1 / 9

CAS CS 558

CAS CS 558. Network Security. Administrativia. General info. Instructor: Gene Itkis itkis+cs 558 cs.bu.edu Course page: www.cs.bu.edu/fac/itkis/ 558 Also found from the CS dept. courses page Web Resources: RFCs, documentation, tutorials, etc – google away!. Grading.

dfrisbie
Download Presentation

CAS CS 558

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CAS CS 558 Network Security

  2. Administrativia

  3. General info • Instructor: • Gene Itkis itkis+cs558 cs.bu.edu • Course page: • www.cs.bu.edu/fac/itkis/558 • Also found from the CS dept. courses page • Web Resources: • RFCs, documentation, tutorials, etc – google away! Gene Itkis, CS558: Computer Network Security

  4. Grading • Approximately: 60% - homeworks15% - midterm25% - final • Homeworks • pen & paper • Approximately weekly • No late submissions! Gene Itkis, CS558: Computer Network Security

  5. Info sources • WEB page www.cs.bu.edu/~itkis/558 • Lectures: TR 11am-12:30pm • Office hours: T12:30-1:30pm; R12:30-2:30pm • email – mailing list:csmail –a cs558 • For personal mail remember: there are many of you, 1 of me. So please do not take it personally in case of delays. Do not hesitate to call or stop by, esp. in case of delays! Gene Itkis, CS558: Computer Network Security

  6. Prerequisites • CS 235: Algebraic Algorithms • Number theoretic concepts & algorithms • Extended GCD, Modular Arithmetic, etc. • Will be reviewed quickly; also summarized in F: 2,4,9; Appendix Q • Basic algorithms complexity: feasible vs. infeasible • NOT required, but recommended: cs237 • Networks • Recommended; summarized in F: Appendix C • Layers, headers, etc. Gene Itkis, CS558: Computer Network Security

  7. Textbook(s) • Required Texts •  Behrouz A. Forouzan, Introduction to Cryptography and Network Security • Recommended texts (on reserve in Sci/Eng Library): • Eric Rescorla, SSL and TLS: Designing and Building Secure Systems • Bruce Schneier, Applied Cryptography • Supplemental Texts There are a few other useful/recommended texts: • Handbook of Applied Cryptography, by Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, This book is available on-line at the above link! • SSL and TLS Essentials, by S. Thomas. 2000 • William Stallings, Cryptography and Network Security: Principles and Practice • On-line resources Gene Itkis, CS558: Computer Network Security

  8. Collaboration NO!!! • Discussing concepts and ideas is OK (encouraged!!!) • Always give credit when using someone else’s work • See web page for more details Gene Itkis, CS558: Computer Network Security

  9. Questions? End of Administrativia

More Related