INFSCI 1075: Network Security Amir Masoumzadeh

Slides:



Advertisements
Similar presentations
1 CS 4396 Computer Networks Lab General Info. 2 Goal: This course aims at helping students get more insight into how the Internet works and gain hands.
Advertisements

Computer Science Department
T T Some Fancy Technology (3 ECTS) Introduction See notes for comments.
Jongwook Woo CIS 100 Business Computer Systems (Syllabus) Jongwook Woo, PhD California State University, LA Computer and Information.
CSCI 3335: C OMPUTER N ETWORKS Vamsi Paruchuri Assistant Professor Department of Computer Science University of Central Arkansas 1.
Today’s Agenda  Syllabus CS2336: Computer Science II.
Computers and Society Lecture 1: administrative details and an introduction to the class Professor: Evan Korth New York University.
ECE 355 Introduction to Computer Networks and Data Communications
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010.
Data Communication and Networks Lecture 0 Administrivia September 5, 2002 Joseph Conron Computer Science Department New York University
Data Communication and Networks Lecture 0 Administrivia September 9, 2004 Joseph Conron Computer Science Department New York University
Data Communication and Networks Lecture 0 Administrivia September 7, 2006.
Slide 1 Instructor: Dr. Hong Jiang Teaching Assistant: Mr. Sheng Zhang Department of Computer Science & Engineering University of Nebraska-Lincoln Classroom:
Welcome to EECS 340 Introduction to Computer Networking.
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
INTRODUCTION TO NETWORK SECURITY l.Tahani Aljehani.
COP4020/CGS5426 Programming languages Syllabus. Instructor Xin Yuan Office: 168 LOV Office hours: T, H 10:00am – 11:30am Class website:
CS 450: COMPUTER GRAPHICS COURSE AND SYLLABUS OVERVIEW SPRING 2015 DR. MICHAEL J. REALE.
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
EECS 354 Network Security Introduction. Why Learn To Hack Understanding how to break into computer systems allows you to better defend them Learn how.
1 Network Security Lecture 1 Course Overview Waleed Ejaz
Introduction to Information Security J. H. Wang Sep. 15, 2014.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Object Oriented Programming (OOP) Design Lecture 1 : Course Overview Bong-Soo Sohn Assistant Professor School of Computer Science and Engineering Chung-Ang.
Network Security CS nd Term Course Syllabus Cairo University Faculty of Computers and Information.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
1 ECE 156 Computer Network Architecture Professor Krish Chakrabarty Department of Electrical and Computer Engineering Fall 2006.
@Yuan Xue CS 285 Network Security Fall 2008.
Introduction 1-1 Lecture 1 University of Nevada – Reno Computer Science & Engineering Department Fall 2015 CPE 400 / 600 Computer Communication Networks.
Introduction to Information Security J. H. Wang Sep. 10, 2013.
CIS 3360: Security in Computing Cliff Zou Spring 2012.
Welcome to Phys 001 Your professor: Dr Silvina Gatica Office: Thirkield Office Hours: MW 11:10 to 12:10 pm or by appointment.
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
8/25/2010CS 686 Course Outline and Questionnaire EJ Jung CS 686 Special Topics in CS Privacy and Security.
ECS152BXin Liu 1 ECS 152B Computer Networks Winter 2009 Prof. Xin Liu
CSE 1105 Week 1 CSE 1105 Introduction to Computer Science & Engineering Time: Wed 4:00 – 4:50 Thurs 9:30 – 10:20 Thurs 4:00 – 4:50 Place: 100 Nedderman.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
1 CDA 4527 Computer Networking Prof. Cliff Zou School of Computer Science University of Central Florida Fall 2005.
Polytechnic University Introduction1 CS 393/682: Network Security Professor Keith W. Ross.
1 CDA 4527 Computer Communication Networking (not “analysis”) Prof. Cliff Zou School of Electrical Engineering and Computer Science University of Central.
Course Overview 1 FCM 710 Architecture of Secure Operating Systems Prof. Shamik Sengupta Office 4210 N
Mohammad Alauthman 1/22/20162 This 3-credit first course for computer science & IT majors, which provides students the basic understanding.
CS151 Introduction to Digital Design Noura Alhakbani Prince Sultan University, College for Women.
ECE 374: Computer Networks & Internet Introduction Spring 2015 Prof. Michael Zink.
Welcome to Learning Frameworks PSYC 1300 Rachel Cloeter, M.A.
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
ECE 374: Computer Networks & Internet Introduction Spring 2012 Prof. Michael Zink.
1 NES554: Computer Networks Defense Course Overview.
1 CS 4396 Computer Networks Lab General Info. 2 Goal: This course aims at helping students get more insight into how the Internet works and gain hands.
MAT 279 Data Communication and the Internet Prof. Shamik Sengupta Office 4210 N Fall 2010.
MIS 4850 Systems Security Abdou Illia, Ph.D School of Business Eastern Illinois University (Monday 1/11/2016)
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
@Yuan Xue CS 285 Network Security Fall 2013 Yuan Xue.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Course Overview 1 MAT 279 Data Communication and the Internet Prof. Shamik Sengupta Office 4210 N
CET4884 Dr. Nabeel Yousef.  Dr. Nabeel Yousef  Located at the ATC campus room 107Q  Phone number 
Computer Network Fundamentals CNT4007C
Andy Wang Object Oriented Programming in C++ COP 3330
Course Information CSE 3213 – Fall 2011.
CNT 4704 Computer Communication Networking (not “analysis”)
Computer Networks Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1 1.
CS/ECE 478 Introduction to Network Security Dr. Attila Altay Yavuz
Computer Networks CNT5106C
Andy Wang Object Oriented Programming in C++ COP 3330
Introduction to the course
Computer Networks CNT5106C
MAT 379 Computer Networking
Presentation transcript:

INFSCI 1075: Network Security Amir Masoumzadeh Course Introduction INFSCI 1075: Network Security Amir Masoumzadeh

Contact Information Instructor Amir (Amirreza Masoumzadeh) Web: http://www.sis.pitt.edu/~amirreza/ Email: amirreza _at_ sis.pitt.edu Please include “IS1075” in the subject 410 IS Bldg. (LERSAIS), 2nd cubicle on your right Office hours: Tuesdays 2pm-4pm / by appointment GSA TBA

Deals with security issues related to the network Course Overview Deals with security issues related to the network Common attacks originating from the network Prevention and detection of attacks Perimeter Security, Monitoring, etc. Protocols for enhancing security (e.g. Cryptographic Protocols) Assessment of network security and response to attacks

Course Overview: More Details Common Attacks DoS attacks, DDoS attacks, Worms, Masquerading, Enumeration, etc. Cryptographic Protocols Cryptography, IPSec, SSL/TLS, PGP, Wireless Security, etc. Security Packet Filters, Stateful Firewalls, Proxy Firewalls, IDS and IPS Monitoring Sniffers, Network Monitoring and Logging Tools

Prerequisites Algebra and digital logic INFSCI 1070 – Introduction to Telecom and Networks Good knowledge of TCP/IP and related protocols Will be quickly reviewed, but you should feel comfortable with network basics (MAC, TCP/IP, HTTP, etc.) Algebra and digital logic Modulo operation, XOR operation Will be reviewed To understand encryption schemes INFSCI 0017 – Introduction to Programming Probably won't do much programming but ...

Textbooks & References Network Security: The Complete Reference Roberta Bragg et. al., McGraw-Hill Osborne Media, November 2003 ISBN: 0072226978 Cryptography and Network Security, Principles and Practice, 4/Ed. or 5/Ed., William Stallings, Prentice Hall, 2011, ISBN: 0136097049 (Optional) We also use other books and online materials Safari books http://www.library.pitt.edu/articles/database_info/safari.html Use “Secure Remote Access” https://sremote.pitt.edu Readings will be specified for each lecture You are expected to read the specified references for each lecture before coming to the class Not every details can be covered in the lectures Evaluation is based on both readings and lectures

