Winter 2015
Date | Topics/slides | Readings | Assignment |
---|---|---|---|
Jan 10 |
Course logistics and Cryptography [crypto.ppt] | Stallings Chapters 2, 3 and 9, KPS Chapters 2, 3 and 5 | project part 1 due on Jan 15. |
Jan. 17 | Cryto [cont'ed] User authentication and authorization (case study: Single Sign On (SSO) system and Kerberos) [authentication.ppt] |
KPS Chapters 9 and 10, Password Security: A Case History, Communications of ACM, vol.22 no.11, 1979. A Survey of Botnet Technology and Defenses, in the Proc. of the 2009 Cybersecurity Applications & Technology Conference for Homeland Security. |
Botnet
paper summary and Homework 1 due on Jan 22. We will do a lab for nmap next week. Before that, you need to download nmap to you computer by following the instructions. |
Jan. 24 | Network/Vulnerability scanner
(case study: nmap and nessus (installation
demo)). Malcode [malcode.ppt] |
Botnet
Chronicles – A Journey to Infamy, Trend Micro white
paper 2010. Stallings Chapter 19 (Malware) A Taxonomy of Computer Worms, N. Weaver, et al, the First ACM Workshop on Rapid Malcode (WORM), 2003. |
Homework
2, due on Jan. 29. Project problem statement
presentation slides due on Jan. 27. |
Jan. 31 | Botnets [botnet.ppt] DoS Attacks [DoS.ppt] Project problem statement presentation and feedback from each group (see the list below) |
Detecting
SYN Flooding Attacks, H. Wang, D. Zhang, and K. G.
Shin, in Proc. of IEEE INFOCOM, 2002 Web Based Attacks, Symantec white paper, Feb. 2009. (Podcast from Symantec). |
Web security paper summary and Homework 3 due by Feb. 5. |
Feb. 7 | WWW Security and Defense [web.ppt]. Demo tutorial and SSH set up instructions if you would like to try the demo yourself. |
Vulnerability
Analysis of Web-Based Applications, Chapter in
``Test and Analysis of Web Services", Springer, September
2007. [reference
slides]. KPS Chapter 25 (Web security) |
Homework 4 due on Feb. 12. |
Feb.14 | Intrusion
Detection/Prevention Systems (case study: snort IDS) [IDS.ppt][snort.ppt]
|
Stallings Chapter 18 (IDS). Wireless and Network Security Integration Solution Overview, Cisco Inc. Here are more detailed guidelines on the solutions (i.e., expanding the overview). |
Homework 5 and wireless security paper summary due on Feb. 19. |
Feb. 21 | Firewalls [firewalls.ppt] Wireless network security and techonology integration for compliance (case study: Cisco) [wirelessSec_cisco.pptx]. |
Handout from Chapter 9 of Firewalls and Internet
Security: Repelling the Wily Hacker. Stallings Chapter 20 and KPS Chapter 23 (firewalls) |
Homework 6 due on
Mar. 5 Project final solution slides due on Mar. 3. |
Mar. 7 morning | Final project solution
presentations (see the list below). |
Homework 7 due on Mar.
12. |
|
Mar. 7 afternoon | Invited
talk on Security Policy by Brandon Hoffman, CTO
at Lumeta. Review for the final. |
Symantec Internet Security Threat Report | |
Mar. 14 | Final Exam. Invited talk on "Cyber Crime Past, Present and Future!" by Jibran Ilyas, Assistant Director at Stroz Friedberg. |
|