1 / 8

Network Security — Welcome and introduction

Network Security — Welcome and introduction. Network security at TKK, Nov-Dec 2009 Tuomas Aura. My background. Lecturer: Tuomas Aura, tuomas.aura@tkk.fi PhD from Helsinki University of Technology in 2000 Microsoft Research, UK, 2001–Sep 2009

trisha
Download Presentation

Network Security — Welcome and introduction

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Network Security — Welcome and introduction Network security at TKK, Nov-Dec 2009 Tuomas Aura

  2. My background • Lecturer: Tuomas Aura, tuomas.aura@tkk.fi • PhD from Helsinki University of Technology in 2000 • Microsoft Research, UK, 2001–Sep 2009 • Professor at TKK 2008–, full time since 1 Nov 2009 • Research: • Network security • Security protocol engineering • Security of mobility protocols (Mobile IPv6, SEND, etc.) • Privacy of mobile users • DoS resistance

  3. Course arrangements • Tuesdays and Wednesdays 13:15–16:00 T4 • Period II in year autumn 2009 • 10 lectures (6th week in reserve) • Exercises Fridays 14:15-16 T4 • First exercise session on 13 Nov, last on 11 Dec • Mandatory exercises • Course assistants: • JyrySuvilehto • Elena Reshetova • Examination 18 Dec 2009

  4. Recommended reading • Lecture handouts • Preliminary versions on my old Microsoft homepage • Final versions in Noppa after the lectures • William Stallings,Network security essentials: applications and standards, 3rd ed., Pearson Prentice Hall, 2007 • Kaufman, Perlman, and Speciner, Network security: PRIVATE communication in a PUBLIC world, Prentice-Hall, 2002 • Wikipedia, web, RFCs and standards

  5. Exercises • Mandatory exercises • Pass/fail, must pass at least 4 out of 5 rounds • Problems in Noppa by Friday each week • Solutions to be submitted by Thursday midnight before the Friday exercise session • Keep solutions to 2 pages per round • Submission instructions will be in Noppa • Try to solve all problems at least partly • The goal is not to have all right answers; the goal is to learn how to find information • Individual work; do not copy or even look at the written answers of other students; write your own

  6. Network security • Security goals: • Data confidentiality, data integrity and authentication • Access control for network access • Integrity of signalling protocols and routing systems • Denial-of-service (DoS) protection • Software security • Application-level security goals, e.g. non-repudiation • Security is not cryptography • Cryptography is seen as an abstract building block • Protocol design assuming the most common crypto primitives • Network technology • Must know about TCP/IP, 802.11, UMTS etc.

  7. Goals • Know common communications systems, classic security mechanisms, and some of the latest ideas • Understand network security technologies, their properties and limitations to use them right • Be aware of the pitfalls in security engineering: security is not just mathematics or just code • Starting point for learning more on the job or in further studies • Learn the adversarial mindset of security engineering

  8. Approximate course outline

More Related