Shopping

COE 449: Network Security Engineering

Categories
Published
of 22
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Related Documents
Share
Description
COE 449: Network Security Engineering Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering / 22 Internet Attacks Network Security
Transcript
COE 449: Network Security Engineering Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering / 22 Internet Attacks Network Security Part I Network Security Ahmad Almulhem - Network Security Engineering / 22 Original Internet Internet Attacks Network Security Original Internet Internet now Vulnerabilities Ahmad Almulhem - Network Security Engineering / 22 Internet now Internet Attacks Network Security Original Internet Internet now Vulnerabilities Ahmad Almulhem - Network Security Engineering / 22 Internet Attacks Network Security Vulnerabilities Rate Original Internet Internet now Vulnerabilities 8000 vulnerabilities year Ahmad Almulhem - Network Security Engineering / 22 Attacks Examples Internet Attacks Network Security Examples Phishing Denial of Service (DOS) Worms How muc Malwares: viruses/worms, rootkits, trojans/backdoors, keyloggers/spywares... etc. Intrusions/Compromises. Denial of Service Attacks: flooding, smurf...etc. Port Scans or Probes Botnets Theft Spamming and Phishing Social engineering Ahmad Almulhem - Network Security Engineering / 22 Phishing Internet Attacks Network Security Examples Phishing Denial of Service (DOS) Worms How muc Ahmad Almulhem - Network Security Engineering / 22 Internet Attacks Network Security Distributed Denial of Service (DDOS) Examples Phishing Denial of Service (DOS) Worms How muc Ahmad Almulhem - Network Security Engineering / 22 Internet Attacks Network Security Mydoom Worm: fastest worm ever Examples Phishing Denial of Service (DOS) Worms How muc Targeted Windows in Jan 2004 spread through (social engineering) Originated from Russia Actions: Spamming/DOS In few hours, slows the Internet by 10% and webpages loading by 50%. In few hours, 1 of 10 s contain Mydoom! Ahmad Almulhem - Network Security Engineering / 22 How much? Internet Attacks Network Security Examples Phishing Denial of Service (DOS) Worms How muc Ahmad Almulhem - Network Security Engineering / 22 Internet Attacks Network Security Network Security What is network security? Protection of networks and their services from unauthorized modification, destruction, or disclosure. Why is it important? Computer networks are important in our life (mission-critical, business, banks,...etc). Information is power and money. Why is it difficult? Computer networks are growing in complexity and size. People make mistakes! Ahmad Almulhem - Network Security Engineering / 22 This course Policies & Ethics Your instructor Part II This course Ahmad Almulhem - Network Security Engineering / 22 Goals This course Policies & Ethics Your instructor Goals Prerequisites Textbook Topics Website Grading 1 Both theory and practice are important! 2 Computer security Cryptography 3 Computer security is a science and art Ahmad Almulhem - Network Security Engineering / 22 This course Policies & Ethics Your instructor Prerequisites Goals Prerequisites Textbook Topics Website Grading Computer Networks (TCP/IP) Programming Operating System Ahmad Almulhem - Network Security Engineering / 22 Textbook This course Policies & Ethics Your instructor Goals Prerequisites Textbook Topics Website Grading Matt Bishop, Introduction to Computer Security, Addison Wesley Professional, Matt Bishop, Computer Security: Art and Science, Addison-Wesley, Ahmad Almulhem - Network Security Engineering / 22 Topics This course Policies & Ethics Your instructor Goals Prerequisites Textbook Topics Website Grading Overview (chp 1) Foundations (chp 2, 3) Security Policies (Chp 4, 5, 6, 7) Cryptography (Chp 8) Authentication (chp 11) Secure Design Principles (Chp 12) Access Control Mechanisms (chp 14) Auditing and Intrusion Detection (Chp 21, 22) Network Security (case study) (Chp 23) Ahmad Almulhem - Network Security Engineering / 22 This course Policies & Ethics Your instructor Class Website Goals Prerequisites Textbook Topics Website Grading ahmadsm Ahmad Almulhem - Network Security Engineering / 22 Grading This course Policies & Ethics Your instructor Goals Prerequisites Textbook Topics Website Grading Homework (20%) 4 homewroks (5% each) Project/Paper (30%) Report/Paper (20%): due May 20 (Tuesday) Presentation/demo (10%): 15 mins - last 2 weeks Check my website for ideas Make a team and sell your product well! Exams (50%) Midterm: 20% - in class March 23 (Sunday) Final: 30% Ahmad Almulhem - Network Security Engineering / 22 This course Policies & Ethics Your instructor General Policies General Policies KFUPM Policy Ethics This is not a hacking class! Class participation is encouraged Homeworks/report/paper must be computer-generated and printed Using L A TEXand R is encouraged! Grading issues must be resolved within one week Late submissions are not accepted Zero-tolerance for cheating (0 then F) Ahmad Almulhem - Network Security Engineering / 22 This course Policies & Ethics Your instructor KFUPM Policy General Policies KFUPM Policy Ethics Ahmad Almulhem - Network Security Engineering / 22 Ethics This course Policies & Ethics Your instructor General Policies KFUPM Policy Ethics Is hacking... legal? NO! ethical? NO! cool? NO! How about studying attacks for... education? YES awareness? YES learning to build more secure systems? YES Ahmad Almulhem - Network Security Engineering / 22 This course Policies & Ethics Your instructor Your instructor Dr. Ahmad Almulhem ahmadsm at kfupm URL: ~ ahmadsm Office: Office Hours: Sun-Tue 11:15-1:00 Mon 12:30-1:30 Ahmad Almulhem - Network Security Engineering / 22
Search
Related Search
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks