1 / 15

CS 494/594 Computer and Network Security

CS 494/594 Computer and Network Security. Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010. Welcome!. Me… You…. My Contact. Office: 222 Claxton Email: jysun@eecs.utk.edu Phone: 865-974-0426

farrah
Download Presentation

CS 494/594 Computer and Network Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

  2. Welcome! • Me… • You…

  3. My Contact Office: 222 Claxton Email: jysun@eecs.utk.edu Phone: 865-974-0426 Course Website: http://web.eecs.utk.edu/~jysun Meeting: MWF 3:35-4:25pm, 206 Claxton Office Hours: Monday 4:25-6:25pm

  4. TA’s Contact Robert (Bobby) Coop rcoop@utk.edu Office: 214 SERF Office Hours: T&TR 11:00am-1:00pm

  5. Course Objective • Get familiar with basic security concepts and cryptographic techniques • Learn computer and network attacks and defense • Be interested in security design? We will work together!

  6. Textbook & Reading Material Required: • Charlie Kaufman, Radia Perlman and Mike Speciner, Network Security: Private Communication in a Public World, 2nd Edition, Prentice Hall, 2002. ISBN-10: 0-13-046019-2. ISBN-13:978-0-13-046019-6. Optional: • Charles P. Pfleeger and Shari Lawrence Pfleeger, Security in Computing, 4th Edition, Prentice Hall, 2006. ISBN-10: 0-13-239077-9. ISBN-13: 978-0-13-239077-4. • William Stallings, Cryptography and Network Security: Principles and Practices, 4th Edition, Prentice Hall, 2005. ISBN-10: 0-13-187316-4. ISBN-13: 978-0-13-187316-2. • Ross Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Edition, Prentice Hall, 2008. ISBN-10: 0-47-006852-3. ISBN-13: 978-0-47-006852-6.

  7. Topics Covered • Basic security concepts • Cryptography basics • Computer security • Network security • Wireless security

  8. Class Policies • No laptops • Attend each lecture • Read all reading assignments • Work independently

  9. Class Policies (Cont’d) Grading • Homework: 20% • Project: 20% • Exams: 20%, 40%

  10. Class Policies (Cont’d) • Academic honesty • Office of Disability Services: Hoskins Library, 865-974-6087

  11. Our Famous People • Good guys: • Bad guys: Eve, Trudy

  12. A Peek Into Security encryption plaintext ciphertext shared secret key ciphertext plaintext decryption

  13. A Peek Into Security (Cont’d) encryption plaintext ciphertext ciphertext plaintext decryption

  14. A Peek Into Security (Cont’d) sign plaintext Signed message Signed message True or false verify

  15. 0th Assignment • A photo and name • A paragraph: reason you come to my class, your expectations Due Monday Aug. 23

More Related