compsci and infosec build your own internet
DESCRIPTION
CompSci and InfoSec Build your own Internet. 22.10.13 Pierre- Malo Deniélou , Lorenzo Cavallaro, Dave Cohen. Challenge overview. The Internet and its security : where computational thinking affects lives A reliable world-wide fast network: transforming the modern world - PowerPoint PPT PresentationTRANSCRIPT
CompSci and InfoSecBuild your own Internet
22.10.13
Pierre-Malo Deniélou, Lorenzo Cavallaro, Dave Cohen
2
Challenge overview
The Internet and its security: where computational thinking affects lives
A reliable world-wide fast network: transforming the modern world
Secure and Safe: what would happen if this Network were to collapse?
The Internet:
A network of communicators
Resilient: No link is essential. The Internet routes around breakages
Secure: We can prevent unwanted eavesdropping
Reliable: We can be certain that every message gets through
Flexible: One protocol that can contain any payload package
Scalable−Seamlessly add/remove nodes
It’s the Algorithms that make it Tick
3
Curriculum links
This STEM challenge will support the new Computing Curriculum
Algorithmic thinking
Exciting programming tasks
An understanding of the Internet and networks in general
An understanding of security vulnerabilities and attacks
Each topic will be studied with a variety of learning methods: role play, individual research, programming and maths challenges, competition etc.,
Aims for the newly published Computing Curriculum
Can understand and apply fundamental principles of computer science
Can analyse problems in computational terms, and have experience of writing programs
Can evaluate and apply IT analytically to solve problems
Are responsible, competent, confident and creative users of ICT
We Tick the Boxes
4
Examples of activities
Routing past problems (the RIP algorithm):Self-organising networks protect the independence of the Internet
Fix it (Error Correcting Codes): Keeping data coherent across unreliable channels has allowed space exploration, CDs, cheap memory, allowing computational power into almost all human spheres
What’s in a name? (Domain Name Service): Makes the Internet available to people and allows communication between individuals
Public key cryptosystems (RSA):Simple data encryption and signing gives confidence in transactions. This enabled online shopping!
How the Internet speaks (TCP/IP): Overcoming inherent limits of technology with simple techniques and algorithms
5
The Team
Professor Dave Cohen
• Researcher in Artificial Intelligence with 100+ published papers. • He teaches Robotics and Software Engineering at Royal Holloway • He has been awarded two University Teaching Excellence awards • Shortlisted (this year) for the Times Higher Most Innovative Teacher of the Year award• Dave has 20 years of industrial experience working as a programmer
6
The Team (cont.)
Dr Pierre-Malo Deniélou
• Lecturer in Computer Science • He teaches Object-Oriented
Programming at Royal Holloway • He is interested in (and very good at)
programming language-based security, formal methods and concurrency
• He is very involved in teaching Computing at all levels and has co-written Labby, a tool to learn programming for all ages
7
The Team (cont.)
Dr Lorenzo Cavallaro
• Lecturer of Information Security in the Information Security Group• He teaches Software Security at Royal Holloway • He has recently taught a MOOC course on Coursera “Malicious Software and its Underground Economy: Two-Sides to Every Story” (60,000+ enrolled students)• He has published in top and well-known venues• Lorenzo is also exploring Android security research (see http://copperdroid.isg.rhul.ac.uk)