cs cs 683 683 se securi rity and pri rivacy sp spri ring
play

CS CS 683 683 - Se Securi rity and Pri rivacy Sp Spri ring - PowerPoint PPT Presentation

CS CS 683 683 - Se Securi rity and Pri rivacy Sp Spri ring 2018 2018 Instr Ins truc uctor: Ka Karim El Elde defr frawy http://www.cs.usfca.edu/~keldefrawy/teaching/spr ing2018/cs683/cs683_main.htm ( https://goo.gl/t396Fw ) 1 To


  1. CS CS 683 683 - Se Securi rity and Pri rivacy Sp Spri ring 2018 2018 Instr Ins truc uctor: Ka Karim El Elde defr frawy http://www.cs.usfca.edu/~keldefrawy/teaching/spr ing2018/cs683/cs683_main.htm ( https://goo.gl/t396Fw ) 1

  2. To Today • Administrative Stuff • Course Organization • Course Topics • Overview of Computer Networking and the Internet • Gentle Introduction to Security • Basics of Cryptography (Crypto) 2

  3. CS CS 683 683 Ba Backg kground • Classes: Wednesday 6:30pm-10pm @ Lo Schiavo 307 • Graduate and senior-level undergraduate course • Last time Spring2017 (by Prof. EJ Jung) 3

  4. Co Contact Informa rmation • Instructor: Karim Eldefrawy – Email: keldefrawy *AT* usfca.edu – Office: HR403A (office hours only) – Office Hours: • Wednesday, 5pm-6:30pm • More if needed, e.g., before finals or if out of town on Wednesday • Otherwise, by appointment: contact by email to set up • Grader: TBD 4

  5. Pr Prerequisite tes Ideally, one of: – Operating Systems – Distributed Systems – Computer Networks AND: – Design/Analysis of Algorithms 5

  6. Cl Class ss Info • Lecture format – lecture slides (not always posted before class) – ~15x2 lectures total (excluding midterm and final) • Course website: https://goo.gl/t396Fw • check it regularly • news, assignments, annoucements, lecture notes (in PDF) will all be posted there • Read your email 6

  7. Co Course se Textbooks/ s/Readings OPTIONAL (BUT RECOMMENDED): Network Security: Private Communication in a Public World, 2 nd edition Charlie Kaufman, Radia Perlman, Mike Speciner Prentice Hall – 2002 – ISBN: 0130460192 OPTIONAL: Cryptography : Theory and Practice, 3 rd edition Douglas R. Stinson CRC Press – 2005 – ISBN: 1584885084 Also: Cryptography and Network Security, 4 th edition William Stallings Prentice Hall – 2006 – ISBN: 0131873164 7

  8. Co Course se Grading • Midterm (25%) • Final (25%) • 3 Homeworks (13% each) • Project (11%) 8

  9. St Student Expectations • Keep up with material covered in lectures! – complete relevant readings before class – browse lecture slides • Slides will be on-line the same day, before class most of the time • Attend lectures • No excuses for not reading your email! • Exams and homework: – No collaboration of any sort – Violators will be prosecuted – An F in the course is guaranteed if caught 9

  10. Ho However er: • You might have fun … security and crypto are very "interesting” topics (require a special mindset) • I will certainly make mistakes – point them out! • I want your feedback • Please ask questions and challenge me!!! 10

  11. Co Comp mplaints s about: • Course content: to instructor • Course grading: to instructor • TA/Reader: to instructor • Instructor, i.e., me: – Computer Science Department Chair (Prof. David Wolber) 11

  12. Co Course se Topics s – Te Tentative and Un Unsorted ed Ma May be touched upon Will be covered Wi • Security Attacks/Services • Wireless/Mobile Net Security • Conventional Cryptography • DDOS attacks and Trace-back • Public Key Cryptography • Internet Protocol (IP) Security • Key Management • Firewalls • Digital Signatures • Kerberos, X.509 • Secure Hash Functions • RFID security • Authentication & Identification • Trojans/Worms/Viruses • Certification/Revocation • Intrusion Detection • Access Control (RBAC) • E-cash, secure e-commerce • SSL/TLS • Privacy and Anonymity • Blockchain and Bitcoin 12

  13. Fo Focus of the Class • Recognize security attacks/threats • Learn basic defense mechanisms (cryptographic and other techniques) • Appreciate how much remains to be learned after this course BTW: • You certainly won’t become an expert (neither a Mr. Robot) • You might be (I hope) interested to study the subject further 13

  14. Bi Bird’s s eye view This course Network Computer CRYPTO Security Security 14

Recommend


More recommend