Download presentation
Presentation is loading. Please wait.
Published byBeverly Stevens Modified over 9 years ago
1
Presented by Prof. Danilo Gligoroski MSc in Telematics Specialization in Information Security
2
What is covered by the area of Information Security? Ubiquitous integrated computing and communication services need services for data security, confidentiality, integrity and availability New information threat scenarios appear every month The number of information security relevant incidents is steadily on the increase Threats may be active and passive, may be unwanted incidents or may be deliberate abuse, eavesdropping and sabotage Securing networks Securing stored data Secure data processing Secure transportation of data How can you be sure that you can securely do business on the Internet? How can you be sure that nobody is able to empty your bank account? How does one perform encryption? Can we protect ourselves against spam and viruses? Can I send an e-mail to my doctor without having to worry about others possibly reading the content?
3
Examples of past projects 1.Zeroday Exploits 2.Using network security monitoring methodology in a national CERT 3.Dynamic analysis of malware 4.Key management for temporary access control 5.Session-aware web proxy voter 6.Security of the MPOWER Platform 7.Fast implementation of cryptographic algorithms on NVIDIA CUDA GPU 8.A survey of the worldwide and Norwegian job market for Information Security specialists – 2008 9.Cryptographic performance testing 10.Security in process control systems 11.Building robust PKI from users fingerprints
4
Examples of past master theses 1.Cryptanalysis of IEEE 802.11i TKIP 2.IEEE Standard: P1619.1 Authenticated Encryption 3.Narrow-Block Encryption 4.The Knapsack Problem 5.FPGA realization of a public key block cipher 6.Realizing Secure Multiparty Computations 7.Gait Mimicing 8.Share Computing Protocols over Fields and Rings 9.Malware Analysis: Frameworks and Tools for Automated Dynamic Analysis of Malware 10.JavaCards 11.E-Passport Security: Addressing the Privacy Issues 12.MQQ-SIG ultra-fast dig. sign. alg. 13.Practical attacks on RFID systems 14.Securing Near Field Communication 15.Design of a secure system of authentication of users using RFID 16.New trends in Internet attacks: Clickjacking in detail 17.Regulating Access of the information chain in a wind power system 18.Security in process control systems 19.Security in SOA-Based Healthcare Systems 20.Simulation of new security elements in an Ad-hoc network 21.TCP latency propagation through intermediary hosts 22.Tools and Techniques for Resetting or Recovery of Administrator Passwords on Popular Operating Systems 23.Web Applications Security
5
Obligatory: TTM4137 - Wireless Network Security ECTS Credits: 7,5 Content: – Services, protocols and mechanisms for security of wireless networks and mobile users, e.g. confidentiality and integrity algorithms, key management, authentication servers, security in WLAN, UMTS, Bluetooth and ad-hoc networks. Digital forensics in wirelesss systems. Course Material: Valtteri Niemi, Kaisa Nyberg: UMTS Security, John Wiley & Sons, 2003. Edney, Arbaugh: Real 802.11 Security, Addison-Wesley 2004. Articles. Recommended background: TTM4105 Access and Transport Networks, TTM4135 Information security or equivalent. Teaching method: Lectures, technical essay, laboratory and exercises. Grading based on the portefolio of written final exam (60%), technical essay (20%), and lab report (20%). Learning Goal: The course will provide knowledge of, and best practice skills for information security technology and methods in distributed systems providing services for mobile users and users of wireless networks.
6
Obligatory: TTM2 Information Security ECTS Credits: 3,75 Content: – Every year different actual topics like: Threat analysis, secure network protocols, principles, methods and tools for intrusion detection, network surveillance, security administration, cryptographic one-way hash functions. – Last year we covered the topic of cryptographic one-way hash functions. – For Fall 2010 we plan to cover one very hot and actual topic: Data Forensics Course Material: Given at semester start. Recommended background: TTM4135 Information Security, or equivalent. Teaching method: Colloquia Learning Goal: After completion of this unit, the students will have acquired more detailed knowledge about a selected topics within information security.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.