160 likes | 280 Views
Course Introduction. INFSCI 1075: Network Security Amir Masoumzadeh. Contact Information. Instructor Amir ( Amirreza Masoumzadeh ) Web: http://www.sis.pitt.edu/~amirreza / Email : amirreza _at_ sis.pitt.edu Please include “IS1075” in the subject
E N D
Course Introduction INFSCI 1075: Network Security Amir Masoumzadeh
Contact Information • Instructor • Amir (AmirrezaMasoumzadeh) • Web: http://www.sis.pitt.edu/~amirreza/ • Email: amirreza _at_ sis.pitt.edu • Please include “IS1075” in the subject • 410 IS Bldg. (LERSAIS), 2nd cubicle on your right • Office hours: Tuesdays 2pm-4pm / by appointment • GSA • TBA
Course Overview • Deals with security issues related to the network • Common attacks originating from the network • Prevention and detection of attacks • Perimeter Security, Monitoring, etc. • Protocols for enhancing security (e.g. Cryptographic Protocols) • Assessment of network security and response to attacks
Course Overview: More Details • Common Attacks • DoS attacks, DDoS attacks, Worms, Masquerading, Enumeration, etc. • Cryptographic Protocols • Cryptography, IPSec, SSL/TLS, PGP, Wireless Security, etc. • Security • Packet Filters, Stateful Firewalls, Proxy Firewalls, IDS and IPS • Monitoring • Sniffers, Network Monitoring and Logging Tools
Prerequisites • INFSCI 1070 – Introduction to Telecom and Networks • Good knowledge of TCP/IP and related protocols • Will be quickly reviewed, but you should feel comfortable with network basics (MAC, TCP/IP, HTTP, etc.) • Algebra and digital logic • Modulo operation, XOR operation • Will be reviewed • To understand encryption schemes • INFSCI 0017 – Introduction to Programming • Probably won't do much programming but ...
Textbooks & References • Network Security: The Complete Reference • Roberta Bragg et. al., McGraw-Hill Osborne Media, November 2003 ISBN: 0072226978 • Cryptography and Network Security, Principles and Practice, 4/Ed. or 5/Ed., • William Stallings, Prentice Hall, 2011, ISBN: 0136097049 (Optional) • We also use other books and online materials • Safari books • http://www.library.pitt.edu/articles/database_info/safari.html • Use “Secure Remote Access” • https://sremote.pitt.edu • Readings will be specified for each lecture • You are expected to read the specified references for each lecture before coming to the class • Not every details can be covered in the lectures • Evaluation is based on both readings and lectures
Some Other References • [1] Cryptography and Network Security: Principles and Practices, 4th Ed, William Stallings, Pearson Education, 2006, (0-13-187316-4) • [2] Hacking Exposed (Fifth Edition) – Stuart McClure, Joel Scambray, George Kurts (0-07-226081-5) • [3] Penetration Testing and Network Defense – Andrew Whitaker, Daniel Newman (1-58705-208-3) • [4] Network Security – Private Communication in a Public World – Charlie Kaufman, Radia Perlman, Mike Speciner, (0-13-046019-2) • [5] Firewalls and Internet Security (2nd Edition) – William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin (0-201-63466-X) • [6] Cryptography and Network Security – Behrouz A. Forouzan (978-0-07-287022-0)
Some Other References (Cont.) • [7] Computer Security Lab Manual – Vincent J. Nestler, et. al. (0-07-225508-0) • [8] The Craft of System Security, Sean Smith and John Marchesini - (0-321-43483-8) • [9] Network Intrusion Detection: An Analyst’s Handbook, by S. Northcutt and J. Novak, New Riders, Indianapolis, 2001. • [10] Inside Network Perimeter Security, by S. Northcutt and others, New Riders, Indianapolis, 2005. • [11] Real 802.11 Security: Wi-Fi Protected Access and 802.11i, by J. Edney and W.A. Arbaugh, Prentice Hall, 2004. • [13] The Tao of Network Security Monitoring, by Richard Bejtlich, Addison-Wesley, 2004.
Grading • 20% Homework (~6) • 30% Labs (~5) • 15% Quizzes (~10) • 15% Midterm • 20% Final Exam • +10% Optional Term Project
Course Logistics • Website • http://www.sis.pitt.edu/~amirreza/is1075-spring13/ • Course Information • Lecture Schedule and Slides • CourseWeb • https://courseweb.pitt.edu/ • Announcements/Communication • Homework, labs, and sample solutions • Grades
Assignments • Homework and lab assignments must be delivered by 11-am of the due dates (beginning of the class) • There will be 10% penalty for every day late (max two days) • No late submission is accepted after two days! • Ask the GSA if you have problem with Homework/Labs • I will be also constantly monitoring and answering questions if necessary • Use discussion board on CourseWeb • Sample solutions will be posted on CourseWeb • Pre-configured equipment will be provided for labs
Quizzes & Exams • Quizzes • Short quizzes throughout the semester at the beginning of the class • Quizzes will be based on recent materials • You cannot take a make-up if you miss a quiz (make sure you don’t!) • Your lowest grade will be dropped • Quizzes and Exams are closed book • Exams • Samples will be provided before the exam • All written work must be legible and clear to receive credit • I should be able to understand what you are trying to do/say without verbal explanations later • No credit for vague answers, unclear steps, magical solutions, etc.
Policies • Academic Integrity • No copying from web or other books without understanding the material • If you use such material cite your source properly • Students may discuss homework assignments and work together • The final product for each student MUST be his or her own work • Zero tolerance for cheating • At a minimum, cheating will result in a grade of zero on the assignment • Depending on the circumstances, you may also receive a grade of ‘F’ for the course
Tentative Course Syllabus - I • Introduction • What is network security? • Why is network security necessary? • Basic security concepts and terminology • Review of Network Basics • Network operation • Common network protocols, services and applications of interest. • TCP/IP, DNS, ICMP, etc. • Discussion of some common network attacks • The Process of an Attack, Risks and Vulnerabilities • Examples: SYN Flood attacks, SMURF Attacks • Authentication failures
Tentative Course Syllabus - II • Network Prevention/Protection • Cryptography • Secret key, public key, message authentication, key management • Cryptographic Protocols • Protocol flaws and pitfalls • Support for cryptographic protocols - PKI • Specific examples • PGP, Kerberos, SSL, IPSec • Wireless networks • Perimeter Security • Firewalls
Tentative Course Syllabus - III • Detection • Importance of detection • IDS and IPS • Monitoring, logging and auditing • Housekeeping procedures • Vulnerability Assessment and Response • Network security in the “real world” • Security in organizations • Incident response • Legal issues