Introduction - Introduction Courseorganization Web...

Info icon This preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
CS 6v81 - Network Security Introduction
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Course organization Web: www.utdallas.edu/~ksarac/netsec/ Instructor: Dr. Kamil Sarac E-mail: [email protected] Office: ECS South 4.207 Phone: 972 883 2337 Office Hours: Monday (10am to 11am) Monday (5:30pm to 6:30pm) TA: TBA E-mail: TBA Office Hours: TBA 2
Image of page 2
Course organization E-Learning: I’ll use it to send e-mails, to post lectureslides, homework announcements and grades; will also use it to turn assignments in Recommended textbook: Network Security, Private Communication in a Public World, by Kaufman, Perlman, Speciner, 2 nd Edition. Grading: Two exams – each 30% of the grade Homework assignments – 16% of the grade Details – TBA Programming project – 20% of the grade Participation in hands on activities – 4% of the grade 3
Image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Course organization Topics (tentative): Crypto tools and their use in various protocols, Authentication, Standards Kerberos, PKI, IPsec, SSL/TLS, TCP/IP security Fundamental protocols in TCP/IP suite and related attacks ARP, IP, ICMP, TCP, UDP, etc., Protocols for network applications and their vulnerabilities DNS, SMTP, Telnet, FTP, HTTP, web, e-mail Wireless security, Security of Internet routing (BGP security), DoS attacks and counter measures, Firewalls and Internet security, 4
Image of page 4
Course organization Hands on activities: Hands on component of the course Basic attack life cycle exercises A lab session where your will attack and defend More info later on during the semester A 2-day long cyber game session where you will attack a server system Powerpoint slides: Will post on e-Learning Questions on course organization? 5
Image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Network security in a nutshell  Computer networks are composed of hosts interconnected by a communication infrastructure The communication infrastructure’s task is to deliver traffic between endpoints Hosts provide services and store information Users access services and exchange/store information Need to assure: Privacy/Confidentiality Integrity/Consistency Availability in a distributed setting 6 Following slides modified from those of G. Vigna  
Image of page 6
The solution to network security 7 Strong authentication of both services and users Reliable authorization/access control Effective abuse control Flawless protocols, infrastructure, operating systems, and applications Perfect policy Perfect policy enforcement …and every user is a security expert
Image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
The real world 8 Effective security protections are not deployed Administrators do not keep up with vendor updates/patches Sites do not monitor or restrict access to their internal hosts Organizations do not devote enough staff/resources to improve and maintain security (e.g., user education) Sites do not implement policies (if they have one!) Infrastructure service providers are driven by market/service, not security Users insist on using flawed applications (e.g., mail reader that automatically execute attachments)
Image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern