Download presentation
Presentation is loading. Please wait.
1
CSCD 434 Spring 2011 Lecture 1 Course Overview
2
Contact Information Instructor Carol Taylor 315 CEB Phone: 509-359-6908 E-mail: ctaylor@ewu.edu Office Hours: M, W 1-2 and F 10-11 am or other times I am in my office
3
Course Information Course number: CSCD 434 Network Security Course Web Page http://penguin.ewu.edu/cscd434
4
Overview Today’s Topics What is network security and how does it fit within EWU curriculum? Network Security fits within the broader topic of general security Some expectations Learning Objectives for this course Pre-test of network security
5
Network Security Defined Network Security – How would you define it? – Protection of networks and their services from unauthorized modification, destruction, or disclosure – Study of both attack and defense techniques that affect the network
6
Our Curriculum CSCD 330 – Network programming – Basic networking course with an emphasis on programming CSCD 433/533 – Advanced Networking – More depth, cover network principles, design – Cover other protocols, real-time, QOS – Some programming
7
Our Curriculum CSCD 434 Network Security – Computer networks focus of both threats and defense. – Begin with coverage of Attacks and Attackers What they typically do to gain access to computers on a network Examine different phases of an attack Learn tools and techniques attackers use – Try some out in the lab Try to answer, Why attack?
8
Our Curriculum CSCD434 continued … – Talk about Defense Mechanisms against attackers Detection/Prevention – Network security policies Authentication, users and machines Firewalls and Intrusion Detection Use of Cryptography as network defense – Whats its real value? – Where it works and where it doesn’t work
9
General Computer Security How do you define computer security? – Application of hardware, firmware and software security to a computer system in order to protect against, or prevent, unauthorized disclosure, manipulation, and deletion of information or denial of service – Protection from all measures to deny unauthorized access and exploitation of computer systems
10
General Computer Security Where does network security fit within a security curriculum? – Introductory Security class, CSCD303 Basics of computer security, code and hardware vulnerabilities, OS protection mechanisms, cryptography based protection, authentication – Cryptography Algorithms and math that define cryptography
11
General Computer Security CSCD496 - Computer or Digital Forensics Capture data related to proof of electronic crimes Recoverability of data from both host and network CSCD437 - Secure Coding taught by Tom Capul Learn how to avoid software vulnerabilities Attacks that can take advantage of code vulnerabilities and how to create more secure programs
12
Network and General Security Overlap of Topics General Security Network Security Cryptography Forensics Secure Coding
13
Pre-requisite Knowledge Pre-requisites – Network course Should know basic TCP/IP networks – Knowledge of programming such as C, C++ or Java We will review some networking concepts – Point you to some supplemental material on TCP/IP Networks to fill in the gaps
14
Student Learning Objectives By end of this course you should – Understand threats to computer systems through network – Understand and be able to set up defense mechanisms used to counteract threats – Understand role of cryptography in network defense – Know how to continue learning about network security beyond this class Certifications, Journals, Web Sites
15
Expectations for You Come to Class – Listen, learn and ask lots of questions Download lecture notes Do reading if assigned – There will be some outside reading!!!! Want in-class participation Group exercises in class Labs
16
Expectations for You Produce a project Programming or experiment Short write up of results Presentation of your results Or Create a research paper Survey paper
17
Conclusion Interesting class, increase everyone’s knowledge of network security Topic is challenging Broad and changes constantly Nothing really difficult, but is a large topic Naturally interdisciplinary – Extends beyond the technical Social and people-related issues Policy and laws We will cover some of this
18
The End This week no Lab Next Time – General Security Overview
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.