Presentation is loading. Please wait.

Presentation is loading. Please wait.

Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.

Similar presentations


Presentation on theme: "Network Security by Behzad Akbari Spring 2012 In the Name of the Most High."— Presentation transcript:

1 Network Security by Behzad Akbari Spring 2012 In the Name of the Most High

2 2 Advanced Computer Networks Instructor Behzad Akbari: Email: b.akbari@modares.ac.ir TA Course Web Site http://ece.modares.ac.ir/~akbari/spring2012/netsec/

3 3 Network Security Course objective  To make acquainted the graduate students with good knowledge of fundamentals of network security including basic security concepts, protocols, standards, tools and applications. Prerequisites  Computer Networks.  C programming.

4 4 Network Security Textbook  Network Security Essentials: Applications and Standards (4rd Edition) by William Stallings. Reference book  Cryptography and Network Security: Principles and Practices (4rd Edition), by William Stallings. For the background on computer networks and also for some class lectures we suggest following reference books: Computer Networking: A Top-Down Approach, Featuring the Internet, by James Kurose and Keith Ross, 5rd Edition, 2010. Computer Networking: A Top-Down Approach, Featuring the Internet Computer Networks: A Systems Approach, by Larry L. Peterson, Bruce S. Davie, 4rd Edition, 2007. Computer Networks: A Systems Approach

5 5 Grading  There will be Homework, Project, Mid-Term and Final Exams. The grade will be determined by: Homework: 15% Project: 15% Seminar: 10% Mid-Term Exam: 30% Final Exam: 30% Network Security

6 6 Tentative Course Outline Introduction  Types of attacks  Security services  A model for network secuirity  Internet standards, RFCs. Conventional Encryption  Ciphers  Information theory and entropy  DES  Cipher block chaining  location of encryption devices  Key distribution  DNS and IP addressing. Public Key Cryptography  Message authentication  One way hash functions  Public key principles and algorithms  Digital signatures  Key management.

7 7 Tentative Course Outline (Cont.) Authentication Applications  Kerberos  X.509 authentication service. Electronic Mail Security  Pretty Good Privacy (PGP)  S/MIME IP Security  IPSec  Tunneling,  Transport  Security Associations  AH and ESP Firewalls  Packet filtering  Application and circuit gateways  NAT,  Split DNS  SSH,  Trusted Systems

8 8 Tentative Course Outline (Cont.) Web Security  Web fundamentals, attacks and security  SSL  TLS  SET Intruders  Intruders  Intrusion detection  Password management Wireless Security Malicious Software  Malicious programs  Viruses, worms and Trojan horses  Digital immune system.

9 9 Tentative Course Outline (Cont.) Advanced Topics  DOS and DDOS  Peer-to-Peer Network Security  Network Security Monitoring


Download ppt "Network Security by Behzad Akbari Spring 2012 In the Name of the Most High."

Similar presentations


Ads by Google