357x Filetype PPTX File size 0.11 MB Source: www.cs.albany.edu
Contact Information
Instructor
Amir (Amirreza Masoumzadeh)
Web: http://www.sis.pitt.edu/~amirreza/
Email: amirreza _at_ sis.pitt.edu
Please include “IS1075” in the subject
nd
410 IS Bldg. (LERSAIS), 2 cubicle on your right
Office hours: Tuesdays 2pm-4pm / by
appointment
GSA
TBA
2
Course Overview
Deals with security issues related to
the network
Common attacks originating from the
network
Prevention and detection of attacks
Perimeter Security, Monitoring, etc.
Protocols for enhancing security (e.g.
Cryptographic Protocols)
Assessment of network security and
response to attacks
3
Course Overview: More Details
Common Attacks
DoS attacks, DDoS attacks, Worms, Masquerading,
Enumeration, etc.
Cryptographic Protocols
Cryptography, IPSec, SSL/TLS, PGP, Wireless
Security, etc.
Security
Packet Filters, Stateful Firewalls, Proxy Firewalls,
IDS and IPS
Monitoring
Sniffers, Network Monitoring and Logging Tools
4
Prerequisites
INFSCI 1070 – Introduction to Telecom and
Networks
Good knowledge of TCP/IP and related protocols
Will be quickly reviewed, but you should feel
comfortable with network basics (MAC, TCP/IP, HTTP,
etc.)
Algebra and digital logic
Modulo operation, XOR operation
Will be reviewed
To understand encryption schemes
INFSCI 0017 – Introduction to Programming
Probably won't do much programming but ...
5
Textbooks & References
Network Security: The Complete Reference
Roberta Bragg et. al., McGraw-Hill Osborne Media, November 2003
ISBN: 0072226978
Cryptography and Network Security, Principles and Practice,
4/Ed. or 5/Ed.,
William Stallings, Prentice Hall, 2011, ISBN: 0136097049 (Optional)
We also use other books and online materials
Safari books
http://www.library.pitt.edu/articles/database_info/safari.html
Use “Secure Remote Access”
https://sremote.pitt.edu
Readings will be specified for each lecture
You are expected to read the specified references for each lecture
before coming to the class
Not every details can be covered in the lectures
Evaluation is based on both readings and lectures
6
no reviews yet
Please Login to review.