cs cs 683 683 se securi rity and pri rivacy sp spri ring
play

CS CS 683 683 - Se Securi rity and Pri rivacy Sp Spri ring - PowerPoint PPT Presentation

CS CS 683 683 - Se Securi rity and Pri rivacy Sp Spri ring 2018 2018 Instr Ins truc uctor: Ka Karim El Elde defr frawy http://www.cs.usfca.edu/~keldefrawy/teaching/spr ing2018/cs683/cs683_main.htm ( https://goo.gl/t396Fw ) 1 To


  1. CS CS 683 683 - Se Securi rity and Pri rivacy Sp Spri ring 2018 2018 Instr Ins truc uctor: Ka Karim El Elde defr frawy http://www.cs.usfca.edu/~keldefrawy/teaching/spr ing2018/cs683/cs683_main.htm ( https://goo.gl/t396Fw ) 1

  2. To Today • Administrative Stuff • Course Organization • Course Topics • Overview of Computer Networking and the Internet • Gentle Introduction to Security • Basics of Cryptography (Crypto) 2

  3. CS CS 683 683 Ba Backg kground • Classes: Wednesday 6:30pm-10pm @ Lo Schiavo 307 • Graduate and senior-level undergraduate course • Last time Spring2017 (by Prof. EJ Jung) 3

  4. Co Contact Informa rmation • Instructor: Karim Eldefrawy – Email: keldefrawy *AT* usfca.edu – Office: HR403A (office hours only) – Office Hours: • Wednesday, 5pm-6:30pm • More if needed, e.g., before finals or if out of town on Wednesday • Otherwise, by appointment: contact by email to set up • Grader: TBD 4

  5. Pr Prerequisite tes Ideally, one of: – Operating Systems – Distributed Systems – Computer Networks AND: – Design/Analysis of Algorithms 5

  6. Cl Class ss Info • Lecture format – lecture slides (not always posted before class) – ~15x2 lectures total (excluding midterm and final) • Course website: https://goo.gl/t396Fw • check it regularly • news, assignments, annoucements, lecture notes (in PDF) will all be posted there • Read your email 6

  7. Co Course se Textbooks/ s/Readings OPTIONAL (BUT RECOMMENDED): Network Security: Private Communication in a Public World, 2 nd edition Charlie Kaufman, Radia Perlman, Mike Speciner Prentice Hall – 2002 – ISBN: 0130460192 OPTIONAL: Cryptography : Theory and Practice, 3 rd edition Douglas R. Stinson CRC Press – 2005 – ISBN: 1584885084 Also: Cryptography and Network Security, 4 th edition William Stallings Prentice Hall – 2006 – ISBN: 0131873164 7

  8. Co Course se Grading • Midterm (25%) • Final (25%) • 3 Homeworks (13% each) • Project (11%) 8

  9. St Student Expectations • Keep up with material covered in lectures! – complete relevant readings before class – browse lecture slides • Slides will be on-line the same day, before class most of the time • Attend lectures • No excuses for not reading your email! • Exams and homework: – No collaboration of any sort – Violators will be prosecuted – An F in the course is guaranteed if caught 9

  10. Ho However er: • You might have fun … security and crypto are very "interesting” topics (require a special mindset) • I will certainly make mistakes – point them out! • I want your feedback • Please ask questions and challenge me!!! 10

  11. Co Comp mplaints s about: • Course content: to instructor • Course grading: to instructor • TA/Reader: to instructor • Instructor, i.e., me: – Computer Science Department Chair (Prof. David Wolber) 11

  12. Co Course se Topics s – Te Tentative and Un Unsorted ed Ma May be touched upon Will be covered Wi • Security Attacks/Services • Wireless/Mobile Net Security • Conventional Cryptography • DDOS attacks and Trace-back • Public Key Cryptography • Internet Protocol (IP) Security • Key Management • Firewalls • Digital Signatures • Kerberos, X.509 • Secure Hash Functions • RFID security • Authentication & Identification • Trojans/Worms/Viruses • Certification/Revocation • Intrusion Detection • Access Control (RBAC) • E-cash, secure e-commerce • SSL/TLS • Privacy and Anonymity • Blockchain and Bitcoin 12

  13. Fo Focus of the Class • Recognize security attacks/threats • Learn basic defense mechanisms (cryptographic and other techniques) • Appreciate how much remains to be learned after this course BTW: • You certainly won’t become an expert (neither a Mr. Robot) • You might be (I hope) interested to study the subject further 13

  14. Bi Bird’s s eye view This course Network Computer CRYPTO Security Security 14

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend