+ All Categories
Home > Documents > Lecture 01

Lecture 01

Date post: 19-Jul-2015
Category:
Upload: ganaaturuu
View: 193 times
Download: 0 times
Share this document with a friend
Popular Tags:
43
Network Security ( Cүлжээний хамгаалалт) 2011, fall
Transcript
Page 1: Lecture 01

Network Security( Cүлжээний хамгаалалт)

2011, fall

Page 2: Lecture 01

Contact information

Instructor: Gantur Togtokh

– Email: [email protected]

– Office: B306(Software engineering department),

– Office hours: Mon-Fir 08:00-17:00

• Unless there is a dept. meeting or class

• Else, by appointment

Page 3: Lecture 01

Prerequisites

• At least one of:– Computer Networks– Network Programming (Socket)– Wireless Networks– Mobile Communications

• At least one of:– Network Security– Cryptography– Data Structures– Computer Algorithms

Page 4: Lecture 01

Course Textbooks/References

• Textbooks

– No textbooks required.

• References

– F. Adelstein, S. K. Gupta, G. Richard III, L Schwiebert, "Fundamentals of

Mobile and Pervasive Computing", McGraw-Hill Professional, ISBN:

0071412379

Page 5: Lecture 01

Course Topics – tentative and unsorted

• Introduction to ubiquitious computing

• Introduction to Network Security

• RFID and its security Issues

• Wireless sensor Networks

• Mobile Ad hoc Network

• TCP IP socket programming

• Etc…

Page 6: Lecture 01

Course Assignment

1. Cipher

2. TCP/IP socket programming

(exchange info between two computers)

Page 7: Lecture 01

Focus of the class

- Learn basic security mechanisms(crypto)

- You will certainty not become an expert

- You will(I hope) be interested to study further

Page 8: Lecture 01

also

• I have no experience for Network security

• I will make mistake

• I want your feedback!

• Please ask lots of questions

Page 9: Lecture 01

Bird’s eye view

Network

securityUbiquitousComputing

Crypto

Page 10: Lecture 01

Bird’s eye view

Network

securityUbiquitousComputing

Crypto

This course

Page 11: Lecture 01

Today

• Introduction to Ubiquitous Computing• Definitions of Ubiquitous Computing• Future Ubiquitous Life

Page 12: Lecture 01

Today

• Introduction to Ubiquitous Computing• Definitions of Ubiquitous Computing• Future Ubiquitous Life

Page 13: Lecture 01
Page 14: Lecture 01
Page 15: Lecture 01
Page 16: Lecture 01
Page 17: Lecture 01
Page 18: Lecture 01
Page 19: Lecture 01
Page 20: Lecture 01
Page 21: Lecture 01
Page 22: Lecture 01
Page 23: Lecture 01
Page 24: Lecture 01
Page 25: Lecture 01

Ubiquitous computing

Network security

Page 26: Lecture 01

http://gantur-course.blogspot.com

Page 27: Lecture 01

Ubiquitous computing

Network security

Page 28: Lecture 01

Network Security

Page 29: Lecture 01

•Attacks, services and mechanisms

•Security attacks

•Security services

•Methods of Defense

Page 30: Lecture 01

• Attacks, services and mechanisms

•Security attacks

•Security services

•Methods of Defense

Page 31: Lecture 01

• Attacks, services and mechanisms

•Security attacks

•Security services

•Methods of Defense

Page 32: Lecture 01

• Attacks, services and mechanisms

•Security attacks

•Security services

•Methods of Defense

Page 33: Lecture 01

• Attacks, services and mechanisms

•Security attacks

•Security services

•Methods of Defense

Page 34: Lecture 01

• Attacks, services and mechanisms

•Security attacks

•Security services

•Methods of Defense

Page 35: Lecture 01

• Attacks, services and mechanisms

•Security attacks

•Security services

•Methods of Defense

Page 36: Lecture 01
Page 37: Lecture 01
Page 38: Lecture 01
Page 39: Lecture 01
Page 40: Lecture 01
Page 41: Lecture 01
Page 42: Lecture 01
Page 43: Lecture 01

• Attacks, services and mechanisms

•Security attacks

•Security services

•Methods of Defense


Recommended