Introduction to Information Security

Slides:



Advertisements
Similar presentations
Chapter 1  Introduction 1 Chapter 1: Introduction.
Advertisements

1 Computer Engineering Department Islamic University of Gaza ECOM 5347 Network Security Undergraduate Course Fall Prof. Mohammad A. Mikki Room.
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Course Introduction.
Principles of Information Security, 2nd edition1 Cryptography.
6/19/2015 Prof. Ehud Gudes Security Ch 1 1 Chapter 0 - Overview.
“Network Security” Introduction. My Introduction Obaid Ullah Owais Khan Obaid Ullah Owais Khan B.E (I.T) – Hamdard University(2003), Karachi B.E (I.T)
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Introduction to Operating Systems J. H. Wang Sep. 18, 2012.
Introduction to Information Security J. H. Wang Sep. 15, 2014.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
Course Introduction Software Engineering
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Introduction to Discrete Mathematics J. H. Wang Sep. 14, 2010.
Introduction to Operating Systems J. H. Wang Sep. 18, 2015.
Introduction to Information Security J. H. Wang Sep. 10, 2013.
Object Oriented Programming (FIT-II) J. H. Wang Feb. 20, 2009.
Introduction to Operating Systems J. H. Wang Sep. 15, 2010.
Proposal for Term Project Information Security, Fall 2014 J. H. Wang Sep. 25, 2014.
Introduction to Computer Programming (FIT-I pro) J. H. Wang Sep. 17, 2007.
ICOM 5018 Network Security and Cryptography Description This course introduces and provides practical experience in network security issues and cryptographic.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
Course Overview for Compilers J. H. Wang Sep. 14, 2015.
Object Oriented Programming (FIT-II) J. H. Wang Jan. 31, 2008.
ICOM 5995 (crypto) - Noack Crypto - Administrivia Prontuario - Please time-share and ask questions Info is in my homepage amadeus.uprm.edu/~noack/ Make.
1 CDA 4527 Computer Communication Networking (not “analysis”) Prof. Cliff Zou School of Electrical Engineering and Computer Science University of Central.
Course Overview for Compilers J. H. Wang Sep. 20, 2011.
Introduction to Operating Systems J. H. Wang Sep. 13, 2013.
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
Course Overview: Linear Algebra
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
Proposal for Term Project Information Security, Fall 2013 J. H. Wang Nov. 5, 2013.
CEN 621 Cryptography and Network Security Spring Term CEN 621 Cryptography and Network Security Spring Term INTERNATIONAL BURCH UNIVERSITY.
Class Introduction IST 210: Organization of Data IST2101.
Computer Network Fundamentals CNT4007C
Introduction to Operating Systems
Proposal for Term Project Information Security, Fall 2016
Course Introduction 공학대학원 데이타베이스
Computer Networks CNT5106C
CNT 4704 Computer Communication Networking (not “analysis”)
Introduction to Information Security
CNT 4704 Computer Communication Networking (not “analysis”)
사물네트워크 시스템 보안 - Focused on Advanced Cryptography-
Data & Network Security
Chapter 8 Network Security.
Cryptography and Network Security
Exam Review.
CNT 4704 Computer Communication Networking (not “analysis”)
CompTIA Security+ Study Guide (SY0-501)
CS/ECE 478 Introduction to Network Security Dr. Attila Altay Yavuz
Computer Networks CNT5106C
Course Overview - Database Systems
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
Introduction to Operating Systems
CSCD 330 Network Programming Spring
Andy Wang Operating Systems COP 4610 / CGS 5765
Introduction to the course
Proposal for Term Project Operating Systems, Fall 2018
CNT 4704 Analysis of Computer Communication Networks
CNT 4704 Analysis of Computer Communication Networks
Student Class Presentations Schedule
Computer Engineering Department Islamic University of Gaza ECOM 5347
CSCD 330 Network Programming Spring
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
Computer Networks CNT5106C
Intro. to Computer Network
Cryptography and Network Security
Introduction to Course
Presentation transcript:

Introduction to Information Security J. H. Wang Sep. 11, 2017

Instructor Instructor Jenq-Haur Wang (王正豪) Associate Professor, Dept. CSIE, Taipei Tech. Office: R1534, Technology Building E-mail: jhwang@csie.ntut.edu.tw Homepage: http://www.ntut.edu.tw/~jhwang/ Tel: ext. 4238

Course Overview Course: Information Security Time: 2:10-4:00pm on Mondays, 10:10-11:00am on Thursdays Classroom: R427, 6th Teaching Building & R234, Technology Building Prerequisite: Discrete Mathematics, Computer Networks Course webpage: http://www.ntut.edu.tw/~jhwang/IS/ The latest announcement and schedule updates TA: Mr. Ma (@R1424, Technology Building) E-mail: wirl2017 @ yahoo.com.tw

Target Students For those who Major in Computer Science or Information Technology, and Are familiar with basic computer networks and discrete mathematics, and Are preparing to investigate more details in selected topics and recent developments in system, networks, and information security

