Presentation is loading. Please wait.

Presentation is loading. Please wait.

CIS/TCOM 551 Computer and Network Security Slide Set 1 Carl A. Gunter Spring 2004.

Similar presentations


Presentation on theme: "CIS/TCOM 551 Computer and Network Security Slide Set 1 Carl A. Gunter Spring 2004."— Presentation transcript:

1 CIS/TCOM 551 Computer and Network Security Slide Set 1 Carl A. Gunter Spring 2004

2 Contact Information l Course web page: http://www.cis.upenn.edu/~cis551 l Gunter  Office: 509 Levine  Telephone: 215-898-9506  Office hour: 2 to 3 on Mondays  Email: gunter@cis.upenn.edu l Michael May  Email: mjmay@saul.cis.upenn.edumjmay@saul.cis.upenn.edu  Web: http://www.seas.upenn.edu/~mjmay

3 Pre-Requisites l TCOM 500 (or 512) is a pre-requisite for enrollment in CIS/TCOM 551 l CIS 500 is recommended l Programming  Some programming background is expected.  Distributed programming is desirable but we will teach it if you need to learn.

4 Course Scope l Design l Analysis l Programming Availability Integrity Confidentiality

5 Questions (Technical) l How does the security for these things work?  The ATM for my bank  The card reader on door of Levine  The fob for opening the doors on my minivan  My PennKey  The card purchase I made over the web  My active badge  The wireless network in SEAS  My Starbucks card and my DC subway pass

6 Questions (Policy and Industry) l How can we identify ourselves on the Internet? l How can I  Control the privacy of my data?  Properly use private data for commercial gain?  Properly use private data for enterprise management or research? l Will legislation help us with spam or DoS? l How can we secure computers attached to the Internet?

7 Organization of Lectures l Security threats, requirements, and models l Cryptology l Protocols l Internet and web architectures and security standards  Enterprise perimeters (firewalls and VPNs)  Electronic commerce (SSL and web services) l Security topics  Smart cards and biometrics  Security for ubiquitous computing and wireless networks  Topics as time allows

8 As Time Allows l Denial of Service (DoS) l Viruses l Access control systems l Spam l Legislative and international issues for cybersecurity l Intrusion detection l Privacy (technical and otherwise) l RFID tags

9 Possible References l Secure Electronic Commerce. Warwick Ford and Michael S. Baum. Prentice Hall 1996. l Network Security Essentials: Applications and Standards. William Stallings. Prentice Hall 2000. l Firewalls and Internet Security: Repelling the Wily Hacker, WR Cheswick and SM Bellovin, Addison-Wesley, 1994. l Security in Computing, CP Pfleeger and SL Pfleeger, 3 rd Edition, 2002.

10 Handbooks l Handbook of Applied Cryptography. Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. CRC 1997. l Applied Cryptography, Second Edition, Bruce Schneier, 1996.

11 History of Cryptology l The Codebreakers; The Comprehensive History of Secret Communication from Ancient Times to the Internet. David Kahn. Scribner 1996. l The Code Book : The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Simon Singh. Anchor Books 2000.

12 Reading for Fun and Profit l Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage. Clifford Stoll. Pocket Books 2000. l Crypto : How the Code Rebels Beat the Government -- Saving Privacy in the Digital Age. Steven Levy. Viking Press 2001. l Cryptonomicon. Neal Stephenson. Harperperennial Library 2000. l Secrets and Lies, Bruce Schneier, 2000.

13 Exams and Projects l Exams  First midterm: Feb 10 (drop date is Feb 13) 60 min 15%  Second midterm: March 25: 60 min, 15%  Final exam: Somewhere between April 29 and May 7, 120 minutes, 30% l Projects  3 or 4 term projects, 25%  Final project, due May 7, 15%


Download ppt "CIS/TCOM 551 Computer and Network Security Slide Set 1 Carl A. Gunter Spring 2004."

Similar presentations


Ads by Google