1 / 16

Course Introduction

Course Introduction. INFSCI 1075: Network Security Amir Masoumzadeh. Contact Information. Instructor Amir ( Amirreza Masoumzadeh ) Web: http://www.sis.pitt.edu/~amirreza / Email : amirreza _at_ sis.pitt.edu Please include “IS1075” in the subject

delila
Download Presentation

Course Introduction

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Course Introduction INFSCI 1075: Network Security Amir Masoumzadeh

  2. Contact Information • Instructor • Amir (AmirrezaMasoumzadeh) • Web: http://www.sis.pitt.edu/~amirreza/ • Email: amirreza _at_ sis.pitt.edu • Please include “IS1075” in the subject • 410 IS Bldg. (LERSAIS), 2nd cubicle on your right • Office hours: Tuesdays 2pm-4pm / by appointment • GSA • TBA

  3. Course Overview • Deals with security issues related to the network • Common attacks originating from the network • Prevention and detection of attacks • Perimeter Security, Monitoring, etc. • Protocols for enhancing security (e.g. Cryptographic Protocols) • Assessment of network security and response to attacks

  4. Course Overview: More Details • Common Attacks • DoS attacks, DDoS attacks, Worms, Masquerading, Enumeration, etc. • Cryptographic Protocols • Cryptography, IPSec, SSL/TLS, PGP, Wireless Security, etc. • Security • Packet Filters, Stateful Firewalls, Proxy Firewalls, IDS and IPS • Monitoring • Sniffers, Network Monitoring and Logging Tools

  5. Prerequisites • INFSCI 1070 – Introduction to Telecom and Networks • Good knowledge of TCP/IP and related protocols • Will be quickly reviewed, but you should feel comfortable with network basics (MAC, TCP/IP, HTTP, etc.) • Algebra and digital logic • Modulo operation, XOR operation • Will be reviewed • To understand encryption schemes • INFSCI 0017 – Introduction to Programming • Probably won't do much programming but ...

  6. Textbooks & References • Network Security: The Complete Reference • Roberta Bragg et. al., McGraw-Hill Osborne Media, November 2003 ISBN: 0072226978 • Cryptography and Network Security, Principles and Practice, 4/Ed. or 5/Ed., • William Stallings, Prentice Hall, 2011, ISBN: 0136097049 (Optional) • We also use other books and online materials • Safari books • http://www.library.pitt.edu/articles/database_info/safari.html • Use “Secure Remote Access” • https://sremote.pitt.edu • Readings will be specified for each lecture • You are expected to read the specified references for each lecture before coming to the class • Not every details can be covered in the lectures • Evaluation is based on both readings and lectures

  7. Some Other References • [1] Cryptography and Network Security: Principles and Practices, 4th Ed, William Stallings, Pearson Education, 2006, (0-13-187316-4) • [2] Hacking Exposed (Fifth Edition) – Stuart McClure, Joel Scambray, George Kurts (0-07-226081-5) • [3] Penetration Testing and Network Defense – Andrew Whitaker, Daniel Newman (1-58705-208-3) • [4] Network Security – Private Communication in a Public World – Charlie Kaufman, Radia Perlman, Mike Speciner, (0-13-046019-2) • [5] Firewalls and Internet Security (2nd Edition) – William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin (0-201-63466-X) • [6] Cryptography and Network Security – Behrouz A. Forouzan (978-0-07-287022-0)

  8. Some Other References (Cont.) • [7] Computer Security Lab Manual – Vincent J. Nestler, et. al. (0-07-225508-0) • [8] The Craft of System Security, Sean Smith and John Marchesini - (0-321-43483-8) • [9] Network Intrusion Detection: An Analyst’s Handbook, by S. Northcutt and J. Novak, New Riders, Indianapolis, 2001. • [10] Inside Network Perimeter Security, by S. Northcutt and others, New Riders, Indianapolis, 2005. • [11] Real 802.11 Security: Wi-Fi Protected Access and 802.11i, by J. Edney and W.A. Arbaugh, Prentice Hall, 2004. • [13] The Tao of Network Security Monitoring, by Richard Bejtlich, Addison-Wesley, 2004.

  9. Grading • 20% Homework (~6) • 30% Labs (~5) • 15% Quizzes (~10) • 15% Midterm • 20% Final Exam • +10% Optional Term Project

  10. Course Logistics • Website • http://www.sis.pitt.edu/~amirreza/is1075-spring13/ • Course Information • Lecture Schedule and Slides • CourseWeb • https://courseweb.pitt.edu/ • Announcements/Communication • Homework, labs, and sample solutions • Grades

  11. Assignments • Homework and lab assignments must be delivered by 11-am of the due dates (beginning of the class) • There will be 10% penalty for every day late (max two days) • No late submission is accepted after two days! • Ask the GSA if you have problem with Homework/Labs • I will be also constantly monitoring and answering questions if necessary • Use discussion board on CourseWeb • Sample solutions will be posted on CourseWeb • Pre-configured equipment will be provided for labs

  12. Quizzes & Exams • Quizzes • Short quizzes throughout the semester at the beginning of the class • Quizzes will be based on recent materials • You cannot take a make-up if you miss a quiz (make sure you don’t!) • Your lowest grade will be dropped • Quizzes and Exams are closed book • Exams • Samples will be provided before the exam • All written work must be legible and clear to receive credit • I should be able to understand what you are trying to do/say without verbal explanations later • No credit for vague answers, unclear steps, magical solutions, etc.

  13. Policies • Academic Integrity • No copying from web or other books without understanding the material • If you use such material cite your source properly • Students may discuss homework assignments and work together • The final product for each student MUST be his or her own work • Zero tolerance for cheating • At a minimum, cheating will result in a grade of zero on the assignment • Depending on the circumstances, you may also receive a grade of ‘F’ for the course

  14. Tentative Course Syllabus - I • Introduction • What is network security? • Why is network security necessary? • Basic security concepts and terminology • Review of Network Basics • Network operation • Common network protocols, services and applications of interest. • TCP/IP, DNS, ICMP, etc. • Discussion of some common network attacks • The Process of an Attack, Risks and Vulnerabilities • Examples: SYN Flood attacks, SMURF Attacks • Authentication failures

  15. Tentative Course Syllabus - II • Network Prevention/Protection • Cryptography • Secret key, public key, message authentication, key management • Cryptographic Protocols • Protocol flaws and pitfalls • Support for cryptographic protocols - PKI • Specific examples • PGP, Kerberos, SSL, IPSec • Wireless networks • Perimeter Security • Firewalls

  16. Tentative Course Syllabus - III • Detection • Importance of detection • IDS and IPS • Monitoring, logging and auditing • Housekeeping procedures • Vulnerability Assessment and Response • Network security in the “real world” • Security in organizations • Incident response • Legal issues

More Related