SKR 5200 Advanced Network Security

Slides:



Advertisements
Similar presentations
Computer Science Department
Advertisements

Computer Networking Revision Dr Sandra I. Woolley.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Network Security Chapter 8. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic.
CSCD 433/533 Advanced Computer Networks Lecture 1 Course Overview Fall 2011.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Chapter 8 Network Security 4/17/2017
CSCD 330 Network Programming Winter 2012 Lecture 1 - Course Details.
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Computer Networking Course Introduction Dr Sandra I. Woolley.
Introduction to Information Security J. H. Wang Sep. 15, 2014.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Network Security CS nd Term Course Syllabus Cairo University Faculty of Computers and Information.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Krerk Piromsopa. Network Security Krerk Piromsopa. Department of Computer Engineering. Chulalongkorn University.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
Introduction University of Sunderland CSEM02 Harry R Erwin, PhD Peter Dunne, PhD.
CSCD 330 Network Programming Fall/Winter/Spring 2014 Lecture 1 - Course Details.
Introduction to Information Security J. H. Wang Sep. 10, 2013.
Exam Review for First Half of C430 2 May pm in Huxley 308 Michael Huth 2 May pm in Huxley 308 Michael Huth.
Chapter 7: Cryptographic Systems
Welcome! CSI 4118: Computer Networks and Protocols (3,0,0) Professor: Dr. Robert L. Probert Office: SITE 5098 Phone: x6709
Security, Accounting, and Assurance Mahdi N. Bojnordi 2004
EE3402- Data Communication Networks Lecture 1 Muhammad Qaisar Shafi.
Introduction & Overview Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific Institute of Information.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Potential vulnerabilities of IPsec-based VPN
Network Security Chapter 8 12/13/ Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
ICOM 5995 (crypto) - Noack Crypto - Administrivia Prontuario - Please time-share and ask questions Info is in my homepage amadeus.uprm.edu/~noack/ Make.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Course web page: ECE 646 Cryptography and Computer Network Security ECE web page  Courses  Course web pages  ECE 646.
CSCD 330 Network Programming Winter 2015 Lecture 1 - Course Details.
Understand Internet Security LESSON Security Fundamentals.
Mohammad Alauthman 1/22/20162 This 3-credit first course for computer science & IT majors, which provides students the basic understanding.
Computer Networks CNT5106C
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
CSCD 433/533 Advanced Computer Networks Lecture 1 Course Overview Spring 2016.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Network Security Chapter 8 Institute of Information Science and Technology. Chengdu University YiYong 2008 年 2 月 25 日.
Proposal for Term Project Information Security, Fall 2013 J. H. Wang Nov. 5, 2013.
CEN 621 Cryptography and Network Security Spring Term CEN 621 Cryptography and Network Security Spring Term INTERNATIONAL BURCH UNIVERSITY.
Introduction to Information Security
Introduction to Information Security
NWEN 243 Network Applications
Chapter 8 Network Security.
CPSC 441: Computer Communications
CSCD 433/533 Advanced Computer Networks
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
CSCD 330 Network Programming Spring
Chapter 8 Network Security.
Security in Network Communications
Introduction to the course
CSCD 433/533 Advanced Computer Networks
CSCD 330 Network Programming Spring
CSCD 433/533 Advanced Computer Networks
CSCD 330 Network Programming Spring
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
Unit 8 Network Security.
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

SKR 5200 Advanced Network Security Azizol Bin Hj. Abdullah, Phd Faculty of Computer Science & Information Technology University Putra Malaysia 43400 UPM Serdang, Selangor

Introduction & Welcome Contact Information : Dr. Azizol Bin Hj. Abdullah Room No. : C1-26 (Blok C) Office Phone : 03-89471728 Mobile : 012 2085125 Email : azizol@fsktm.upm.edu.my

SKR4200 Web Page Using Email LMS Course web page: Using Email LMS just navigate from http://www.fsktm.upm.edu.my/ This should be your first port of call for all course-related information: electronic copies of lecture notes. additional resources – web links, etc. recommended reading – whitepapers, course textbooks. details of tutorials, additional support,… and more…

basic: to test your knowledge; Additional Support Exercise sheets: purely optional entertainment for you available on SKR5200 website and during lecturing. three types of question: basic: to test your knowledge; intermediate: to extend you beyond the lecture notes; advanced: to lead you towards research issues. exercises will be discussed in lecturing time and during office hours. Practical lab sessions Upon request Depend on availability

Course Textbook This semester, we are recommending: Stallings, W. (2006). Cryptography and Network Security. New Jersey: Prentice-Hall. Douglas E. Comer. (2005). Internetworking with TCP/IP, Vol.1: Principles, Protocols and Architectures. New Jersey: Prentice-Hall. Stallings, W. (2006). Network Security Essentials: Applications and Standards. New Jersey: Prentice-Hall.  Mather, T., Kumaraswamy, S. and Latif, S. (2009). Cloud Security and Privacy. Sebastopol: O’Reilly Media. Also of interest: Internet & other security books that can help you to understand

Course Evaluation Individual Assignment : 20% Group Project : 20 % (7.5% Demo & Presentation + 7.5% Report + 5% Working) Mid-Term : 20 % Final Examination : 40 % Examination as part of 2 ½ hour exam. Mixture of essay style and technical questions (problem solving) If you’re worrying about this already, you’re worrying about the wrong thing!

