Graphic Art

Computer and Network Security

Categories
Published
of 8
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Related Documents
Share
Description
Computer and Network Security Dr. Arjan Durresi Louisiana State University Baton Rouge, LA These slides are available at: Louisiana
Transcript
Computer and Network Security Dr. Arjan Durresi Louisiana State University Baton Rouge, LA These slides are available at: Louisiana State University 1- Introduction - 1 Overview How What When Why Louisiana State University 1- Introduction - 2 Overview How am I going to grade you? What are we going to cover? When are you going to do it? Why you should take this course? Louisiana State University 1- Introduction - 3 Grading Learning-centered course: The first priority: Maximize learning Your grade will depend on how much you have learned Quizzes (Best 2 of 3) 40% Class participation 10% Questions and discussions in class give you points and improve the quality of teaching Homework 25% Project or lab 25% Possibility of one extra-assignment to improve the final grade up to one point Louisiana State University 1- Introduction - 4 Frequently Asked Questions Yes, I do use curve. Your grade depends upon the performance of the rest of the class. All homeworks are due at the beginning of the next class. All late submissions must be preapproved. All quizzes are open-book and extremely time limited. Quizzes consist of numerical as well as multiplechoice (true-false) questions. There is negative grading on incorrect multiple-choice questions. Everyone including the graduating seniors are graded the same way. Louisiana State University 1- Introduction - 5 What Is This Course About? Understanding of basic issues, concepts, principles, and mechanisms in information security. Security goals and threats to networking infrastructure and applications. Introduction to cryptography. Network security applications. System security applications. Exposure to commercial as well as research security technologies. Louisiana State University 1- Introduction - 6 Text Book Network security: PRIVATE communication in a PUBLIC world by Kaufman, Perlman, and Speciner. Second Edition 2002, ISBN This book is very comprehensive. I will follow it as much as possible. Louisiana State University 1- Introduction - 7 Supplementary Text Network security essentials: applications and standards by William Stallings. Third Edition 2003 This book contains more recent technologies and will be used for the second half of the course. Louisiana State University 1- Introduction - 8 Background: Course Outline Review of networking technologies Network security threats and counter measures Cryptography: Secret key cryptography Hashes and message digests Public key cryptography Information hiding Louisiana State University 1- Introduction - 9 Course Outline (Cont) Network and system security applications: Authentication and security handshakes pitfalls IP security Web and E-commerce Attacks to routing infrastructures and counter measures DDoS and traceback Virus/worm detection, firewalls, intrusion detection. Hacking and forensics Writing secure code Louisiana State University 1- Introduction - 10 Prerequisites Networking, operating systems, discrete mathematics, and programming (C or C++, Java). The right motivations. Louisiana State University 1- Introduction - 11 Office Hours Tuesday and Thursday: 1:40 to 3:00 PM and by appointments Office: 291 Coates Hall Telephone: (225) Course web page: GTA: Vamsi Paruchuri, Office:, Tel.: Louisiana State University 1- Introduction - 12 Summary There will be a lot of self-reading Goal: To prepare you for a career in network security Get ready to work hard Louisiana State University 1- Introduction - 13 Quiz 0: Prerequisites True or False? T F Datalink refers to the 2nd layer in the ISO/OSI reference model Category 5 unshielded twisted pair cable is better than category 3 cable. Finding path from one node to another in a large network is a transport layer function. It is impossible to send 3000 bits/second through a wire which has a bandwidth of 1000 Hz. Bit stuffing is used so that characters used for framing do not occur in the data part of the frame. For long delay paths, on-off flow control is better than window flow control. Ethernet uses a CSMA/CD access method. 10Base2 runs at 2 Mbps. The packets sent in a connection-oriented network are called datagrams. Spanning tree algorithm is used to find a loop free path in a network. Marks = Correct Answers - Incorrect Answers = Louisiana State University 1- Introduction - 14 Thank You! Louisiana State University 1- Introduction - 15
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks