Introduction to Course

Slides:



Advertisements
Similar presentations
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Advertisements

1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Lecture 1: Overview modified from slides of Lawrie Brown.
FIT3105 Security and Identity Management Lecture 1.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Henric Johnson1 Network Security /. 2 Outline Attacks, services and mechanisms Security attacks Security services Methods of Defense A model for Internetwork.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
“Network Security” Introduction. My Introduction Obaid Ullah Owais Khan Obaid Ullah Owais Khan B.E (I.T) – Hamdard University(2003), Karachi B.E (I.T)
Introduction (Pendahuluan)  Information Security.
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
INTRODUCTION TO NETWORK SECURITY l.Tahani Aljehani.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
Course ILT Course Code CSN 208 Network Security. Course ILT Course Description This course provides an in-depth study of network security issues, standards,
Computer Engineering II Computer and Network Security Rabie A. Ramadan
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Introduction to Information Security J. H. Wang Sep. 15, 2014.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Network Security CS nd Term Course Syllabus Cairo University Faculty of Computers and Information.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since.
Introduction to Information Security J. H. Wang Sep. 10, 2013.
Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
13LECTURE NET301 11/23/2015Lect13 NET THE PROBLEM OF NETWORK SECURITY The Internet allows an attacker to attack from anywhere in the world from.
Computer threats, Attacks and Assets upasana pandit T.E comp.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Network Security (the Internet Security)
CHAPTER FOUR OVERVIEW SECTION ETHICS
By Marwan Al-Namari Author: William Stallings
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Introduction to Information Security
Introduction to Information Security
Data & Network Security
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
IS4550 Security Policies and Implementation
Information Systems Security Winter
– Communication Technology in a Changing World
Computer and Network Security
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
ISNE101 Dr. Ken Cosh Week 13.
Cryptography and Network Security Chapter 1
Qishi Wu University of Memphis
Unit 1.6 Systems security Lesson 2
Introduction to the course
INFORMATION SYSTEMS SECURITY and CONTROL
CNT 4704 Analysis of Computer Communication Networks
Firewalls and Security
CHAPTER FOUR OVERVIEW SECTION ETHICS
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
Computer Security CIS326 Dr Rachel Shipsey.
Security network management
Cryptography and Network Security Chapter 1
Computer Security By: Muhammed Anwar.
Cryptography and Network Security Chapter 1
Introduction to Cryptography
Cryptography and Network Security
Computer Security CIS326 Dr Rachel Shipsey.
Challenges Of Network Security
Security Attacks Network Security.
Cryptography and Network Security Chapter 1
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Introduction to Course Network Security

Introduction to Course Objectives of the Topic After completing this topic, a student will be able to get motivated, describe learning outcomes and describe the text and references books.

Introduction to Course Motivation Before the widespread use of data processing equipment, security of information was provided primarily by physical and administrative means. E.g. rugged filing cabinets with locks

Introduction to Course Requirements for information security have undergone two major changes: a) As the computers were introduced, a need for protecting information stored on the shared computers was felt – Computer Security.

Introduction to Course b) As networks and communications facilities for carrying data from one computer to another were introduced, a need for protecting data during their transmission was felt – Network or Internet security.

Introduction to Course Stored data: Business data must not be leaked to competitors Personal information Copyrighted software

Introduction to Course Security Violations: Some Examples User A transmits a file to user B. User C, who is not authorized to read the file, is able to capture a copy of the file during its transmission – eavesdropping

Introduction to Course User D transmits a message to a computer E. User F intercepts the message, alters its contents and then forwards the message to E, which accepts the message as coming from D – Man-in-the-middIe Attacks.

Introduction to Course It is also possible that user F constructs its own message and transmits that message to E as if it had come from computer D.

Introduction to Course Some Other Common attacks Cryptanalysis Password Pilfering Intrusion Denial of Service Attacks Malicious software

Introduction to Course Security Breaches can result in Financial loss for corporations Theft of intellectual property Lawsuits Threat to public safety

Introduction to Course The field of network and Internet security consists of measures to deter, prevent, detect, and correct security violations that involve the transmission of information.

Introduction to Course Required Books W. Stallings, “Network Security Essentials: Applications and Standards”, Pearson Education, 2014 “CCNA Security 1.1 Student Packet Tracer Manual ” Cisco Networking Academy, 2012

Introduction to Course Reference Books W. Stallings, “Cryptography and Network Security Principles and Practice”, Pearson Education, 2014

Introduction to Course Course Composition: Two parts Part 1 will provide a practical survey of network security applications and standards. It has been sub-divided into 3 subparts.

Introduction to Course Subpart1: Cryptography Symmetric Encryption principles Public-Key Cryptography and message authentication

Introduction to Course Subpart2: Network Security Applications Key distribution and user authentication Network Access Control and cloud Security Transport-level Security Wireless Net. Security

Introduction to Course Subpart2: Network Security Applications Electronic Mail Security IP Security

Introduction to Course Subpart3: System Security Malicious Software Intrusions Firewalls

Introduction to Course In Part 2, we will perform lab experiments to configure networks employing Cisco components for various security aspects. Packet Tracer will be used.

Introduction to Course Grading Policy Assignments + Quizzes = 15% Mid Term Exam = 35% Final Term Exam = 50% End