tailieunhanh - Lecture Network security: Chapter 1 - Dr. Munam Ali Shah

This chapter provides knowledge of network security. In this chapter students will be able to: provide a survey and exposure of both principles and practice of network security; determine threats to a network and how to protect organization’s systems and data from attacks. This chapter will also help you understand and learn counter measures used to prevent, detect and correct security violations in a computer network. | Network Security CSC332 Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey : University of Peshawar Serving COMSATS since July 2004 Some Pictures Park Square Campus, UoB, Luton Putteridge Burry Campus, UoB, Luton New Post Graduate Center, UoB, Luton About the course To provide a survey and exposure of both principles and practice of network security. To determine threats to a network and how to protect organization’s systems and data from attacks. The course will also help you understand and learn counter measures used to prevent, detect and correct security violations in a computer network. You will NOT learn How to do computer hacking Break in a computer server and gain access to sensitive data Books and Resources Cryptography and Network Security, 6th Edition by William Stallings Network Secuirty Private Coomunication in a Public World, 2nd Edition by Charlie Kaufman, Radia Perlman, and Mike Speciner How this course will be run The course is comprised | Network Security CSC332 Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey : University of Peshawar Serving COMSATS since July 2004 Some Pictures Park Square Campus, UoB, Luton Putteridge Burry Campus, UoB, Luton New Post Graduate Center, UoB, Luton About the course To provide a survey and exposure of both principles and practice of network security. To determine threats to a network and how to protect organization’s systems and data from attacks. The course will also help you understand and learn counter measures used to prevent, detect and correct security violations in a computer network. You will NOT learn How to do computer hacking Break in a computer server and gain access to sensitive data Books and Resources Cryptography and Network Security, 6th Edition by William Stallings Network Secuirty Private Coomunication in a Public World, 2nd Edition by Charlie Kaufman, Radia Perlman, and Mike Speciner How this course will be run The course is comprised of 32 lectures and is divided in following parts: Part - 1: Computer/System Security Part - 2: Network Security Part - 3: Internet Security Part - 1: Computer/System Security The main concepts that are discussed in this part are: Security concepts, security violation categories, security measure levels, methods to violate security, types of attacks and firewalls. This part will be covered in Lecture 1 to Lecture 4 Part - 2: Network Security This part is will cover most of the contents of the course. It has been further divided in following sub-parts: Analysis of network security Cryptography as a network security tool Symmetric key cryptography Asymmetric key cryptography Incorporating security in other parts of the network Part – 2 (a): Analysis of network security Here we will discuss : Network threats (viruses, worms, Trojan horse), countermeasures of the threats, network security model, access control, principles and techniques of network security with examples of how they are .

TÀI LIỆU LIÊN QUAN
TỪ KHÓA LIÊN QUAN