Download presentation
Presentation is loading. Please wait.
Published byRoxanne Robinson Modified over 6 years ago
1
CSE 331: Introduction to Networks and Security
Slide Set 1 Fall 2000 Instructor: Carl A. Gunter CSE 331
2
Personnel Carl A. Gunter - Lecturer Dimos Anthomelidis Class web page
Office hour: 2:30 to 3:30 Mondays in 370 Moore GRW. Dimos Anthomelidis Office hours: 10:00 to 11:00 Monday and Wednesday in 329B Pender. Class web page
3
Assessment Meet-The-Prof. Exams. Projects.
4
Meet The Prof Requirement
You must come and see the professor during at least one of his office hours before the first exam. What to talk about: describe a computer-related project you did, are doing now, or plan to do. How long? About minutes.
5
Exams Two in-class midterm exams. A 120 minute final exam.
Wednesday October 11 from 11:00 to 11:50. Wednesday November 8 from 11:00 to 11:50 A 120 minute final exam. As determined by registrar.
6
Projects Assorted programming and essay projects.
Early project: packet analysis. Some projects will allow teams. Important rule: team members cannot be “reused”. It will be wise to know your classmates!
7
Recommended Reading Computer Networks, A Systems Approach. Second Edition. Larry L. Peterson and Bruce S. Davie. Morgan Kaufmann 2000. Handbook of Applied Cryptography. Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. CRC 1997. Secure Electronic Commerce. Warwick Ford and Michael S. Baum. Prentice Hall 1996. Network Security Essentials: Applications and Standards. William Stallings. Prentice Hall 2000.
8
What is a Network? Dictionary definition: A group or system of electric components and connecting circuitry designed to function in a specific manner.
9
Mainframe and terminals
10
Telephone network
11
Video cable network
12
The Four Major Networks
Telephone Television Radio Internet
13
Computer networks Computer networks are built mainly from general-purpose programmable hardware. They support an extensible class of applications. We will focus on networks consisting of hosts, which provide programmability, physical networks, which support direct communication, and network elements, which support communication between networks
14
Computer network
15
Applications Electronic Mail File Transfer and Remote Terminals
World-Wide Web (WWW) Telephony (IP and POTS) Document Facsimile (FAX) Network Video (NV)
16
What is Security? Dictionary Definition: protection or defense against attack, interference, espionage, etc.
17
System vs. Environment (Safety)
18
System vs. Environment (Security)
19
Goals of Security Confidentiality Availability Integrity DATA DATA
20
Access Matrix Principals Fred R R/W 0 R Joe R/W 0 R R Bow-Yaw
Sarah R R/W 0 R R/W 0 R R R 0 0 R/W 0 R R/W R/W A B C D Objects
21
Denial of Service Principals Fred R R/W 0 R Joe R/W 0 R R Bow-Yaw
Fred Joe Bow-Yaw Sarah R R/W 0 R R/W 0 R R R 0 0 R/W 0 R R/W R/W A B C D Objects
22
Breach of Confidentiality
Principals R Fred Joe Bow-Yaw Sarah R R/W 0 R R/W 0 R R R 0 0 R/W 0 R R/W R/W A B C D Objects
23
Breach of Integrity Principals W Fred R R/W 0 R Joe R/W 0 R R Bow-Yaw
Sarah R R/W 0 R R/W 0 R R R 0 0 R/W 0 R R/W R/W A B C D Objects
24
Overlapping Goals Availability Integrity Confidentiality Difficulty of
use and poor performance Loss of Confidence Ability to Corrupt
25
Networks and Security Early views of computer security were mainly motivated by time sharing. Protect a user’s files and processes. Security concerns extended to electronic commerce with EDI (Electronic Data Interchange) over VANs (Value Added Networks). Proper transaction processing. Concerns are now focused on security over the public Internet and wireless devices.
26
Internet Security Concerns
Confidentiality of transmitted data, such as passwords and credit card numbers. Integrity of network information, such as routing tables and DNS bindings. Authentication of users who have contact only via the Internet. Thwarting Denial of Service (DoS) attacks. Aiding security of host systems using firewalls, etc.
27
Aim of This Course Teach networking basics, mainly as they are relevant to security. (Reduced emphasis on performance.) Teach security basics, mainly as they apply to the Internet.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.