01_introduction - IK2206 Internet Security and Privacy...

Info iconThis preview shows pages 1–11. Sign up to view the full content.

View Full Document Right Arrow Icon
1 IK2206 Internet Security and Privacy Peter Sjödin, psj@kth.se
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Introduction Staff Goal Planning and rules Lectures Recitations Laboration Material Book Course web Responsibilities of participants
Background image of page 2
Staff Lectures Markus Hidell Karl-Johan Grinnemo Peter Sjödin Labs Karl-Johan Grinnemo Pehr Söderman Seminars Karl-Johan Grinnemo Raul Jimenez Pehr Söderman You can contact us through the course web 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 Goal This course is about techniques for secure communication protocols We will cover Security mechanisms Crypthography Key management Authentication Design of secure protocols Pitfalls Attacks and defenses Network attacks Defense systems Spam, phishing, worms, …
Background image of page 4
5 What We Will Not Cover Computer security Cryptography in detail Legal, ethical, economical issues System security Organization security
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 Course Requirements The course has four components 1) Course work assignments 2) Labs 3) Seminars 4) Exam
Background image of page 6
7 Course Work Assignments Home assignments during the course Four home assignments total Each assignment consists of a number of problems Handed in at deadlines We only accept submissions via course web Requirements You need to hand in 75% of the problems We will randomly pick four of your solutions, and check that you have made a serious attempt at solving them Solutions published on course web Forum on the course web for questions and discussions
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Lab1: Email security with GPG PGP security – Create and manage encryption keys – Encrypt, decrypt and cryptographically sign documents and emails On-line – On your own computer, in your own time – Although you have to submit your solution before the deadline Done individually – Doing someone else’s lab, or letting someone else do the lab for you, is cheating, and will be reported as such. 8
Background image of page 8
Lab 2: Packet Filtering with Iptables Firewalls – System security – Packet filtering in Linux – Design and configuration of firewall filters Groups of two students Remotely on dedicated equipment in Netlab – Each group is allocated a time slot (48 hours) 9
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
10 Seminars Presentations on a chosen topic – Oral and in writing – You have some freedom in choosing topic Groups of 2-3 students
Background image of page 10
Image of page 11
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 36

01_introduction - IK2206 Internet Security and Privacy...

This preview shows document pages 1 - 11. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online