Information Systems Security Winter

Slides:



Advertisements
Similar presentations
1 Computer Engineering Department Islamic University of Gaza ECOM 5347 Network Security Undergraduate Course Fall Prof. Mohammad A. Mikki Room.
Advertisements

Introduction to CS170. CS170 has multiple sections Each section has its own class websites URLs for different sections: Section 000:
MyUCDavis Course Management Tools CC-FIT11/8/2004.
Csc111 :Programming with Java First semester H.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
“Network Security” Introduction. My Introduction Obaid Ullah Owais Khan Obaid Ullah Owais Khan B.E (I.T) – Hamdard University(2003), Karachi B.E (I.T)
COMS S1007 Object-Oriented Programming and Design in Java July 10, 2008.
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
1 CSE 5351: Introduction to Cryptography Ten H. Lai Spring 2015 MW 3:55-5:15 PM, CL133.
CS 450: COMPUTER GRAPHICS COURSE AND SYLLABUS OVERVIEW SPRING 2015 DR. MICHAEL J. REALE.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
The Blackboard Textbook The hard-copy textbook has a card inside the cover containing an access code This code will allow you to obtain access to the Cengage.
Introduction to Information Security J. H. Wang Sep. 15, 2014.
BIOLOGY CP What topics will we be covering in this course?
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Course Introduction Software Engineering
Network Security CS nd Term Course Syllabus Cairo University Faculty of Computers and Information.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
Engineering Secure Software. Vulnerability of the Day  Each day, we will cover a different type of code-level vulnerability Usually a demo How to avoid,
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
AN INTRODUCTION TO JAVA LANGUAGE CT Credit Hours : (3 Lecture, 2 Lab)
Introduction to Information Security J. H. Wang Sep. 18, 2012.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
SEC835 Security in Databases and Web applications Presentation.
Mohammad Alauthman 1/22/20162 This 3-credit first course for computer science & IT majors, which provides students the basic understanding.
CS151 Introduction to Digital Design Noura Alhakbani Prince Sultan University, College for Women.
Lecture 1 Page 1 CS 236 Online Introduction CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
1 NES554: Computer Networks Defense Course Overview.
1 CSE Cryptography and Security Ten H. Lai Autumn 2009.
Dr. Ying Lu ylu at cse.unl.edu Schorr Center Aug 22, CSCE 351 Operating System Kernels.
MIS 4850 Systems Security Abdou Illia, Ph.D School of Business Eastern Illinois University (Monday 1/11/2016)
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
CSI 3131 Summer 2016 Principles of Operating Systems Instructor: Dr. Nathalie Japkowicz Office: STE 5029 Office Hours: n In.
CIS 4930/6930: Systems Security
Computer Network Fundamentals CNT4007C
Course Overview - Database Systems
CS101 Computer Programming I
CIS 4930/6930: Systems Security
Computer Networks CNT5106C
Purpose of Class To prepare students for research and advanced work in security topics To familiarize students working in other networking areas with important.
Introduction to Information Security
Data & Network Security
Course Information Mark Stanovich Principles of Operating Systems
E-BUSINESS SYSTEMS DESIGN IS 232 T
Computer Networks Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1 1.
CS4622 Final Project Objective: Research & Teach a “CS4622 Related “ Subject at a high-level using existing knowledge Teams will teach the class about.
Instructor: Zonghua Gu
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
Gregory Morton COSC380 February 16, 2011
CS6021 Final Project – Team Part
Engineering Secure Software
COMS S1007 Object-Oriented Programming and Design in Java
WELCOME TO BIOLOGY.
Student Class Presentations Schedule
Computer Engineering Department Islamic University of Gaza ECOM 5347
First Semester 1439/1440 Welcome 
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
CS4622 Final Project Objective: Research & Teach a “CS4622 Related “ Subject at a high-level using existing knowledge Teams will teach the class about.
ITEC 202 Operating Systems
Engineering Secure Software
Computer Networks CNT5106C
ITEC 202 Operating Systems
Computer Engineering Department Islamic University of Gaza
Course Overview CS 4640 Programming Languages for Web Applications
Introduction to Course
CS 1054 Final Exam Coverage Final exam will cover Chapters 1-8, 10-11
Presentation transcript:

Information Systems Security Winter 2016-17 This chapter provides an overview of computer security. We begin with a discussion of what we mean by computer security. In essence, computer security deals with computer-related assets that are subject to a variety of threats and for which various measures are taken to protect those assets. Accordingly, the next section of this chapter provides a brief overview of the categories of computer-related assets that users and system managers wish to preserve and protect, and a look at the various threats and attacks that can be made on those assets. Then, we survey the measures that can be taken to deal with such threats and attacks. This we do from three different viewpoints, in Sections 1.3 through 1.5. We then lay out in general terms a computer security strategy. The focus of this chapter, and indeed this book, is on three fundamental questions: 1. What assets do we need to protect? 2. How are those assets threatened? 3. What can we do to counter those threats? Instructor: Zonghua Gu

Logistics Time & Location: Lectures: Sat 9:50-11:25 & 14:05-15:40 西一415 Experiments: Sat 15:55-17:30机房   Instructor: Zonghua Gu QQ Group: 461902186 (Everyone must join) Website: http://www.cs.zju.edu.cn/people/zgu/sec/ 11/9/2018

Grading Scheme Final Exam: 60%; Experiments: 40% Exam covers lecture PPTs, not experiments; open book, you can bring any printed materials. Reading textbook is recommended, but not strictly necessary All teaching materials in English This is a note 11/9/2018

Course Topics Textbook: COMPUTER SECURITY: PRINCIPLES AND PRACTICE, 3rd EDITION, WILLIAM STALLINGS (electronic copy in QQ group) Lecture topics: Cryptographic Tools; User Authentication; Access Control; Database Security; Malicious Software; Denial-of-Service Attacks; Intrusion Detection; Firewalls and Intrusion Prevention Systems; Buffer Overflow; Software Security; Operating System Security; Trusted Computing and Multilevel Security 11/9/2018

Experiments Focus on Android security 8 experiments, 5 points each Form groups of 1-4 students each Requires Java and Android programming expertise. For learning Android, click on “Links and References” for some MOOCs

Experiment Report Experiment report (in either English or Chinese) and source code for Sat lab is due next Friday 11:59pm to Email MobileSecurity2014@163.com Please include in the report some screenshots with one of the team members’ names in the picture. If you submit the report on time, and the report is reasonable, you will get the full 5 points Each late day costs you 1 point! Late reports will be deducted 1 point for each late day.

Final Exam Based on lecture PPTs All questions are multiple choice, single answer. Open book, so print out all PPTs and bring to the exam

关于点名的那点事 理论与实验课均不点名,凭个人兴趣上课,上课提问回答不计分。 实验课可以课外自主完成。