G53SEC 1 Coursework Specification. G53SEC Coursework Option 1: Spam Detection and Categorisation 2.

Slides:



Advertisements
Similar presentations
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Advertisements

Fraud in Short Messaging in Mobile Networks
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
Network Security Philadelphia UniversityAhmad Al-Ghoul Module 11 Exploring Secure Topologies  MModified by :Ahmad Al Ghoul  PPhiladelphia.
G53SEC 1 Revision & Exam Tips G53SEC. 2 Today’s Lecture: Revision Summary + Tips Exam Tips Preliminary Coursework Feedback.
Deep Belief Networks for Spam Filtering
Given Connections Solution
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
IT:Network:Apps.  Security Options  Group Policy  AppLocker  ACL.
Network security Process in which digital information are protected.
Firewalls and the Campus Grid: an Overview Bruce Beckles University of Cambridge Computing Service.
Firewalls. Similar to streaming a Video … Browser Network HTTP Requests Get: image.png HTTP Requests Get: image.png HTTP Requests Get: video.avi HTTP.
Copyright© Microsoft Corporation Speaker:Engagement consultant Title of presentation:Assessment of the Environment Length of presentation: 45 minutes Audience:Customer.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
G53SEC Computer Security Introduction to G53SEC 1.
Prepared By, Mahadir Ahmad. StopBadware makes the Web safer through the prevention, mitigation, and remediation of badware websites. partners include.
Making money from network security David Strom CMP Xchange Emerging Techs October 2002.
Aims and Objectives.
Agenda Review route summarization Cisco acquire Sourcefire Review Final Exam.
Management How hard can it be? Mark Rogers, Enterprise Architecture Team, IP Australia
IT Infrastructure for Business
NETWORKS.
Making a great Project 2 OCR 1994/2360. Analysis This is the key to getting it right. Too many candidates skip through this section. It’s worth 20% of.
Chapter 6 of the Executive Guide manual Technology.
Module 6 Planning and Deploying Messaging Security.
Advanced CIS NAME: ___________________. OBJECTIVE: Maintaining, Managing, and Troubleshooting Systems Maintenance includes following established procedures.
Page 1 Credits to Page 2 what happened What you don’t know CAN hurt you s o p l e a s e t a k e a moment to get to know around the world recently E-Rule:
A Technical Approach to Minimizing Spam Mallory J. Paine.
Introduction University of Sunderland CSEM02 Harry R Erwin, PhD Peter Dunne, PhD.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Communications Introduction Duncan Smeed. Administrivia  Resources  Syllabus  Textbook  Lecture Notes  One-Minute Papers  Tutorials  Practicals.
Network Address Translation Current problems with IP addresses:  Address depletion  Scaling in routing Solutions:  IPv6  CIDR  NAT.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
97% of all is spam 100 billion spam per day Easy to setup spam networks Low cost of operation Millions of dollars worth of time and equipment.
What is Spam? d min.
ICP and the Squid Web Cache Duane Wessels and K. Claffy 산업공학과 조희권.
Etiquette. Spam  spam, also known as junk or unsolicited bulk (UBE), is a subset of electronic spam involving nearly identical.
2 pt 3 pt 4 pt 5pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt 2pt 3 pt 4pt 5 pt 1pt 2pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4pt 5 pt 1pt Internet History Computer Networks.
By:miguel iturrade.  A computer network is a group of computers that are connected to each other for the purpose of communication.
Data Communication and Networks Chapter 5. What’s a Network? a network consists of two or more computers that are connected together to share information.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Spam Detection Kingsley Okeke Nimrat Virk. Everyone hates spams!! Spam s, also known as junk s, are unwanted s sent to numerous recipients.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Collaboration diagrams. Deployment diagrams. Lesson 4.
Lecture 3 Page 1 CS 236 Online Security Mechanisms CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Foundation year Lec.4: Lec.4: Communication Software Internet & Security Lecturer: Dalia Mirghani Year : 2014/2015.
COMPUTER STUDIES Introduction. What is Computer Studies?  Many workplaces today utilise computers competencies  When applying for employment you may.
Peer-to-Peer Solutions Between Service Providers David A. Bryan CTO, Jasomi Networks October 10, 2002 – Fall VON, Atlanta, GA.
Computer Technology Internet, ethics, and . EthicsInternetMisc.Internet
Cosc 5/4765 NAC Network Access Control. What is NAC? The core concept: –Who you are should govern what you’re allowed to do on the network. Authentication.
1.4 wired and wireless networks lesson 1
College Software.
Lecture 6: Cloud Computing
COMPUTER CRIMES Presented by THABO.
How Can We Fix the Username Problem in Gmail?
CNT 4704 Computer Communication Networking (not “analysis”)
Server Concepts Dr. Charles W. Kann.
ICT Communications Lesson 1: Using the Internet and the World Wide Web
practice-questions.html If you Are Thinking about your dumps? Introduction:
Advanced Security Architecture for System Engineers Cisco Dumps Get Full Exam Info From: /cisco-question-answers.html.
Vendor of Solutions and Services Integrates Office 365 in Its Management Solution Partner Logo “Our new version of iQ.Suite makes safe and flexible.
CNT 4704 Analysis of Computer Communication Networks
About us Gmail is a famous service which we use on a daily basis for sending s, getting promotional messages of certain products, receiving.
Internet Engineering Course
Using Topological Mapping to Manage & Secure Large Networks NANOG23: October 23, 2001
Introduction to Course
Presentation transcript:

G53SEC 1 Coursework Specification

G53SEC Coursework Option 1: Spam Detection and Categorisation 2

G53SEC Coursework Option 1: Spam Detection and Categorisation Spam One of the biggest problems for businesses Solutions exist but, 1.Poor performance 2.Need to be regularly maintained It is vital to educate the user! 3

G53SEC Coursework Option 1: Spam Detection and Categorisation What you will get: A dataset with a number of messages ( Available from Monday 20/10) What you have to do: Analyse Categorise Classify Describe everything you have done in a report! 4

G53SEC Coursework Option 1: Spam Detection and Categorisation Coursework worth 20% of your final mark Marking scheme: Correct categorisation5% Correct classification5% Report10% 5

G53SEC Coursework Option 1: Spam Detection and Categorisation References: Software Security Lecture Ross Anderson’s “Security Engineering” SpamAssassin Google Spam.com – not about unsolicited but similarly annoying! 6

G53SEC Coursework Option 2: Network Protection using a Firewall Connectivity is vital for businesses Services need to be provided for: Customers Partners Numerous security “solutions” exist Firewall – One of oldest techniques Yet still the most widely used 7

G53SEC Coursework Option 2: Network Protection using a Firewall What you will get: A set of network components A set of requirements and restrictions What you have to do: Design a network topology Don’t violate restrictions Satisfy all requirements Describe everything you have done in a report! 8

G53SEC Coursework Option 2: Network Protection using a Firewall Firewall rules: Use the following form: 9 ActionProtocolSourceDestSrc.PortDest.Port AccepttcpNet.xNet.yAny22 DenyudpHost.MHost.N

G53SEC Coursework Option 2: Network Protection using a Firewall Coursework worth 20% of your final mark Marking scheme: Correct network topology5% Correct firewall deployment5% Correct firewall rules5% Report5% 10

G53SEC Coursework Option 2: Network Protection using a Firewall Resources: Network Security Lecture Lot of resources on the net (e.g. Wikipedia) 11

G53SEC End 12