Some Other References [1] Cryptography and Network Security: Principles and Practices, 4th Ed, William Stallings, Pearson Education, 2006, (0- 13-187316-4) [2] Hacking Exposed (Fifth Edition) – Stuart McClure, Joel Scambray, George Kurts (0-07-226081-5) [3] Penetration Testing and Network Defense – Andrew Whitaker, Daniel Newman (1-58705-208-3) [4] Network Security – Private Communication in a Public World – Charlie Kaufman, Radia Perlman, Mike Speciner, (0-13-046019-2) [5] Firewalls and Internet Security (2nd Edition) – William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin (0-201-63466-X) [6] Cryptography and Network Security – Behrouz A. Forouzan (978-0-07-287022-0)

Some Other References (Cont.) [7] Computer Security Lab Manual – Vincent J. Nestler, et. al. (0-07-225508-0) [8] The Craft of System Security, Sean Smith and John Marchesini - (0-321-43483-8) [9] Network Intrusion Detection: An Analyst’s Handbook, by S. Northcutt and J. Novak, New Riders, Indianapolis, 2001. [10] Inside Network Perimeter Security, by S. Northcutt and others, New Riders, Indianapolis, 2005. [11] Real 802.11 Security: Wi-Fi Protected Access and 802.11i, by J. Edney and W.A. Arbaugh, Prentice Hall, 2004. [13] The Tao of Network Security Monitoring, by Richard Bejtlich, Addison-Wesley, 2004.

Grading 20% Homework (~6) 30% Labs (~5) 15% Quizzes (~10) 15% Midterm 20% Final Exam +10% Optional Term Project

Course Logistics Website CourseWeb http://www.sis.pitt.edu/~amirreza/is1075-spring13/ Course Information Lecture Schedule and Slides CourseWeb https://courseweb.pitt.edu/ Announcements/Communication Homework, labs, and sample solutions Grades

Assignments Ask the GSA if you have problem with Homework/Labs Homework and lab assignments must be delivered by 11- am of the due dates (beginning of the class) There will be 10% penalty for every day late (max two days) No late submission is accepted after two days! Ask the GSA if you have problem with Homework/Labs I will be also constantly monitoring and answering questions if necessary Use discussion board on CourseWeb Sample solutions will be posted on CourseWeb Pre-configured equipment will be provided for labs

Quizzes & Exams Quizzes Quizzes and Exams are closed book Exams Short quizzes throughout the semester at the beginning of the class Quizzes will be based on recent materials You cannot take a make-up if you miss a quiz (make sure you don’t!) Your lowest grade will be dropped Quizzes and Exams are closed book Exams Samples will be provided before the exam All written work must be legible and clear to receive credit I should be able to understand what you are trying to do/say without verbal explanations later No credit for vague answers, unclear steps, magical solutions, etc.

Policies Academic Integrity No copying from web or other books without understanding the material If you use such material cite your source properly Students may discuss homework assignments and work together The final product for each student MUST be his or her own work Zero tolerance for cheating At a minimum, cheating will result in a grade of zero on the assignment Depending on the circumstances, you may also receive a grade of ‘F’ for the course

Tentative Course Syllabus - I Introduction What is network security? Why is network security necessary? Basic security concepts and terminology Review of Network Basics Network operation Common network protocols, services and applications of interest. TCP/IP, DNS, ICMP, etc. Discussion of some common network attacks The Process of an Attack, Risks and Vulnerabilities Examples: SYN Flood attacks, SMURF Attacks Authentication failures

Tentative Course Syllabus - II Network Prevention/Protection Cryptography Secret key, public key, message authentication, key management Cryptographic Protocols Protocol flaws and pitfalls Support for cryptographic protocols - PKI Specific examples PGP, Kerberos, SSL, IPSec Wireless networks Perimeter Security Firewalls

Tentative Course Syllabus - III Detection Importance of detection IDS and IPS Monitoring, logging and auditing Housekeeping procedures Vulnerability Assessment and Response Network security in the “real world” Security in organizations Incident response Legal issues