Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.

Slides:



Advertisements
Similar presentations
Computer Network Management
Advertisements

Chapter 1  Introduction 1 Chapter 1: Introduction.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
ECE 355 Introduction to Computer Networks and Data Communications
Network Security Chapter 8. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
SKR 5200 Advanced Network Security
Business Data Communications, Fourth Edition Chapter 10: Network Security.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
“Network Security” Introduction. My Introduction Obaid Ullah Owais Khan Obaid Ullah Owais Khan B.E (I.T) – Hamdard University(2003), Karachi B.E (I.T)
Chapter 8 Network Security 4/17/2017
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
Performance Evaluation of Computer Systems and Networks By Behzad Akbari Tarbiat Modares University Spring 2012 In the Name of the Most High.
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
CS 453 Introduction to Data and computer communications Syllabus Vinod Kulathumani West Virginia University.
Computer Network Fundamentals CNT4007C
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Information Security Principles (ESGD4222)
Advanced Computer Networks by Behzad Akbari Spring 2011 In the Name of the Most High.
Computer Networks CEN 5501C Spring, 2008 Ye Xia (Pronounced as “Yeh Siah”)
Introduction to Information Security J. H. Wang Sep. 15, 2014.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
SECURING Presented by: Digvijay Singh Dudi Graduate Student Old Dominion University.
1 ECE 156 Computer Network Architecture Professor Krish Chakrabarty Department of Electrical and Computer Engineering Fall 2006.
Krerk Piromsopa. Network Security Krerk Piromsopa. Department of Computer Engineering. Chulalongkorn University.
© Uppsala University, IT Dept. Computer Networks I / DT052 Computer Networks I Dr. Edith C.-H. Ngai Department of Information Technology Uppsala.
Advanced Computer Networking Course Overview 1. This is a graduate-level course which covers advanced topics in computer networks including current hot.
Computer Network Management Course
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
Introduction to Information Security J. H. Wang Sep. 10, 2013.
Network Security David Lazăr.
CS441 Introduction to Computer Networks Spring 2010 Tu/Th 10:30am-Noon Sue Moon 1.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 29 Internet Security.
© Uppsala University, IT Dept. Computer Networks I / DT014/1TT821 Computer Networks I Dr. Edith C.-H. Ngai Department of Information Technology.
1DT057 Distributed Information System Dr. Edith C.-H. Ngai Department of Information Technology Uppsala University.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Network Security Chapter 8 12/13/ Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
1 CDA 4527 Computer Networking Prof. Cliff Zou School of Computer Science University of Central Florida Fall 2005.
ICOM 5995 (crypto) - Noack Crypto - Administrivia Prontuario - Please time-share and ask questions Info is in my homepage amadeus.uprm.edu/~noack/ Make.
Advanced Computer Network
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Polytechnic University Introduction1 CS 393/682: Network Security Professor Keith W. Ross.
1 CDA 4527 Computer Communication Networking (not “analysis”) Prof. Cliff Zou School of Electrical Engineering and Computer Science University of Central.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
ECE 374: Computer Networks & Internet Introduction Spring 2015 Prof. Michael Zink.
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
ECE 374: Computer Networks & Internet Introduction Spring 2012 Prof. Michael Zink.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
© Uppsala University, IT Dept. Computer Networks I / DT052 Computer Networks I Dr. Edith C.-H. Ngai Department of Information Technology Uppsala.
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
@Yuan Xue CS 283Computer Networks Spring 2011 Instructor: Yuan Xue.
Network Security Chapter 8 Institute of Information Science and Technology. Chengdu University YiYong 2008 年 2 月 25 日.
CEN 621 Cryptography and Network Security Spring Term CEN 621 Cryptography and Network Security Spring Term INTERNATIONAL BURCH UNIVERSITY.
Opracowanie językowe dr inż. J. Jarnicki
Introduction to Information Security
Introduction to Information Security
Chapter 8 Network Security.
Cryptography and Network Security
Chapter 8 Network Security.
Security Protocols in the Internet
Introduction to the course
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
The University of Adelaide, School of Computer Science
Intro. to Computer Network
Introduction to Course
Presentation transcript:

Network Security by Behzad Akbari Spring 2012 In the Name of the Most High

2 Advanced Computer Networks Instructor Behzad Akbari: TA Course Web Site

3 Network Security Course objective  To make acquainted the graduate students with good knowledge of fundamentals of network security including basic security concepts, protocols, standards, tools and applications. Prerequisites  Computer Networks.  C programming.

4 Network Security Textbook  Network Security Essentials: Applications and Standards (4rd Edition) by William Stallings. Reference book  Cryptography and Network Security: Principles and Practices (4rd Edition), by William Stallings. For the background on computer networks and also for some class lectures we suggest following reference books: Computer Networking: A Top-Down Approach, Featuring the Internet, by James Kurose and Keith Ross, 5rd Edition, Computer Networking: A Top-Down Approach, Featuring the Internet Computer Networks: A Systems Approach, by Larry L. Peterson, Bruce S. Davie, 4rd Edition, Computer Networks: A Systems Approach

5 Grading  There will be Homework, Project, Mid-Term and Final Exams. The grade will be determined by: Homework: 15% Project: 15% Seminar: 10% Mid-Term Exam: 30% Final Exam: 30% Network Security

6 Tentative Course Outline Introduction  Types of attacks  Security services  A model for network secuirity  Internet standards, RFCs. Conventional Encryption  Ciphers  Information theory and entropy  DES  Cipher block chaining  location of encryption devices  Key distribution  DNS and IP addressing. Public Key Cryptography  Message authentication  One way hash functions  Public key principles and algorithms  Digital signatures  Key management.

7 Tentative Course Outline (Cont.) Authentication Applications  Kerberos  X.509 authentication service. Electronic Mail Security  Pretty Good Privacy (PGP)  S/MIME IP Security  IPSec  Tunneling,  Transport  Security Associations  AH and ESP Firewalls  Packet filtering  Application and circuit gateways  NAT,  Split DNS  SSH,  Trusted Systems

8 Tentative Course Outline (Cont.) Web Security  Web fundamentals, attacks and security  SSL  TLS  SET Intruders  Intruders  Intrusion detection  Password management Wireless Security Malicious Software  Malicious programs  Viruses, worms and Trojan horses  Digital immune system.

9 Tentative Course Outline (Cont.) Advanced Topics  DOS and DDOS  Peer-to-Peer Network Security  Network Security Monitoring