Network Security Course Overview - INFSCI 1075 by Amir Masoumzadeh

undefined
Course Introduction
INFSCI 1075: Network Security
Amir Masoumzadeh
Contact Information
Instructor
Amir (Amirreza Masoumzadeh)
Web: 
http://www.sis.pitt.edu/~amirreza/
Email: amirreza _at_ sis.pitt.edu
Please include “IS1075” in the subject
410 IS Bldg. (LERSAIS),  2
nd
 cubicle on your right
Office hours:  Tuesdays 2pm-4pm / by appointment
GSA
TBA
2
Course Overview
Deals with security issues related to the
network
Common attacks originating from the network
Prevention and detection of attacks
Perimeter Security, Monitoring, etc.
Protocols for enhancing security (e.g. 
Cryptographic
Protocols
)
Assessment of network security and response to
attacks
3
Course Overview: More Details
Common Attacks
DoS attacks, DDoS attacks, Worms, Masquerading,
Enumeration, etc.
Cryptographic Protocols
Cryptography, IPSec, SSL/TLS, PGP,  Wireless Security, etc.
Security
Packet Filters, Stateful Firewalls, Proxy Firewalls, IDS and IPS
Monitoring
Sniffers, Network Monitoring and Logging Tools
4
Prerequisites
INFSCI 1070 – Introduction to Telecom and Networks
Good knowledge of TCP/IP and related protocols
Will be quickly reviewed
, but you should feel comfortable with
network basics (MAC, TCP/IP, HTTP, etc.)
Algebra and digital logic
Modulo operation, XOR operation
Will be reviewed
To understand encryption schemes
INFSCI 0017 – Introduction to Programming
Probably won't do much programming but ...
5
Textbooks & References
Network Security: The Complete Reference
Roberta Bragg et. al., McGraw-Hill Osborne Media, November 2003
ISBN: 0072226978
Cryptography and Network Security, Principles and Practice, 4/Ed.
or 5/Ed.,
William Stallings, Prentice Hall, 2011, ISBN: 0136097049 (Optional)
We also use other books and online materials
Safari books
http://www.library.pitt.edu/articles/database_info/safari.html
Use “Secure Remote Access”
https://sremote.pitt.edu
Readings will be specified for each lecture
You are expected to read the specified references for each lecture
before coming to the class
Not every details can be covered in the lectures
Evaluation is based on both readings and lectures
6
Some Other References
7
[1] Cryptography and Network Security: Principles and
Practices, 4th Ed, William Stallings, Pearson Education, 2006, (0-
13-187316-4)
[2] Hacking Exposed (Fifth Edition) – Stuart McClure, Joel
Scambray, George Kurts (0-07-226081-5)
[3] Penetration Testing and Network Defense – Andrew
Whitaker, Daniel Newman (1-58705-208-3)
[4] Network Security – Private Communication in a Public
World – Charlie Kaufman, Radia Perlman, Mike Speciner,
(0-13-046019-2)
[5] Firewalls and Internet Security (2nd Edition) – William R.
Cheswick, Steven M. Bellovin, Aviel D. Rubin (0-201-63466-X)
[6] Cryptography and Network Security – Behrouz A.
Forouzan (978-0-07-287022-0)
Some Other References (Cont.)
8
[7] Computer Security Lab Manual – Vincent J. Nestler, et. al.
(0-07-225508-0)
[8] The Craft of System Security, Sean Smith and John
Marchesini - (0-321-43483-8)
[9] Network Intrusion Detection: An Analyst’s Handbook,
by S. Northcutt and J. Novak, New Riders, Indianapolis,
2001.
[10] Inside Network Perimeter Security, by S. Northcutt
and others, New Riders, Indianapolis, 2005.
[11] Real 802.11 Security: Wi-Fi Protected Access and
802.11i, by J. Edney and W.A. Arbaugh, Prentice Hall, 2004.
[13] The Tao of Network Security Monitoring, by Richard
Bejtlich, Addison-Wesley, 2004.
Grading
20%  Homework (~6)
30%  Labs (~5)
15%  Quizzes (~10)
15%  Midterm
20%  Final Exam
+10%  Optional Term Project
9
Course Logistics
Website
http://www.sis.pitt.edu/~amirreza/is1075-spring13/
Course Information
Lecture Schedule and Slides
CourseWeb
https://courseweb.pitt.edu/
Announcements/Communication
Homework, labs, and sample solutions
Grades
10
Assignments
Homework and lab assignments must be delivered by 11-
am of the due dates (beginning of the class)
There will be 10% penalty for every day late (max two days)
No late submission is accepted after two days!
Ask the GSA if you have problem with
Homework/Labs
I will be also constantly monitoring and answering
questions if necessary
Use discussion board on CourseWeb
Sample solutions will be posted on CourseWeb
Pre-configured equipment will be provided for labs
11
Quizzes & Exams
Quizzes
Short quizzes throughout the semester at the beginning of the class
Quizzes will be based on recent materials
You cannot take a make-up if you miss a quiz (make sure you don’t!)
Your lowest grade will be dropped
Quizzes and Exams are closed book
Exams
Samples will be provided before the exam
All written work must be legible and clear to receive credit
I should be able to understand what you are trying to do/say without
verbal explanations later
No credit for vague answers,  unclear steps,  magical solutions, etc.
12
Policies
Academic Integrity
No copying from web or other books without
understanding the material
If you use such material cite your source properly
Students may discuss homework assignments and work
together
The final product for each student MUST be his or her own
work
Zero tolerance for cheating
At a minimum, cheating will result in a grade of zero on
the assignment
Depending on the circumstances, you may also receive a
grade of ‘F’ for the course
13
Tentative Course Syllabus - I
Introduction
What is network security?
Why is network security necessary?
Basic security concepts and terminology
Review of Network Basics
Network operation
Common network protocols, services and applications of interest.
TCP/IP, DNS, ICMP, etc.
Discussion of some common network attacks
The Process of an Attack, Risks and Vulnerabilities
Examples: SYN Flood attacks, SMURF Attacks
Authentication failures
14
Tentative Course Syllabus - II
15
Network Prevention/Protection
Cryptography
Secret key, public key, message authentication, key management
Cryptographic Protocols
Protocol flaws and pitfalls
Support for cryptographic protocols - PKI
Specific examples
PGP, Kerberos, SSL, IPSec
Wireless networks
Perimeter Security
Firewalls
Tentative Course Syllabus - III
16
Detection
Importance of detection
IDS and IPS
Monitoring, logging and auditing
Housekeeping procedures
Vulnerability Assessment and Response
Network security in the “real world”
Security in organizations
Incident response
Legal issues
Slide Note
Embed
Share