Course Deliverables Able to explain principals and techniques in network security. Able to build and implement a network security system in information security and follows the industry standard. 3. Can identify and analyze a problem in complex situation and be able to evaluate and presenting in a group. 4. Searching and handling an information which is relevant form a different sources.

Course Synopsis This course covers the advanced topics of cryptography such as symmetric encryption, public key encryption and hash function. It also emphasises the practice of network security, practical applications that have been and are being practised such as Kerberos authentication application, e-mail security, IP security and web security to assure network security is guaranteed. Kursus ini merangkumi topik-topik lanjutan dalam kriptografi seperti penyulitan simetri, penyulitan kunci awam dan fungsi cincang. Ia juga menekankan tentang amalan keselamatan rangkaian, aplikasi-aplikasi praktikal yang telah dan sedang diamalkan seperti aplikasi pengesahan Kerberos, keselamatan mel elektronik, keselamatan IP dan keselamatan web untuk memastikan keselamatan rangkaian terjamin.

Overview of SKR5200 Cryptography and Network Security Introduction Attacks, services, and mechanisms Security attacks, Security services Symmetric Encryption Symmetric Encryption Principles Symemetric Encryption Algorithms Cipher Block Modes of Operation Location of Encryption Devices Key Distribution WEEK 1

WEEK 2 Overview of SKR5200 Symmetric Encryption Symmetric Encryption Principles Symemetric Encryption Algorithms Cipher Block Modes of Operation Location of Encryption Devices Key Distribution Public-key Encryption Public-key Cryptography Principles RSA Key management Diffie Hellman key-exchange WEEK 2

WEEK 3 Overview of SKR5200 Message Authentication & Hashing Secure Hash Functions and HMAC Algorithm Digital Signatures Key Management WEEK 3

WEEK 4 Overview of SKR5200 Message Authentication & Hashing Secure Hash Functions and HMAC Algorithm Digital Signatures Key Management WEEK 4

WEEK 5 Overview of SKR5200 Authentication Applications Kerberos X.509 Authentication Service WEEK 5

WEEK 6 Overview of SKR5200 Authentication Applications Kerberos X.509 Authentication Service WEEK 6

WEEK 7 Overview of SKR5200 Electronic Mail Security Pretty Good Privacy S/MIME SNMP WEEK 7

WEEK 8 Overview of SKR5200 Electronic Mail Security Pretty Good Privacy S/MIME SNMP WEEK 8

WEEK 9 Overview of SKR5200 Security Protocols IPsec and Virtual Private Networks (VPN) Secure Sockets Layer/Transport Layer Security (SSL/TLS) Secure SHell (SSH) WEEK 9

WEEK 10 Overview of SKR5200 Security Protocols IPsec and Virtual Private Networks (VPN) Secure Sockets Layer/Transport Layer Security (SSL/TLS) Secure SHell (SSH) WEEK 10

WEEK 11 Overview of SKR5200 Firewall Firewall Design Principles Trusted Systems Attacks WEEK 11

WEEK 12 Overview of SKR5200 Firewall Firewall Design Principles Trusted Systems Attacks WEEK 12

WEEK 13 Overview of SKR5200 Wireless Security IEEE 802.11 Bluetooth Mobile Communication Security WEEK 13

WEEK 14 Overview of SKR5200 Wireless Security IEEE 802.11 Bluetooth Mobile Communication Security WEEK 14

Network Security Direction Approach (Four Quadrants) Quadrant 1 Security Services Concepts & Standards X.800 Security on services Firewall Unguided Media Quadrant 4 System Security Quadrant 2 Cryptography Cryptography Algorithms Symmetric &Asymmetric Key distribution and management. Message Authentication Authentication Protocols Quadrant 3 Application Requirement, Algorithms, Deployment & Security Issues

Reminder make a best effort to arrive on time for lectures if late, arrive quietly return on time from coffee breaks switch off mobile phones (that also means no texting) use the website and other resources use lectures as a starting point for further study, not the end point of your learning

6.30 - 7.30 : Lecture 7.31 - 8.00 : Break 8.01 - 9.30 : Lecture A Proposed Time 6.30 - 7.30 : Lecture 7.31 - 8.00 : Break 8.01 - 9.30 : Lecture

Any Questions or Suggestions????