Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2015.

Slides:



Advertisements
Similar presentations
Chapter 1  Introduction 1 Chapter 1: Introduction.
Advertisements

Kevin Workman CSC /04/12. Week 7 and 8 Internet regulation is basically restricting access to certain information. Examples of Internet regulation.
Slide 01-1COMP 7370, Auburn University COMP 7370 Advanced Computer and Network Security Dr. Xiao Qin Auburn University
“Encryption’s Vital Role in Safeguarding the Digital Economy” Professor Peter Swire Ohio State University ASSOCHAM International Conference Safeguarding.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
Computers and Society Lecture 1: administrative details and an introduction to the class Professor: Evan Korth New York University.
Foundations of Network and Computer Security J J ohn Black Lecture #27 Dec 9 th 2004 CSCI 6268/TLEN 5831, Fall 2004.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
Foundations of Network and Computer Security J J ohn Black Lecture #37 Dec 14 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL Adrian Ilie COMP 14 Introduction to Programming Adrian Ilie Summer Session II, 2005 MTWRF 9:45-11:15 am.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5831, Fall 2004.
Foundations of Network and Computer Security J J ohn Black Lecture #2 Aug 26 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Foundations of Network and Computer Security J J ohn Black Lecture #22 Oct 21 st 2009 CSCI 6268/TLEN 5550, Fall 2009.
Chapter 21 E-Policy The debate rages. Cryptography Policy What do you think about: Who controls the keys? Public opinion with government IT, civil liberty.
Foundations of Network and Computer Security J J ohn Black Lecture #27 Dec 8 th 2005 CSCI 6268/TLEN 5831, Fall 2005.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5831, Fall 2007.
Privacy-Aware Computing Introduction. Outline  Brief introduction Motivating applications Major research issues  Tentative schedule  Reading assignments.
Lecture 2.2: Private Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Wenyuan Xu Department of Computer Science and Engineering University of South.
CSCD 330 Network Programming Winter 2012 Lecture 1 - Course Details.
ECS15: Introduction to Computers Fall 2013 Patrice Koehl
Ethical Issues with Cryptography Regulation  Assistance to law enforcement AND  Threats to privacy  Unfair search of property  Obstruction of free.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2013.
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
Authentication Question: how does a receiver know that remote communicating entity is who it is claimed to be?
BIT 115: Introduction To Programming1 Sit in front of a computer Log in –Username: 230class –password: –domain: student Bring up the course web.
Networked Systems Practicum Lecture 1 – Introduction 1.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
CS 346U Exploring Complexity in Science and Technology Instructor: Melanie Mitchell Textbook: M. Mitchell, Complexity: A Guided Tour (Oxford University.
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
1 Cpt_S 260: Lecture 1: Introduction This week’s topics:  logistics  information technology trends (new applications)  why computer architecture? 
Steve Wicker Cornell University 1 TRUST Autumn 2011 Conference.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
Database Design and Implementation ITCS6160 & ITCS 8160 Instructor: Jianping Fan Webpage:
CSCD 330 Network Programming Fall/Winter/Spring 2014 Lecture 1 - Course Details.
Lecture 17 Page 1 CS 236 Online Network Privacy Mostly issues of preserving privacy of data flowing through network Start with encryption –With good encryption,
Final Review. The exam Two double-sided letter size cheating sheets allowed Closed book, closed note McMaster calculator allowed Types of questions: –
Chapter 1  Introduction 1 Chapter 1: Introduction.
Government, Cryptography and the Right To Privacy Jenny Shearer and Peter Gutmann Presented by Paul Conti 4/3/00.
Fall 2o12 – August 27, CMPSC 202 First Day Handouts  Syllabus  Student Info  Fill out, include all classes and standard appointments  Return.
CS 858 – Hot Topics in Computer and Communications Security Winter 2009 Introduction.
Lecture Section 001 Spring 2008 Mike O’Dell CSE 1301 Computer Literacy.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
1 CAP6133: Advanced Topics in Computer Security and Computer Forensics (spring’08) Class Overview Dr. Cliff Zou.
1 Technologies for Electronic Commerce and EBusiness Walt Scacchi, Ph.D. FEMBA 290 Winter 2003.
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
Chapter 3 Encryption Algorithms & Systems (Part D)
Introduction to Information Security J. H. Wang Sep. 18, 2012.
CSCD 330 Network Programming Winter 2015 Lecture 1 - Course Details.
Lecture 5 Page 1 CS 236 Online Key Management Choosing long, random keys doesn’t do you any good if your clerk is selling them for $10 a pop at the back.
ECE 374: Computer Networks & Internet Introduction Spring 2015 Prof. Michael Zink.
CSCD 303 Essential Computer Security Lecture 1 - Course Details.
ECE 374: Computer Networks & Internet Introduction Spring 2012 Prof. Michael Zink.
MIS 4850 Systems Security Abdou Illia, Ph.D School of Business Eastern Illinois University (Monday 1/11/2016)
COEN 350 Network Security Introduction. Computer Networks OSI Reference Model Application Layer Presentation Layer Session Layer Transport Layer Network.
Course Overview 1 MAT 279 Data Communication and the Internet Prof. Shamik Sengupta Office 4210 N
Economics 175 American Economic History
Introduction to CSCI 1311 Dr. Mark C. Lewis
PowerPoint® Slides to Accompany
PowerPoint® Slides to Accompany
Foundations of Network and Computer Security
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
PowerPoint® Slides to Accompany
2012 session 1 TELE3118: Network Technologies Week 13 Review
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
Presentation transcript:

Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2015

Introduction UC Davis –PhD in 2000 –Cryptography –Interested in broader security as well UNR two years CU Boulder 13 years My teaching style

This Class Use above for all materials –Available from my home page This is a CAETE course –Several distance-learning students –Lectures available on the web students/online-course-accesshttp://engineeringanywhere.colorado.edu/current- students/online-course-access

Logistics MWF, ECCS 1B12, 2:30pm – 3:45pm Final, Not sure! I’ll figure this out before May Office Hours –ECOT 627, M 11-11:50am; W 11:00-11:50am (better than dropping by without an appt)

Grading See course info sheet –Grading: 4-5 quizzes (20%), a project (20%), a midterm (25%) and a final (35%) Course Topics –Why no book? –Cryptography and Network Security Quite a blend of math, hacking, and thinking

Topics Policy, Law, History –A Taste Today Cryptography –Not how to make it, but how to use it Hacking –Buffer overruns, WEP attack, TCP session hijacking, DDoS, prevention –Some hands-on using OpenSSL (project)

Miscellany Class Format: Informal –Small class –Ask questions! Slides –Sometimes available in advance

History Early days of Cryptography Lucifer and DES Export restrictions –40 bit keys! Public Key Cryptography –MI6 had it first?! Differential cryptanalysis –NSA knew first

Who is the NSA? National Security Agency –Huge –Fort Meade, MD –More mathematicians than anywhere else –Classified budget

Does the US Spy on its Citizens? Yes.

Recently, This Guy Snowden emerged as the most recent whistleblower in May 2013

Reaction UK Defense and US Army facilities block access to reports on these disclosures –Remind you of anything? Obama says, “Trust us” –He is a former constitutional and civil rights attorney

Laws DMCA –Felten RIAA/SDMI case most famous 2001 SDMI challenge –Many believe it’s the right idea, but a bad law –All reverse-engineering is sketchy CALEA (1994) –Communications Assistance for Law Enforcement Act –2004 ruling says VoIP must provide compliance Has withstood all court challenges Patriot Act

Policy Government has attempted to control encryption before –Skipjack –Key Escrow –Clipper Chip Ultimately failed due to massive protest from “privacy advocates” –Electronic Frontier Foundation (John Gilmore)

What about Other Snooping? Lotss of ways to track you –Cookies, IP address, Facebook, cameras, license plates, cell phones, POS data (Target story), satellites, DNA

How Much Should We Care? The younger you are, the less you tend to care Why?

Misc Commercial ventures