Network Security Course INFSCI 1075 by Amir Masoumzadeh focuses on security issues in networks, covering common attacks, prevention, detection, protocols like IPSec and SSL/TLS, cryptographic protocols, and more. The course prerequisites include knowledge of TCP/IP, algebra, digital logic, and basic programming. Textbooks and references provide additional resources for learning and evaluation.

  • Network Security
  • INFSCI 1075
  • Cybersecurity
  • Cryptographic Protocols
  • Network Attacks

Uploaded on Oct 01, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Course Introduction INFSCI 1075: Network Security Amir Masoumzadeh

  2. Contact Information Instructor Amir (Amirreza Masoumzadeh) Web: http://www.sis.pitt.edu/~amirreza/ Email: amirreza _at_ sis.pitt.edu Please include IS1075 in the subject 410 IS Bldg. (LERSAIS), 2ndcubicle on your right Office hours: Tuesdays 2pm-4pm / by appointment GSA TBA 2

  3. Course Overview Deals with security issues related to the network Common attacks originating from the network Prevention and detection of attacks Perimeter Security, Monitoring, etc. Protocols for enhancing security (e.g. Cryptographic Protocols) Assessment of network security and response to attacks 3

  4. Course Overview: More Details Common Attacks DoS attacks, DDoS attacks, Worms, Masquerading, Enumeration, etc. Cryptographic Protocols Cryptography, IPSec, SSL/TLS, PGP, Wireless Security, etc. Security Packet Filters, Stateful Firewalls, Proxy Firewalls, IDS and IPS Monitoring Sniffers, Network Monitoring and Logging Tools 4

  5. Prerequisites INFSCI 1070 Introduction to Telecom and Networks Good knowledge of TCP/IP and related protocols Will be quickly reviewed, but you should feel comfortable with network basics (MAC, TCP/IP, HTTP, etc.) Algebra and digital logic Modulo operation, XOR operation Will be reviewed To understand encryption schemes INFSCI 0017 Introduction to Programming Probably won't do much programming but ... 5

