0% found this document useful (0 votes)
17 views18 pages

Computer & Network Security: Course Overview

The document provides an overview of a computer and network security course. It discusses the major topics covered in the course, including application and OS security, web security, network security, and computer security. For each topic, it describes the main problems addressed, content covered, and example projects. The properties of security - confidentiality, integrity, and availability - are also defined. The implications for IT professionals include implementing security measures in applications, networks, and systems as well as using tools like firewalls and secure development practices.

Uploaded by

emad helal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views18 pages

Computer & Network Security: Course Overview

The document provides an overview of a computer and network security course. It discusses the major topics covered in the course, including application and OS security, web security, network security, and computer security. For each topic, it describes the main problems addressed, content covered, and example projects. The properties of security - confidentiality, integrity, and availability - are also defined. The implications for IT professionals include implementing security measures in applications, networks, and systems as well as using tools like firewalls and secure development practices.

Uploaded by

emad helal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

Computer & Network Security

Course Overview
Overview
What is Security

Properties of Security

Major Topics in Security

Next Pag
e
What is security?
In information technology, security is the protection of
information assets through the use of technology,
processes, and training.
Security is about
Honest user (e.g., David, Jenny, Greg, …)
Dishonest Attacker
How the Attacker
 Disrupts honest David’s use of the system (Integrity, Availability)
 Learns information intended for David only (Confidentiality)
Information Technology Professionals must protect users
from these attackers.

Next Pag
e
Properties of Security
Confidentiality
Information about system or its users cannot be learned
by an attacker

Integrity
The system continues to operate properly, only reaching
states that would occur if there were no attacker

Availability
Actions by an attacker do not prevent users from having
access to use of the system

Next Pag
e
Major Topics

Applicati
on and Web Network Computer
OS Security Security Security
Security
Click on a topic (above) to view content

Additional Readi
ng
i
Application and OS Security
Main Problem
OS Attacker Controls malicious files and applications

Content
Vulnerabilities: control hijacking attacks, fuzzing
Prevention: System design, robust coding, isolation

Project
Buffer overflow project

Next Pag
e
Operating system vulnerabilities

Next Pag
e
Application and OS Security
Application security is the use of software, hardware,
and procedural methods to protect applications from
external threats.

Implications for the IT Professional:


Security measures built into applications
Sound application security routine
Use of hardware or software firewalls

Return to Home Additional Readi


ng
i
Web Security
Main Problem
Web Attacker sets up malicious site visited by victim; no
control of network

Content
Browser policies, session mgmt, user authentication
HTTPS and web application security

Project
Web site attack and defenses project

Next Pag
e
Web vs. System vulnerabilities

Return to Home Additional Readi


ng
i
Web Security
Web security is the separation or control of threats
from assets within or maintained by web-based
services to protect the integrity of the service, the
confidentiality of the communication, and the
availability of the application.

Implications for the IT professional:


Security measures built into the applications
Sound application security routine
Use of hardware or software firewalls
Security measures built into the web service
Network Security
Main Problem:
Network Attacker: Intercepts and controls network
communication

Content:
Protocol designs, vulnerabilities, prevention
Malware, botnets, DDoS, network security testing

Project:
Network traceroute and packet filtering project

Next Pag
e
Network Vulnerability Points

Return to Home Additional Readi


ng
i
Network Security
Network security is the protection of a computer
network and its services from unauthorized
modification, destruction, or disclosure.

Implications for IT professionals:


Security measures built into the network hardware and
design
Control the flow to data in a network
Sound application security routine
Use of hardware or software firewalls
Security measures built into the web service
Computer Security
Main Idea
Hacker gains controls of a computer, installs malicious
files, applications and access computer files.

Content
Cryptography (user perspective)
digital rights management

Project
Seminar

Next Pag
e
Symantec Documented Vulnerability Stats

Return to Home Additional Readi


ng
i
Computer Security
 Computer security is the process of preventing and
detecting unauthorized use of your computer. The content
of a computer is vulnerable to few risks unless the
computer is connected to other computers on a network

Implications for IT professionals:


Use of applications such as antivirus, and firewalls
Security settings on local machines
Use of software firewalls
Create boot disks and backup data on a regular basis
Visit these websites for more information:
How Hackers Look for Bugs…
http://crypto.stanford.edu/cs155/syllabus.html

Return to Home End Sho


w

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy