80 likes | 96 Views
CSCE 715: Network Systems Security. Chin-Tser Huang huangct@cse.sc.edu University of South Carolina. About Me. Chin-Tser Huang Ph.D. in Computer Sciences, University of Texas at Austin Research in network security, network protocol design and verification, distributed systems
E N D
CSCE 715:Network Systems Security Chin-Tser Huang huangct@cse.sc.edu University of South Carolina
About Me • Chin-Tser Huang • Ph.D. in Computer Sciences, University of Texas at Austin • Research in network security, network protocol design and verification, distributed systems • My web page can be found at http://www.cse.sc.edu/~huangct (C) 2010 Chin-Tser Huang
About You • What’s your name? • Where are you from? • When did you join USC? • What are your research interests? (C) 2010 Chin-Tser Huang
About the Course • A grad-level course focusing on basics and issues in network security • First half will be lectures about elements of network security, cryptography backgrounds, and introduction to network security designs • Second half will be your chance to present what you have learned from key research papers (C) 2010 Chin-Tser Huang
Course Information Online • http://www.cse.sc.edu/~huangct/CSCE715F10/index.htm • List of assigned paper and useful links are available on the page • Lecture slides will be available online too (C) 2010 Chin-Tser Huang
Why Should You Take This Course • Security is an increasingly important issue • You want to have basic knowledge about network security • You can learn latest attacks and newest skills to counter those attacks • You have a chance to implement the skills learned in the class (C) 2010 Chin-Tser Huang
Your Best Strategy • Come to every lecture to learn basic security problems and skills to counter them • Keep yourself exposed to articles related to network security to collect project ideas • Read each assigned paper and write good summary for each paper • Do not wait till last minute to prepare for exam or work on project • Enjoy the fun! (C) 2010 Chin-Tser Huang
Next Class • Type of attacks • Network security services • Formal specification and verification of network protocols • Read Ch. 1 (C) 2010 Chin-Tser Huang