1 Introduction and Definitions. 2 Purpose of the Course This course is designed to provide students with hands on experience on identifying places where.

Slides:



Advertisements
Similar presentations
Chapter 1 We’ve Got Problems…. Four Horsemen  … of the electronic apocalypse  Spam --- unsolicited bulk o Over 70% of traffic  Bugs ---
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Introduction to Information Operations Attaché Corps- SEP 09
© 2006, Monash University, Australia CSE468 Information Conflict Lecturer: Dr Carlo Kopp, MIEEE, MAIAA, PEng Lecture 01 Introduction and Overview.
Honeypot 서울과학기술대학교 Jeilyn Molina Honeypot is the software or set of computers that are intended to attract attackers, pretending to be weak.
Clausewitz VS Sun Tzu Nasim Ibrahim i Clausewitz and Sun Tzu -Prussia and China vs 2000 years ago - war is the main concept for both of them.
Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances.
Information Warfare - 11 Introduction and Preparing for Attacks.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.
Hands-On Ethical Hacking and Network Defense
Chapter 1 – Introduction
Information Warfare - 11 Introduction and Preparing for Attacks.
1 Air and Space Power Defined. 2 Overview  Define Air and Space Power  Competencies  Functions of Air and Space Power  Air and Space Doctrine  Principles.
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
Introduction IACT 924 Corporate Network Design and Implementation.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Course Introduction (Lecture #1) ENGR 107 – Intro to Engineering The slides included herein were taken from the materials accompanying Engineering Fundamentals.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
A Discussion of the Insider Threat Jason Franklin Inside Outside.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Sam Cook April 18, Overview What is penetration testing? Performing a penetration test Styles of penetration testing Tools of the trade.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
CSE Graphical User Interface Design & Implementation Jason Murphy Lecture 1 - Introduction.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
EECS 354 Network Security Introduction. Why Learn To Hack Understanding how to break into computer systems allows you to better defend them Learn how.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Your role in supporting and influencing corporate strategy 13 May 2008 Presented by John DiNatale.
STRATEGY “IT’S NOT ROCKET SCIENCE OR BRAIN SURGERY” How to make sense of a personal topic! Bill Tschirhart – True North Coaching.
CSCE 727 Information Warfare
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.
AASSA Conference 2012 Quito, Ecuador March 16 th 2012 All the rights reserved.Instructor: Francisco Bolaños, Ing. InterAmerican Academy Ethical Hacking.
Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”
JMU GenCyber Boot Camp Summer, Welcome Cyber Defense Boot camp for High School Teachers Cyber Defense Lab (ISAT/CS Room 140) Department of Computer.
Understanding the Threats of and Defenses Against Cyber Warfare.
1 Tactics and Penetration Testing. Overview Tactics: A procedure or set of maneuvers engaged in to achieve an end, an aim, or a goal. Tactics Penetration.
SecSDLC Chapter 2.
Defense Policy Making You may not be interested in war, but war is interested in you.
Gra 6820 Strategic Choice Syllabus Fall Objective To provide a comprehensive perspective –the theory and art of strategic decision-making Perspective.
Joint Electromagnetic Spectrum Operations (JEMSO)
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
1 NES554: Computer Networks Defense Course Overview.
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
Risk Assessments in Many Flavors George J. Dolicker, CISA, CISSP.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
CET4884 Dr. Nabeel Yousef.  Dr. Nabeel Yousef  Located at the ATC campus room 107Q  Phone number 
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Security Management in Practice
Topic 5 Penetration Testing 滲透測試
Seminar On Ethical Hacking Submitted To: Submitted By:
Purpose of Class To prepare students for research and advanced work in security topics To familiarize students working in other networking areas with important.
Data & Network Security
COSC 316: Host Computer Security
CMGT 441 Competitive Success-- snaptutorial.com
CMGT 579 Innovative Education--snaptutorial.com
BIS 320 NERD Education Your Life--
CMGT 441 Education for Service-- snaptutorial.com
BIS 320 NERD Perfect Education/ bis320nerd.com.
CMGT 441 Teaching Effectively-- snaptutorial.com
CMGT 441 Education for Service-- tutorialrank.com
CMGT 441 Inspiring Innovation-- snaptutorial.com
PROACTIVE SNOOPING ANALYSIS
Curriculum Coordinator: Marela Fiacco Date : February 29, 2015
CMGT 433 RANK Dreams Come True / cmgt433rank.com.
MGT 498 TUTORIAL Dreams Come True / mgt498tutorial.com.
A Model For Network Security
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

1 Introduction and Definitions

2 Purpose of the Course This course is designed to provide students with hands on experience on identifying places where the security of their networks can be improved. –The techniques used to evaluate the network will vary. –Programming will not be required for the course

3 Texts Resources on Course Syllabus Know Your Enemy, Second Edition Honeynet Project (Enemy) The Art of War, Sun Tzu (Griffith Translation), or use text from Internet: (Sun)

4 Grading 15% (each) four graded homeworks 40% Final Paper (Topic related to course content, Submit paragraph-length proposal ASAP) Joint work to understand allowed Work for submission is to be individual unless otherwise specified or approved

Homework and Warnings No Plagiarism Virtual Machines No hacking outside of VMs Legal Penalties Authorization 5

6 Why Defensive Hacking? Hackers won’t play fair Demonstrating vulnerability Prioritizing remediation

Tactical and Strategic Tactical: Working to hack specifically identified hosts and services to improve security Strategic: Working to improve network operations to support mission in face of persistent and resourced attacks 7

8 Information Warfare “Information warfare is the offensive and defensive use of information and information systems to deny, exploit, corrupt, or destroy, an adversary's information, information-based processes, information systems, and computer-based networks while protecting one's own. Such actions are designed to achieve advantages over military or business adversaries.” Dr. Ivan Goldberg

Related Terms Penetration Testing Network Security Testing Tiger Teaming Live Fire Exercise 9

Some Important Caveats Authorization Managerial backing Goals Organization Results distribution 10

Ethics First, Do No Harm Accountability Handling Information Handling Vulnerabilities Insider Threat Discovering Attacks Educating Attackers We Think We Are Really Secure 11

Course Overview Introduction Tactical Process Probing Services Strategy Teams Strategic Process 12