lecture 01

43
Network Security ( Cүлжээний хамгаалалт) 2011, fall

Upload: ganaaturuu

Post on 19-Jul-2015

134 views

Category:

Documents


1 download

TRANSCRIPT

Network Security( Cүлжээний хамгаалалт)

2011, fall

Contact information

Instructor: Gantur Togtokh

– Email: [email protected]

– Office: B306(Software engineering department),

– Office hours: Mon-Fir 08:00-17:00

• Unless there is a dept. meeting or class

• Else, by appointment

Prerequisites

• At least one of:– Computer Networks– Network Programming (Socket)– Wireless Networks– Mobile Communications

• At least one of:– Network Security– Cryptography– Data Structures– Computer Algorithms

Course Textbooks/References

• Textbooks

– No textbooks required.

• References

– F. Adelstein, S. K. Gupta, G. Richard III, L Schwiebert, "Fundamentals of

Mobile and Pervasive Computing", McGraw-Hill Professional, ISBN:

0071412379

Course Topics – tentative and unsorted

• Introduction to ubiquitious computing

• Introduction to Network Security

• RFID and its security Issues

• Wireless sensor Networks

• Mobile Ad hoc Network

• TCP IP socket programming

• Etc…

Course Assignment

1. Cipher

2. TCP/IP socket programming

(exchange info between two computers)

Focus of the class

- Learn basic security mechanisms(crypto)

- You will certainty not become an expert

- You will(I hope) be interested to study further

also

• I have no experience for Network security

• I will make mistake

• I want your feedback!

• Please ask lots of questions

Bird’s eye view

Network

securityUbiquitousComputing

Crypto

Bird’s eye view

Network

securityUbiquitousComputing

Crypto

This course

Today

• Introduction to Ubiquitous Computing• Definitions of Ubiquitous Computing• Future Ubiquitous Life

Today

• Introduction to Ubiquitous Computing• Definitions of Ubiquitous Computing• Future Ubiquitous Life

Ubiquitous computing

Network security

http://gantur-course.blogspot.com

Ubiquitous computing

Network security

Network Security

•Attacks, services and mechanisms

•Security attacks

•Security services

•Methods of Defense

• Attacks, services and mechanisms

•Security attacks

•Security services

•Methods of Defense

• Attacks, services and mechanisms

•Security attacks

•Security services

•Methods of Defense

• Attacks, services and mechanisms

•Security attacks

•Security services

•Methods of Defense

• Attacks, services and mechanisms

•Security attacks

•Security services

•Methods of Defense

• Attacks, services and mechanisms

•Security attacks

•Security services

•Methods of Defense

• Attacks, services and mechanisms

•Security attacks

•Security services

•Methods of Defense

• Attacks, services and mechanisms

•Security attacks

•Security services

•Methods of Defense