Introduction to Information Security J. H. Wang Sep. 15, 2014.

Slides:



Advertisements
Similar presentations
Chapter 1  Introduction 1 Chapter 1: Introduction.
Advertisements

1 Computer Engineering Department Islamic University of Gaza ECOM 5347 Network Security Undergraduate Course Fall Prof. Mohammad A. Mikki Room.
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Course Introduction.
6/19/2015 Prof. Ehud Gudes Security Ch 1 1 Chapter 0 - Overview.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
“Network Security” Introduction. My Introduction Obaid Ullah Owais Khan Obaid Ullah Owais Khan B.E (I.T) – Hamdard University(2003), Karachi B.E (I.T)
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Introduction to Operating Systems J. H. Wang Sep. 18, 2012.
1 Computer Engineering Department Islamic University of Gaza ECOM 5347 Network Security Undergraduate Course Fall 2013 Prof. Mohammad A. Mikki Room I215.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
Course Introduction Software Engineering
Network Security CS nd Term Course Syllabus Cairo University Faculty of Computers and Information.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Introduction to Discrete Mathematics J. H. Wang Sep. 14, 2010.
Introduction to Operating Systems J. H. Wang Sep. 18, 2015.
@Yuan Xue CS 285 Network Security Fall 2008.
Course Overview for Web Computing J. H. Wang Sep. 19, 2011.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
Computer Network Management Course
Introduction to Information Security J. H. Wang Sep. 10, 2013.
Object Oriented Programming (FIT-II) J. H. Wang Feb. 20, 2009.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Welcome! CSI 4118: Computer Networks and Protocols (3,0,0) Professor: Dr. Robert L. Probert Office: SITE 5098 Phone: x6709
Multimedia Systems Lecture 1: Introduction Prof. Charlene Tsai
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 28 Omar Meqdadi Department of Computer Science and Software Engineering.
Introduction to Operating Systems J. H. Wang Sep. 15, 2010.
Proposal for Term Project Information Security, Fall 2014 J. H. Wang Sep. 25, 2014.
8/25/2010CS 686 Course Outline and Questionnaire EJ Jung CS 686 Special Topics in CS Privacy and Security.
Introduction to Computer Programming (FIT-I pro) J. H. Wang Sep. 17, 2007.
ICOM 5018 Network Security and Cryptography Description This course introduces and provides practical experience in network security issues and cryptographic.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
Course Overview for Compilers J. H. Wang Sep. 14, 2015.
Object Oriented Programming (FIT-II) J. H. Wang Jan. 31, 2008.
ICOM 5995 (crypto) - Noack Crypto - Administrivia Prontuario - Please time-share and ask questions Info is in my homepage amadeus.uprm.edu/~noack/ Make.
1 CDA 4527 Computer Communication Networking (not “analysis”) Prof. Cliff Zou School of Electrical Engineering and Computer Science University of Central.
Course Overview for Compilers J. H. Wang Sep. 20, 2011.
Introduction to Operating Systems J. H. Wang Sep. 13, 2013.
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
Lecture 1 Page 1 CS 236 Online Introduction CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Dr. Ying Lu ylu at cse.unl.edu Schorr Center Aug 22, CSCE 351 Operating System Kernels.
Course Overview: Linear Algebra
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
Course Overview Stephen M. Thebaut, Ph.D. University of Florida Software Engineering.
@Yuan Xue CS 285 Network Security Fall 2013 Yuan Xue.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Proposal for Term Project Information Security, Fall 2013 J. H. Wang Nov. 5, 2013.
CEN 621 Cryptography and Network Security Spring Term CEN 621 Cryptography and Network Security Spring Term INTERNATIONAL BURCH UNIVERSITY.
Introduction to Operating Systems
Computer Engineering Department Islamic University of Gaza
Proposal for Term Project Information Security, Fall 2016
Course Introduction 공학대학원 데이타베이스
Syllabus Introduction to Computer Science
CNT 4704 Computer Communication Networking (not “analysis”)
Introduction to Information Security
Introduction to Information Security
Data & Network Security
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
Introduction to Operating Systems
Andy Wang Operating Systems COP 4610 / CGS 5765
Introduction to the course
Student Class Presentations Schedule
Computer Engineering Department Islamic University of Gaza ECOM 5347
Computer Engineering Department Islamic University of Gaza
Introduction to Course
Presentation transcript:

Introduction to Information Security J. H. Wang Sep. 15, 2014

Instructor –Jenq-Haur Wang ( 王正豪 ) –Associate Professor, CSIE, NTUT –Office: R1534, Technology Building – –Homepage: –Tel: ext. 4238

