||Course logistics and Cryptography [crypto.ppt]||Stallings Chapters 2, 3 and 9, KPS Chapters 2, 3 and 5||Project part 1 due on Sep. 29
|Oct. 1||Cryto [cont'ed]
User authentication and authorization
(case study: Single Sign On (SSO) system and Kerberos) [authentication.ppt]
|KPS Chapters 9 and 10,
Password Security: A Case History, Communications of ACM, vol.22 no.11, 1979.
|Crypto Homework due on
||Mobile (smpartphone) security
by Zhengyang Qu, Ph.D. candidate at Northwestern Univ.
Invited talk on "Cyber Crime Past, Present and Future!" by Jibran Ilyas, VP of Stroz Friedberg. (bio)
Android's Security Framework (Tutorial) by W. Enck,
and P. McDaniel.
AppShield: Enabling Multi-entity Access Control Cross Platforms for Mobile App Management, by Zhengyang Qu et al, in the Proc. of Securecomm 2016.
|Botnet paper summary due on
We will do a lab for nmap next week. Before that, you need to download nmap to you computer by following the instructions.
|Oct. 15||Network/Vulnerability scanner
(case study: nmap and nessus (installation
Taxonomy of Computer Worms, N. Weaver, et al, the
First ACM Workshop on Rapid Malcode (WORM), 2003.
Botnet Chronicles: A Journey to Infamy, Trend Micro white paper 2010.
Stallings Chapter 19 (Malware)
A Survey of Botnet Technology and Defenses, in the Proc. of the 2009 Cybersecurity Applications & Technology Conference for Homeland Security.
problem statement presentation slides due on Oct 18.
Malware Homework due on Oct. 20.
||Project problem statement
presentation and feedback from each group.
DoS Attacks [DoS.ppt]
Symantec Internet Security Threat Report
|Detecting SYN Flooding Attacks, H. Wang, D. Zhang, and K. G. Shin, in Proc. of IEEE INFOCOM, 2002||DoS Homework
due by Oct 27.
||WWW Security and Defense [web.ppt].
Demo tutorial and SSH set up instructions if you would like to try the demo yourself.
Based Attacks, Symantec white paper, Feb. 2009. (Podcast
Vulnerability Analysis of Web-Based Applications, Chapter in ``Test and Analysis of Web Services", Springer, September 2007. [reference slides].
KPS Chapter 25 (Web security)
Homework due on Nov. 3
||Firewalls [firewalls.ppt]||Handout from Chapter 9 of Firewalls and Internet
Security: Repelling the Wily Hacker.
Stallings Chapter 20 and KPS Chapter 23 (firewalls)
|Firewall homework due on Nov. 10.|
|Nov. 12||Intrusion Detection/Prevention Systems (case study: snort IDS) [IDS.ppt][snort.ppt]||Stallings Chapter 18 (IDS).||Optional: Project final
solution slides due on Nov 14 (Mon).
IDS homework due on Nov. 17.
||Final project solution
presentations (see the list below).
Review for the final.
|Wireless and Network Security Integration Solution Overview, Cisco Inc. Here are more detailed guidelines on the solutions (i.e., expanding the overview).||Wireless security paper
summary due Dec. 1.
Wireless network security and techonology integration for compliance (case study: Cisco) [wirelessSec_cisco.pptx].