Cyber Security, Internet, and Wireless Networks Shigang Chen, Associate Professor Dept of Computer & Information Science & Engineering University of Florida.

Slides:



Advertisements
Similar presentations
Computer and Network Security Mini Lecture by Milica Barjaktarovic.
Advertisements

1 MIS 2000 Class 22 System Security Update: Winter 2015.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
IT security Are you protected against hackers?. Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Wilber R. Rivas Del Rio High School San Felipe Del Rio CISD Dr. Guofei Gu Director of SUCCESS laboratory Secure Communication and Computer Systems Computer.
IS Network and Telecommunications Risks
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1 Securing the Net: Where the Holes Are Steven M. Bellovin AT&T Labs – Research
E-Commerce Security and Fraud Issues and Protections
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
NETWORK COMPONENTS BY CARL JORDAN. CONTENT Switch Hub Gateway Bridge Router Firewall Wireless AP.
Networking Components By: Michael J. Hardrick. HUB  A low cost device that sends data from one computer to all others usually operating on Layer 1 of.
Disaster & Smart City in Aging Society – Designing a secure and resilient smart city Smart City and Resiliency Jirapon Sunkpho College of Innovation Thammasat.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
 What is network?  Types of network ◦ LAN – Local Area - Ethernet ◦ WAN – Wide Area - Internet ◦ MAN – Metro. Area - LAN
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
Securing Information Systems
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
CIS 2200 Kannan Mohan Department of CIS Zicklin School of Business, Baruch College.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Web-based E-commerce Architecture
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Presentation of Master’s thesis Simulation and Analysis of Wireless Mesh Network In Smart Grid / Advanced Metering Infrastructure Philip Huynh.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Standard: Comparison and Security Jason Gibson TCM471 Professor Crum.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Module 11: Designing Security for Network Perimeters.
COLLEGE OF COMMUNICATION AND INFORMATION FLORIDA STATE UNIVERSITY PRESENTED BY THE I.T. LEADERSHIP TEAM: EVAN MILLER JOAQUIN COSTON RICHARD KIRK SHANNON.
Chapter 1: Explore the Network
A Critical Analysis on the Security of IoTs
Yan Chen Dept. of Electrical Engineering and Computer Science Northwestern University Spring Review 2008 Award # : FA Intrusion Detection.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Copyright © 2008 Juniper Networks, Inc. 1 Juniper Networks Access Control Solutions Delivering Comprehensive and Manageable Network Access Control Solutions.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
Smart City Hacked??? Technology & Society. American cities vulnerable to large-scale cyber attack
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Flocks of Robots Coordinated Multi-robot Systems Dylan A. Shell Distributed AI Robotics Lab Department of Computer Science & Engineering Texas A&M University.
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
WIRELESS GATEWAYS FOR HOME USE AND ENTERPRISE USE NOR HANANI BINTI SAHARUDIN TSK 1.
By: Surapheal Belay ITEC 6322 / Spring ABSTRACT NIST , guide to intrusion detection and prevention systems (IDPS), discusses four types of.
Securing Information Systems
Instructor Materials Chapter 1: Explore the Network
CDA6938/COT4932 Special Topic: Research in Computer and Network Security (spring’06) Class Overview.
Instructor Materials Chapter 7 Network Security
Lecture 8. Cyber Security, Ethics and Trust
Chapter 1: Explore the Network
Securing Information Systems
Lab for Internet and Security Technology Yan Chen
Information Security CIS 9002 Kannan Mohan Department of CIS
E-Commerce Security and Fraud Issues and Protections
Chapter 13 Security and Ethical Challenges.
Philip Nichilo Vincent Carestia
Networking for Home and Small Businesses – Chapter 8
Network Traffic and Cybersecurity
Session 26 INST 346 Technologies, Infrastructure and Architecture
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
CYBER SECURITY SPACE OPERATIONS AND RESILIENCY.
Presentation transcript:

Cyber Security, Internet, and Wireless Networks Shigang Chen, Associate Professor Dept of Computer & Information Science & Engineering University of Florida

Cyber Security Cyber Attacks Cyber Attacks Internet worms, Internet worms, Denial of service attacks Denial of service attacks Spamming, Spamming, Network-based intrusions Network-based intrusions Spyware, adware Spyware, adware Research Challenges Research Challenges Malware analysis and defense methods Malware analysis and defense methods Firewall technologies Firewall technologies Intrusion detection and prevention Intrusion detection and prevention

Internet Traffic Measurement Measuring Properties of Internet Traffic Measuring Properties of Internet Traffic Large volume, small SRAM Large volume, small SRAM Measurement in Compact Space Measurement in Compact Space 1 bit per source 1 bit per source Novel Statistical Methods Novel Statistical Methods

Smart Street Network Embed a communication infrastructure in the streets of a city Internet Gateway Real-time data transfer Real-time data transfer Throughput assurance Throughput assurance Multiple service classes Multiple service classes Optimize channel utilization and spatial reuse Optimize channel utilization and spatial reuse Fairness and no starvation Fairness and no starvation Security and Robustness Security and Robustness

Wireless LANs WiFi Anomalies

RFID Automated Warehouse Management