Presented by Prof. Danilo Gligoroski MSc in Telematics Specialization in Information Security.

Slides:



Advertisements
Similar presentations
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Advertisements

Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Chapter 1 – Introduction
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
Final Presentation Presented By: Gal Leibovich Liran Manor Supervisor: Hai Vortman.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Applied Cryptography for Network Security
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
1 CSCD 439/539 Wireless Networks and Security Lecture 1 Overview Fall 2007.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCD 330 Network Programming Winter 2012 Lecture 1 - Course Details.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
2° cycle degree programme (lm) in Telecommunications Engineering Principles Models and Applications for Distributed Systems Prof. Maurelio Boari
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Project supported by YESS 2009 Young Engineering Scientist Symposium « Identity Management » Cryptography for the Security of Embedded Systems Ambient.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security
Information Security Principles (ESGD4222)
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Introduction to Information Security J. H. Wang Sep. 15, 2014.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
CSCD 330 Network Programming Fall/Winter/Spring 2014 Lecture 1 - Course Details.
SKU3033 / SKF3033 NETWORK & SYSTEM ADMINISTRATOR.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Cryptography and Network Security (CS435) Part One (Introduction)
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
8/25/2010CS 686 Course Outline and Questionnaire EJ Jung CS 686 Special Topics in CS Privacy and Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Lecture 24 Wireless Network Security
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
1 CDA 4527 Computer Networking Prof. Cliff Zou School of Computer Science University of Central Florida Fall 2005.
CSCD 330 Network Programming Winter 2015 Lecture 1 - Course Details.
1 CDA 4527 Computer Communication Networking (not “analysis”) Prof. Cliff Zou School of Electrical Engineering and Computer Science University of Central.
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
MIS 4850 Systems Security Abdou Illia, Ph.D School of Business Eastern Illinois University (Monday 1/11/2016)
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Syo-401 Question Answer. QUESTION 1 An achievement in providing worldwide Internet security was the signing of certificates associated with which of the.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
CNT 4704 Computer Communication Networking (not “analysis”)
CNT 4704 Computer Communication Networking (not “analysis”)
CNT 4704 Computer Communication Networking (not “analysis”)
CSCD 330 Network Programming Spring
CSCD 330 Network Programming Spring
CNT 4704 Analysis of Computer Communication Networks
CSCD 330 Network Programming Spring
Introduction to Course
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Presented by Prof. Danilo Gligoroski MSc in Telematics Specialization in Information Security

What is covered by the area of Information Security? Ubiquitous integrated computing and communication services need services for data security, confidentiality, integrity and availability New information threat scenarios appear every month The number of information security relevant incidents is steadily on the increase Threats may be active and passive, may be unwanted incidents or may be deliberate abuse, eavesdropping and sabotage Securing networks Securing stored data Secure data processing Secure transportation of data How can you be sure that you can securely do business on the Internet? How can you be sure that nobody is able to empty your bank account? How does one perform encryption? Can we protect ourselves against spam and viruses? Can I send an to my doctor without having to worry about others possibly reading the content?

Examples of past projects 1.Zeroday Exploits 2.Using network security monitoring methodology in a national CERT 3.Dynamic analysis of malware 4.Key management for temporary access control 5.Session-aware web proxy voter 6.Security of the MPOWER Platform 7.Fast implementation of cryptographic algorithms on NVIDIA CUDA GPU 8.A survey of the worldwide and Norwegian job market for Information Security specialists – Cryptographic performance testing 10.Security in process control systems 11.Building robust PKI from users fingerprints

Examples of past master theses 1.Cryptanalysis of IEEE i TKIP 2.IEEE Standard: P Authenticated Encryption 3.Narrow-Block Encryption 4.The Knapsack Problem 5.FPGA realization of a public key block cipher 6.Realizing Secure Multiparty Computations 7.Gait Mimicing 8.Share Computing Protocols over Fields and Rings 9.Malware Analysis: Frameworks and Tools for Automated Dynamic Analysis of Malware 10.JavaCards 11.E-Passport Security: Addressing the Privacy Issues 12.MQQ-SIG ultra-fast dig. sign. alg. 13.Practical attacks on RFID systems 14.Securing Near Field Communication 15.Design of a secure system of authentication of users using RFID 16.New trends in Internet attacks: Clickjacking in detail 17.Regulating Access of the information chain in a wind power system 18.Security in process control systems 19.Security in SOA-Based Healthcare Systems 20.Simulation of new security elements in an Ad-hoc network 21.TCP latency propagation through intermediary hosts 22.Tools and Techniques for Resetting or Recovery of Administrator Passwords on Popular Operating Systems 23.Web Applications Security

Obligatory: TTM Wireless Network Security ECTS Credits: 7,5 Content: – Services, protocols and mechanisms for security of wireless networks and mobile users, e.g. confidentiality and integrity algorithms, key management, authentication servers, security in WLAN, UMTS, Bluetooth and ad-hoc networks. Digital forensics in wirelesss systems. Course Material: Valtteri Niemi, Kaisa Nyberg: UMTS Security, John Wiley & Sons, Edney, Arbaugh: Real Security, Addison-Wesley Articles. Recommended background: TTM4105 Access and Transport Networks, TTM4135 Information security or equivalent. Teaching method: Lectures, technical essay, laboratory and exercises. Grading based on the portefolio of written final exam (60%), technical essay (20%), and lab report (20%). Learning Goal: The course will provide knowledge of, and best practice skills for information security technology and methods in distributed systems providing services for mobile users and users of wireless networks.

Obligatory: TTM2 Information Security ECTS Credits: 3,75 Content: – Every year different actual topics like: Threat analysis, secure network protocols, principles, methods and tools for intrusion detection, network surveillance, security administration, cryptographic one-way hash functions. – Last year we covered the topic of cryptographic one-way hash functions. – For Fall 2010 we plan to cover one very hot and actual topic: Data Forensics Course Material: Given at semester start. Recommended background: TTM4135 Information Security, or equivalent. Teaching method: Colloquia Learning Goal: After completion of this unit, the students will have acquired more detailed knowledge about a selected topics within information security.