Course Overview Course: Information Security Time: 9:10-12:00am on Mondays Classroom: R627, 6th Teaching Building Prerequisite: Discrete Mathematics, Computer Networks Course webpage: –The latest announcement and schedule updates TA: (TBD)

Target Students For those who –Major in Computer Science or Information Technology, and –Are familiar with basic computer networks and discrete mathematics, and –Are preparing to investigate more details in selected topics and recent developments in system, networks, and information security

Resources Textbook: Network Security Essentials: Applications and Standards, 5th ed., by William Stallings, Pearson Education, Inc., (imported by Kai-Fa Publishing) – –(International Edition is available now, but earlier versions are also acceptable) –Online chapters and appendices available References: – Cryptography and Network Security: Principles and Practice, Sixth Edition, by William Stallings, Prentice-Hall, 2013 (from which our textbook is adapted) –Slides, documents, and tools

Teaching Lectures Homework assignments –Homework should be turned in within two weeks Mid-term exam and quiz Term project: programming exercises or topical surveys –How do intruders attack our systems –What kinds of security tools are available –How do we protect against attacks

Grading Policy (Tentative) grading policy –Homework assignments: ~30% –Midterm exam and quiz: ~35% –Term projects: ~35% Programming exercises or topical surveys

Course Description Introduction to basic concepts in information security and their applications –Cryptography Encryption, hash function, digital signature –Network security applications HTTPS, wireless security, security, IP security –System security Intrusion, virus, firewall

What is Information Security? Example scenarios –Receiving unsolicited messages, spam, phishing, advertisements, … –Computer system hijacked: popups, hanged, … –Communication gets wiretapped or eavesdropped… –Fake online transaction –Your friend denied receipt of your message –Disputes on the rights of an image –Playing online audio without permission –Natural disaster: fire, physical attacks (911), … –…

More Security-Related Terms System security –User authentication, access control –Database security –OS security, infrastructure –Software security: browser, malicious software, virus Network security –Networking protocol, applications –E-commerce, … Information security –Spam, phishing, … –Multimedia security: watermarking, information hiding, digital rights management (DRM), …

Outline & Schedule Outline –Introduction (Ch. 1) –Cryptography (Ch. 2-3) Symmetric encryption and message confidentiality Public-key cryptography and message authentication –Network security applications (Ch. 4-9) [Ch.4-8 in 4 th ed.] Key distribution and user authentication Network access control and cloud security [new in 5 th ed.] Transport-level security Wireless network security Electronic mail security IP security –System security (Ch ) [Ch.9-11 in 4 th ed.] Intruders Malicious software Firewalls

Outline & Schedule (Cont’) –Online chapters (Ch.13-15) [Ch in 4 th ed.] Network management security Legal and ethical aspects SHA-3 [new in 5 th ed.] –Appendices Some aspects of number theory Projects for teaching network security –Online appendices Standards and organizations TCP/IP and OSI Pseudorandom number generation Kerberos encryption techniques Data compression using ZIP PGP random number generation The base-rate fallacy [new in 5 th ed.] Radix-64 conversion [new in 5 th ed.]

Outline & Schedule (Cont’) (Tentative) Schedule –Introduction: 1-2 wks –Cryptography: 3-4 wks –Network security applications: 7-8 wks TCP/IP Web, SSH, , IP security –System security: 1-2 wks Password, virus, intrusion detection, firewall Due to the time limits, we will try to cover most of the major topics above without going into too much detail –E.g.: mathematical parts such as number theory (Appendix A) –A broad overview, and then focus on selected topics in depth

Additional Resources Review on computer networking and TCP/IP protocols More slides on network and information security Useful tools for network and system security Web resources and recommended reading (at the end of each chapter)

More on Term Project Programming exercises using security libraries –Implementation of security algorithms (AES, RSA, …) –Implementation of a client-server application (e.g. secured communication tool, file exchange, transactions, …) –… Topical surveys in information security-related topics, e.g.: –Demonstration on how to use a security tool to defend against some attacks –Comparison of security standards or algorithms –Potential security weakness in systems, and possible solutions or countermeasures –The latest developments in information security

More on Term Project Proposal: required after midterm (Due: Nov. 24, 2014) –One-page description of what you want to do for the term project, and team members Presentation: required for each team –In the last three (to four) weeks of this semester: (Dec.22, ) Dec. 29, Jan. 5, Jan. 12 Final report: –Presentation files, source codes and executable files

Thanks for Your Attention!