Presentation is loading. Please wait.

Presentation is loading. Please wait.

Introduction to Network Security J. H. Wang Feb. 24, 2011.

Similar presentations


Presentation on theme: "Introduction to Network Security J. H. Wang Feb. 24, 2011."— Presentation transcript:

1 Introduction to Network Security J. H. Wang Feb. 24, 2011

2 Instructor –Jenq-Haur Wang ( 王正豪 ) –Assistant Professor, CSIE, NTUT –Office: R1534, Technology Building –E-mail: jhwang@csie.ntut.edu.twjhwang@csie.ntut.edu.tw –Homepage: http://www.ntut.edu.tw/~jhwang/http://www.ntut.edu.tw/~jhwang/ –Tel: ext. 4238 –Office Hour: 10:10-12:00am every Wednesday and Thursday

3 Course Overview Course: Network Security Time: 15:10-18:00pm on Thursdays Classroom: R526, 6th Teaching Building Prerequisite: Discrete Mathematics, Computer Networks Course webpage: http://www.ntut.edu.tw/~jhwang/NS/ http://www.ntut.edu.tw/~jhwang/NS/

4 Target Students For those who –Major in Computer Science or Information Technology, and –Are familiar with basic computer networks and discrete mathematics, and –Are preparing to investigate more details in selected topics and recent developments in network and system security

5 Resources Textbook: Network Security Essentials: Applications and Standards, 4th ed., by William Stallings, Pearson Education, Inc., 2011. (International Edition, imported by Kai-Fa Publishing) –http://williamstallings.com/NetSec/NetSec4e.htmlhttp://williamstallings.com/NetSec/NetSec4e.html –Online chapters and appendices available References: – Cryptography and Network Security: Principles and Practice, Fifth Edition, by William Stallings, Prentice-Hall, 2011 (from which our textbook is adapted) –Slides, documents, and tools

6 Teaching Lectures Homework assignments –Homework should be turned in within two weeks Lab exercises or topical surveys –How to use a security tool –How do intruders attack our systems –How do we protect against attacks Mid-term and final exams

7 Grading Policy (Tentative) grading policy –Homework assignments: 30% –Attendance, lab exercises or topical surveys: 25% –Midterm and final exams: 45%

8 Course Description Introduction to basic concepts in network security and their applications –Cryptography Encryption, hash function, digital signature –Network security applications HTTPS, wireless security, e-mail security, IP security –System security Intrusion, virus, firewall

9 Outline & Schedule Outline –Introduction –Cryptography (Ch. 2-3) Symmetric encryption and message confidentiality Public-key cryptography and message authentication –Network security applications (Ch. 4-8) Key distribution and user authentication Transport-level security Wireless network security Electronic mail security IP security –System security (Ch. 9-11) Intruders Malicious software Firewalls

10 Outline & Schedule (Cont’) –Online chapters (Ch.12-13) Network management security Legal and ethical aspects

11 Outline & Schedule (Cont’) (Tentative) Schedule –Introduction: 1-2 wks –Cryptography: 3-4 wks –Network security applications: 7-8 wks TCP/IP Web, SSH, E-mail, IP security –System security: 1-2 wks Intrusion detection, password, virus, firewall Due to the time limits, we will try to cover most of the major topics above without going too much into details –E.g.: mathematical parts such as number theory (Appendix A) –A broad overview, and then focus on selected topics in depth

12 Additional Resources Review on computer networking and TCP/IP protocols Slides on network and information security Useful tools for network and system security Web resources and recommended reading (at the end of each chapter)

13 More on Lab Exercises or Topical Surveys We might give lab exercises or surveys in network security-related topics, e.g.: –Demonstration on how to use a network security tool –Comparison of security standards or algorithms –Potential security weakness in systems, and possible solutions or countermeasures –…

14 Thanks for Your Attention!


Download ppt "Introduction to Network Security J. H. Wang Feb. 24, 2011."

Similar presentations


Ads by Google