1 / 8

CompSci and InfoSec Build your own Internet

CompSci and InfoSec Build your own Internet. 22.10.13 Pierre- Malo Deniélou , Lorenzo Cavallaro, Dave Cohen. Challenge overview. The Internet and its security : where computational thinking affects lives A reliable world-wide fast network: transforming the modern world

dai-chan
Download Presentation

CompSci and InfoSec Build your own Internet

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CompSci and InfoSecBuild your own Internet 22.10.13 Pierre-MaloDeniélou, Lorenzo Cavallaro, Dave Cohen

  2. Challenge overview • The Internet and its security: where computational thinking affects lives • A reliable world-wide fast network: transforming the modern world • Secure and Safe: what would happen if this Network were to collapse? • The Internet: • A network of communicators • Resilient: No link is essential. The Internet routes around breakages • Secure: We can prevent unwanted eavesdropping • Reliable: We can be certain that every message gets through • Flexible: One protocol that can contain any payload package • Scalable−Seamlessly add/remove nodes It’s the Algorithms that make it Tick

  3. Curriculum links • This STEM challenge will support the new Computing Curriculum • Algorithmic thinking • Exciting programming tasks • An understanding of the Internet and networks in general • An understanding of security vulnerabilities and attacks • Each topic will be studied with a variety of learning methods: role play, individual research, programming and maths challenges, competition etc., Aims for the newly published Computing Curriculum • Can understand and apply fundamental principles of computer science • Can analyse problems in computational terms, and have experience of writing programs • Can evaluate and apply IT analytically to solve problems • Are responsible, competent, confident and creative users of ICT We Tick the Boxes

  4. Examples of activities • Routing past problems (the RIPalgorithm):Self-organising networks protect the independence of the Internet • Fix it (Error Correcting Codes): Keeping data coherent across unreliable channels has allowed space exploration, CDs, cheap memory, allowing computational power into almost all human spheres • What’s in a name? (Domain Name Service): Makes the Internet available to people and allows communication between individuals • Public key cryptosystems (RSA):Simple data encryption and signing gives confidence in transactions. This enabled online shopping! • How the Internet speaks (TCP/IP): Overcoming inherent limits of technology with simple techniques and algorithms

  5. The Team • Professor Dave Cohen • Researcher in Artificial Intelligence with 100+ • published papers. • He teaches Robotics and Software Engineering at • Royal Holloway • He has been awarded two University Teaching • Excellence awards • Shortlisted (this year) for the Times Higher Most • Innovative Teacher of the Year award • Dave has 20 years of industrial experience working • as a programmer

  6. The Team (cont.) • Dr Pierre-MaloDeniélou • Lecturer in Computer Science • He teaches Object-Oriented Programming at Royal Holloway • He is interested in (and very good at) programming language-based security, formal methods and concurrency • He is very involved in teaching Computing at all levels and has co-written Labby, a tool to learn programming for all ages

  7. The Team (cont.) • Dr Lorenzo Cavallaro • Lecturer of Information Security in the • Information Security Group • He teaches Software Security at Royal Holloway • He has recently taught a MOOC course on Coursera • “Malicious Software and its Underground Economy: • Two-Sides to Every Story” (60,000+ enrolled students) • He has published in top and well-known venues • Lorenzo is also exploring Android security research • (see http://copperdroid.isg.rhul.ac.uk)

More Related