Lecture 1

Lecture 1 - CS682/393 Network Security Week 1 Introduction...

Info iconThis preview shows pages 1–17. Sign up to view the full content.

View Full Document Right Arrow Icon
CS682/393 Network Security Week 1 Introduction
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Who am I Nasir Memon LC 116 Dibner – 718 260 3970 memon@poly.edu OfFce hours 4 to 6 pm Wednesdays Open door - calendar on my website.
Background image of page 2
Who are you? BS, MS, Cyber Security, CS, CE, EE? What do you expect from this course?
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Course Logistics Two sections - MOVE TO MONDAY SECTION!! Will be using my.poly for class material You are responsible for checking it everyday Labs 1 and 2 posted. Due in two weeks!!! Intensive hands-on component. Will be using Virtual Lab
Background image of page 4
Course Policies Lab 40%. Midterm and Final 20% each and term paper 20% (Graduates only) Labs 1 and 2 are on-line. Start working today! Lab 1 due next week!! No late HW or Labs accepted. Lowest two dropped (8 to 12 total) Plagiarism policy
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Prerequisites for CS682 Knowledge of networking Basic Understanding of Operating Systems Mature programmer. Should be able to pick up whatever is needed.
Background image of page 6
Information Security Mark Stamp ISBN: 0471738484 Published: 2005 Also available on the Amazon Kindle Practical Cryptography (OPTIONAL) Neils Ferguson, Bruce Schneier ISBN: 0471223573 Published: 2003 Counter Hack Reloaded Ed Skoudis ISBN: 0131481045 Published: 2006 Textbooks:
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
What is This Course about? We will explore: Various vulnerabilities in network protocols and services. Mechanisms to protect networks. Security tools.
Background image of page 8
Overview of This Course Network security theory and practice In homework Explore TCP/IP vulnerabilities Write penetration testing on your code and algorithm. Learn to setup security and how to integrate them. “War Games” – A serious one if time permits
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Today’s Goal What do we mean by security and how to think about it?
Background image of page 10
The Cast of Characters Alice and Bob are the good guys Trudy is the bad guy So is Oscar And so is Mallory And so is Memon
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Alice’s Online Bank Alice opens Alice’s Online Bank (AOB) What are Alice’s security concerns? If Bob is a customer of AOB, what are his security concerns? How are Alice and Bob concerns similar? How are they different? How does Trudy view the situation?
Background image of page 12
CIA Confdentiality, Integrity, and Availability AOB must prevent Trudy From learning Bob’s account balance Confdentiality: prevent unauthorized reading oF inFormation
Background image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CIA Trudy must not be able to change Bob’s account balance Bob must not be able to improperly change his own account balance Integrity: prevent unauthorized writing of information
Background image of page 14
CIA AOB’s information must be available when needed Alice must be able to make transaction If not, she’ll take her business elsewhere Availability: Data is available in a timely manner when needed Availability is a “new” security concern In response to denial of service (DoS)
Background image of page 15

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Beyond CIA How does Bob’s computer know that “Bob” is really Bob and not Trudy? Bob’s password must be verifed
Background image of page 16
Image of page 17
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 11/02/2010 for the course CS 393 taught by Professor Staff during the Spring '08 term at NYU Poly.

Page1 / 75

Lecture 1 - CS682/393 Network Security Week 1 Introduction...

This preview shows document pages 1 - 17. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online