Resources Textbook: Cryptography and Network Security: Principles and Practice, Seventh Edition, by William Stallings, Pearson Education, 2017 http://williamstallings.com/Cryptography/ (Global Edition is available now, but earlier versions are also acceptable) Online chapters and appendices available References: Network Security Essentials: Applications and Standards, 6th ed., by William Stallings, Pearson, 2017. (adapted from our textbook) Slides, documents, and tools

Teaching Lectures Experience sharing from previous seniors and the industry About three homework assignments Homework should be turned in within two weeks One quiz, and one mid-term exam Term project: system development or topical surveys How did intruders attack our systems What kinds of security tools are available How do we protect against attacks

Grading Policy (Tentative) grading policy Homework assignments: ~30% Quiz and midterm exam : ~35% Term projects: ~35% System development or topical surveys For those not familiar with the “midterm alert”: Rule#1: ! (x, alerted(x) => failed(x)) Rule#2: ! (x, !alerted(x) => !failed(x) Conclusion: pay attention to your own potential score range as early as possible!

Course Description Introduction to basic concepts in information security and their applications Cryptography Encryption, hash function, digital signature Network security applications HTTPS, wireless security, e-mail security, IP security System security Intrusion, virus, firewall

What is Information Security? Example scenarios Receiving unsolicited messages, e-mail spam, phishing, advertisements, … Computer system hijacked: popups, hanged, … Communication gets wiretapped or eavesdropped… Fake online transaction Your friend denied receipt of your message Disputes on the rights of an image Playing online audio without permission Natural disaster: fire, physical attacks (911), … …

More Security-Related Terms System security User authentication, access control Database security OS security, infrastructure Software security: browser, malicious software, virus Network security Networking protocol, applications E-commerce, … Information security Spam, phishing, … Multimedia security: watermarking, information hiding, digital rights management (DRM), …

Outline & Schedule Plan of the textbook: Background (Ch. 1-2) Cryptography Symmetric Ciphers (Ch. 3-8) Asymmetric Ciphers (Ch. 9-10) Cryptographic Data Integrity Algorithms (Ch. 11-13) Mutual Trust (Ch. 14-15) Network and Internet Security (Ch. 16-20) System Security (Ch. 21-23) Legal and Ethical Issues (Ch. 24)

Table of Contents 1. Computer and Network Security Concepts 2. Introduction to Number Theory 3. Classical Encryption Techniques 4. Block Ciphers and the Data Encryption Standard 5. Finite Fields 6. Advanced Encryption Standard

7. Block Cipher Operation 8. Random Bit Generation and Stream Ciphers 9. Public-Key Cryptography and RSA 10. Other Public-Key Cryptosystems 11. Cryptographic Hash Functions 12. Message Authentication Codes 13. Digital Signatures

14. Key Management and Distribution 15. User Authentication 16. Network Access Control and Cloud Security 17. Transport-Level Security 18. Wireless Network Security 19. Electronic Mail Security 20. IP Security

21. Malicious Software 22. Intruders 23. Firewalls 24. Legal and Ethical Aspects

Outline & Schedule (Cont’) (Tentative) Schedule Background: 1-2 wks Cryptography: 6-7 wks Network security applications: 3-4 wks TCP/IP Web, SSH, E-mail, IP security Experience sharing: 1-2 wks System security: 1-2 wks Password, virus, intrusion detection, firewall Term project presentation: 3-4 wks

Due to the time limits, we will try to cover most of the major topics without going into too much detail E.g.: Mathematical parts such as number theory and finite fields (Ch.2 & Ch.5) Theoretical parts in cryptography Details of information security standards, protocols, RFCs A broad overview, and then focus on selected topics in depth

Additional Resources Review on computer networking and TCP/IP protocols More slides on network and information security Useful tools for network and system security Online resources by Stallings and at Pearson Useful Websites and documents Online chapters (Ch.21-24) Appendix.C-Y & Glossary Review questions, problems, and programming problems (at the end of each chapter)

More on Term Project System development using security libraries Implementation of security algorithms (AES, RSA, …) Implementation of a client-server application (e.g. secured communication tool, file exchange, transactions, …) Topical surveys in information security-related topics, e.g.: Demonstration on how to use a security tool to defend against recent attacks Analysis of potential security weakness in systems, and possible solutions or countermeasures Focused survey on the latest technical developments in information security Specific issues in mobile security, cloud security & privacy, big data security, … Focus on the quality and technical depth of your presentation

More on Term Project Proposal: required after midterm (Due: Nov. 16, 2017) One-page description of your planning for term project, and responsibilities of your team members More details to be announced before midterm Presentation: required for each team The ONLY time slots in the last four weeks of this semester: Dec. 18, 21, 25, 28, Jan. 1, 4, 8, 11. Final report: (Due: Jan. 12, 2018) Presentation files, source codes and executable files, documentation

Thanks for Your Attention!