Computer & Network Security: Course Overview
Computer & Network Security: Course Overview
Course Overview
Overview
What is Security
Properties of Security
Next Pag
e
What is security?
In information technology, security is the protection of
information assets through the use of technology,
processes, and training.
Security is about
Honest user (e.g., David, Jenny, Greg, …)
Dishonest Attacker
How the Attacker
Disrupts honest David’s use of the system (Integrity, Availability)
Learns information intended for David only (Confidentiality)
Information Technology Professionals must protect users
from these attackers.
Next Pag
e
Properties of Security
Confidentiality
Information about system or its users cannot be learned
by an attacker
Integrity
The system continues to operate properly, only reaching
states that would occur if there were no attacker
Availability
Actions by an attacker do not prevent users from having
access to use of the system
Next Pag
e
Major Topics
Applicati
on and Web Network Computer
OS Security Security Security
Security
Click on a topic (above) to view content
Additional Readi
ng
i
Application and OS Security
Main Problem
OS Attacker Controls malicious files and applications
Content
Vulnerabilities: control hijacking attacks, fuzzing
Prevention: System design, robust coding, isolation
Project
Buffer overflow project
Next Pag
e
Operating system vulnerabilities
Next Pag
e
Application and OS Security
Application security is the use of software, hardware,
and procedural methods to protect applications from
external threats.
Content
Browser policies, session mgmt, user authentication
HTTPS and web application security
Project
Web site attack and defenses project
Next Pag
e
Web vs. System vulnerabilities
Content:
Protocol designs, vulnerabilities, prevention
Malware, botnets, DDoS, network security testing
Project:
Network traceroute and packet filtering project
Next Pag
e
Network Vulnerability Points
Content
Cryptography (user perspective)
digital rights management
Project
Seminar
Next Pag
e
Symantec Documented Vulnerability Stats