Sie sind auf Seite 1von 14

Introduction to

Network Security
J. H. Wang
Feb. 24, 2011
Instructor
Instructor
Jenq-Haur Wang ()
Assistant Professor, CSIE, NTUT
Office: R1534, Technology Building
E-mail: jhwang@csie.ntut.edu.tw
Homepage: http://www.ntut.edu.tw/~jhwang/
Tel: ext. 4238
Office Hour: 10:10-12:00am every Wednesday and
Thursday

Course Overview
Course: Network Security
Time: 15:10-18:00pm on Thursdays
Classroom: R526, 6th Teaching Building
Prerequisite: Discrete Mathematics,
Computer Networks
Course webpage:
http://www.ntut.edu.tw/~jhwang/NS/

Target Students
For those who
Major in Computer Science or Information
Technology, and
Are familiar with basic computer networks
and discrete mathematics, and
Are preparing to investigate more details in
selected topics and recent developments in
network and system security
Resources
Textbook: Network Security Essentials: Applications and
Standards, 4th ed., by William Stallings, Pearson
Education, Inc., 2011. (International Edition, imported by
Kai-Fa Publishing)
http://williamstallings.com/NetSec/NetSec4e.html
Online chapters and appendices available
References:
Cryptography and Network Security: Principles and Practice, Fifth
Edition, by William Stallings, Prentice-Hall, 2011 (from which
our textbook is adapted)
Slides, documents, and tools
Teaching
Lectures
Homework assignments
Homework should be turned in within two
weeks
Lab exercises or topical surveys
How to use a security tool
How do intruders attack our systems
How do we protect against attacks
Mid-term and final exams
Grading Policy
(Tentative) grading policy
Homework assignments: 30%
Attendance, lab exercises or topical surveys:
25%
Midterm and final exams: 45%

Course Description
Introduction to basic concepts in network
security and their applications
Cryptography
Encryption, hash function, digital signature
Network security applications
HTTPS, wireless security, e-mail security, IP
security
System security
Intrusion, virus, firewall
Outline & Schedule
Outline
Introduction
Cryptography (Ch. 2-3)
Symmetric encryption and message confidentiality
Public-key cryptography and message authentication
Network security applications (Ch. 4-8)
Key distribution and user authentication
Transport-level security
Wireless network security
Electronic mail security
IP security
System security (Ch. 9-11)
Intruders
Malicious software
Firewalls
Outline & Schedule (Cont)
Online chapters (Ch.12-13)
Network management security
Legal and ethical aspects

Outline & Schedule (Cont)
(Tentative) Schedule
Introduction: 1-2 wks
Cryptography: 3-4 wks
Network security applications: 7-8 wks
TCP/IP
Web, SSH, E-mail, IP security
System security: 1-2 wks
Intrusion detection, password, virus, firewall
Due to the time limits, we will try to cover most of the
major topics above without going too much into details
E.g.: mathematical parts such as number theory (Appendix A)
A broad overview, and then focus on selected topics in depth
Additional Resources
Review on computer networking and
TCP/IP protocols
Slides on network and information
security
Useful tools for network and system
security
Web resources and recommended reading
(at the end of each chapter)

More on Lab Exercises or Topical
Surveys
We might give lab exercises or surveys in
network security-related topics, e.g.:
Demonstration on how to use a network
security tool
Comparison of security standards or
algorithms
Potential security weakness in systems, and
possible solutions or countermeasures


Thanks for Your Attention!

Das könnte Ihnen auch gefallen