursework mark must be at least 40% for you to pass. Written assignments may be submitted in essay or report format. Referencing your sources is required. During marking, assignments will be compared to determine if there is evidence for collaboration or cheating.

Questions?