  6. Textbooks & References Network Security: The Complete Reference Roberta Bragg et. al., McGraw-Hill Osborne Media, November 2003 ISBN: 0072226978 Cryptography and Network Security, Principles and Practice, 4/Ed. or 5/Ed., William Stallings, Prentice Hall, 2011, ISBN: 0136097049 (Optional) We also use other books and online materials Safari books http://www.library.pitt.edu/articles/database_info/safari.html Use Secure Remote Access https://sremote.pitt.edu Readings will be specified for each lecture You are expected to read the specified references for each lecture before coming to the class Not every details can be covered in the lectures Evaluation is based on both readings and lectures 6

  7. Some Other References [1] Cryptography and Network Security: Principles and Practices, 4th Ed, William Stallings, Pearson Education, 2006, (0- 13-187316-4) [2] Hacking Exposed (Fifth Edition) Stuart McClure, Joel Scambray, George Kurts (0-07-226081-5) [3] Penetration Testing and Network Defense Andrew Whitaker, Daniel Newman (1-58705-208-3) [4] Network Security Private Communication in a Public World Charlie Kaufman, Radia Perlman, Mike Speciner, (0-13-046019-2) [5] Firewalls and Internet Security (2nd Edition) William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin (0-201-63466-X) [6] Cryptography and Network Security Behrouz A. Forouzan (978-0-07-287022-0) 7

  8. Some Other References (Cont.) [7] Computer Security Lab Manual Vincent J. Nestler, et. al. (0-07-225508-0) [8] The Craft of System Security, Sean Smith and John Marchesini - (0-321-43483-8) [9] Network Intrusion Detection: An Analyst s Handbook, by S. Northcutt and J. Novak, New Riders, Indianapolis, 2001. [10] Inside Network Perimeter Security, by S. Northcutt and others, New Riders, Indianapolis, 2005. [11] Real 802.11 Security: Wi-Fi Protected Access and 802.11i, by J. Edney and W.A. Arbaugh, Prentice Hall, 2004. [13] The Tao of Network Security Monitoring, by Richard Bejtlich, Addison-Wesley, 2004. 8

  9. Grading 20% Homework (~6) 30% Labs (~5) 15% Quizzes (~10) 15% Midterm 20% Final Exam +10% Optional Term Project Homework Labs Quizzes Midterm Final 9

  10. Course Logistics Website http://www.sis.pitt.edu/~amirreza/is1075-spring13/ Course Information Lecture Schedule and Slides CourseWeb https://courseweb.pitt.edu/ Announcements/Communication Homework, labs, and sample solutions Grades 10

  11. Assignments Homework and lab assignments must be delivered by 11- am of the due dates (beginning of the class) There will be 10% penalty for every day late (max two days) No late submission is accepted after two days! Ask the GSA if you have problem with Homework/Labs I will be also constantly monitoring and answering questions if necessary Use discussion board on CourseWeb Sample solutions will be posted on CourseWeb Pre-configured equipment will be provided for labs 11

  12. Quizzes & Exams Quizzes Short quizzes throughout the semester at the beginning of the class Quizzes will be based on recent materials You cannot take a make-up if you miss a quiz (make sure you don t!) Your lowest grade will be dropped Quizzes and Exams are closed book Exams Samples will be provided before the exam All written work must be legible and clear to receive credit I should be able to understand what you are trying to do/say without verbal explanations later No credit for vague answers, unclear steps, magical solutions, etc. 12

  13. Policies Academic Integrity No copying from web or other books without understanding the material If you use such material cite your source properly Students may discuss homework assignments and work together The final product for each student MUST be his or her own work Zero tolerance for cheating At a minimum, cheating will result in a grade of zero on the assignment Depending on the circumstances, you may also receive a grade of F for the course 13

  14. Tentative Course Syllabus - I Introduction What is network security? Why is network security necessary? Basic security concepts and terminology Review of Network Basics Network operation Common network protocols, services and applications of interest. TCP/IP, DNS, ICMP, etc. Discussion of some common network attacks The Process of an Attack, Risks and Vulnerabilities Examples: SYN Flood attacks, SMURF Attacks Authentication failures 14

  15. Tentative Course Syllabus - II Network Prevention/Protection Cryptography Secret key, public key, message authentication, key management Cryptographic Protocols Protocol flaws and pitfalls Support for cryptographic protocols - PKI Specific examples PGP, Kerberos, SSL, IPSec Wireless networks Perimeter Security Firewalls 15

  16. Tentative Course Syllabus - III Detection Importance of detection IDS and IPS Monitoring, logging and auditing Housekeeping procedures Vulnerability Assessment and Response Network security in the real world Security in organizations Incident response Legal issues 16

More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#