||Course logistics and Cryptography [crypto.ppt]||Stallings Chapters 2, 3 and 9, KPS Chapters 2, 3 and 5||project part 1 due on Jan 15.
|Jan. 17||Cryto [cont'ed]
User authentication and authorization
(case study: Single Sign On (SSO) system and Kerberos) [authentication.ppt]
|KPS Chapters 9 and 10,
Password Security: A Case History, Communications of ACM, vol.22 no.11, 1979.
A Survey of Botnet Technology and Defenses, in the Proc. of the 2009 Cybersecurity Applications & Technology Conference for Homeland Security.
paper summary and Homework 1 due on Jan 22.
We will do a lab for nmap next week. Before that, you need to download nmap to you computer by following the instructions.
|Jan. 24||Network/Vulnerability scanner
(case study: nmap and nessus (installation
Chronicles – A Journey to Infamy, Trend Micro white
Stallings Chapter 19 (Malware)
A Taxonomy of Computer Worms, N. Weaver, et al, the First ACM Workshop on Rapid Malcode (WORM), 2003.
2, due on Jan. 29. Project problem statement
presentation slides due on Jan. 27.
|Jan. 31||Botnets [botnet.ppt]
DoS Attacks [DoS.ppt]
Project problem statement presentation and feedback from each group (see the list below)
SYN Flooding Attacks, H. Wang, D. Zhang, and K. G.
Shin, in Proc. of IEEE INFOCOM, 2002
Web Based Attacks, Symantec white paper, Feb. 2009. (Podcast from Symantec).
|Web security paper summary and Homework 3 due by Feb. 5.|
|Feb. 7||WWW Security and Defense [web.ppt].
Demo tutorial and SSH set up instructions if you would like to try the demo yourself.
Analysis of Web-Based Applications, Chapter in
``Test and Analysis of Web Services", Springer, September
KPS Chapter 25 (Web security)
|Homework 4 due on Feb. 12.|
Detection/Prevention Systems (case study: snort IDS) [IDS.ppt][snort.ppt]
||Stallings Chapter 18 (IDS).
Wireless and Network Security Integration Solution Overview, Cisco Inc. Here are more detailed guidelines on the solutions (i.e., expanding the overview).
|Homework 5 and wireless security paper summary due on Feb. 19.|
|Feb. 21||Firewalls [firewalls.ppt]
Wireless network security and techonology integration for compliance (case study: Cisco) [wirelessSec_cisco.pptx].
|Handout from Chapter 9 of Firewalls and Internet
Security: Repelling the Wily Hacker.
Stallings Chapter 20 and KPS Chapter 23 (firewalls)
|Homework 6 due on
Project final solution slides due on Mar. 3.
|Mar. 7 morning|| Final project solution
presentations (see the list below).
||Homework 7 due on Mar.
|Mar. 7 afternoon||Invited
talk on Security Policy by Brandon Hoffman, CTO
Review for the final.
|Symantec Internet Security Threat Report|
|Mar. 14||Final Exam.
Invited talk on "Cyber Crime Past, Present and Future!" by Jibran Ilyas, Assistant Director at Stroz Friedberg.