SECURITY
24. huhtikuuta 14
CLASS SCHEDULE
Feedback
Course schedule
Aspects of security
Exercise for next week
24. huhtikuuta 14
FEEDBACK
Wish to learn abstract
principles for security
Wish to learn practical things
Like project based learning
Prefer ...
MOODLE
All exercise related
information will be on
Moodle
Lecture slides will be on
Noppa
There is a discussion
forum in M...
COURSE SCHEDULE
Week Tuesday Thursday
April 14 - April 20 Introduction Easter
April 21 - April 27 Easter What is security
...
WHAT IS SECURITY?
24. huhtikuuta 14
FRAMEWORK FOR
SECURITY
Policy,
mechanism,
assurance,
incentive
24. huhtikuuta 14
ASPECTS OF SECURITY
24. huhtikuuta 14
ASPECTS OF SECURITY
Communication securityInformation security
Human issues in security
24. huhtikuuta 14
ASPECTS OF SECURITY
Protocol security
Communication securityInformation security
Human issues in security
24. huhtikuuta 14
ASPECTS OF SECURITY
Protocol security
Protocol Analysis
Communication securityInformation security
Human issues in securit...
ASPECTS OF SECURITY
Cryptography
Protocol security
Protocol Analysis
Communication securityInformation security
Human issu...
ASPECTS OF SECURITY
Cryptography
Cryptanalysis
Protocol security
Protocol Analysis
Communication securityInformation secur...
ASPECTS OF SECURITY
Cryptography
Cryptanalysis
Protocol security
Protocol Analysis
Communication securityInformation secur...
ASPECTS OF SECURITY
Cryptography
Cryptanalysis
Protocol security
Protocol Analysis
Communication securityInformation secur...
ASPECTS OF SECURITY
Cryptography
Cryptanalysis
Protocol security
Protocol Analysis
Communication securityInformation secur...
ASPECTS OF SECURITY
Cryptography
Cryptanalysis
Protocol security
Protocol Analysis
Communication securityInformation secur...
ASPECTS OF SECURITY
Cryptography
Cryptanalysis
Protocol security
Protocol Analysis
Communication securityInformation secur...
ASPECTS OF SECURITY
Cryptography
Cryptanalysis
Protocol security
Protocol Analysis
Communication securityInformation secur...
ASPECTS OF SECURITY
Cryptography
Cryptanalysis
Protocol security
Protocol Analysis
Communication securityInformation secur...
GROUP EXERCISE
Discuss and make a
presentation
what are the assets
that Aalto University
has to protect?
People affiliated ...
HOMEWORK (1)
Read chapter 4 of the
book. There will be
classroom exercises based
on section 4.2 and
discussion on the rest...
ACCESS CONTROL
EXERCISE
The CIA model (Confidentiality,
Intergrity, Availability) is a fairly
useful tool for analyzing the...
Upcoming SlideShare
Loading in …5
×

Security basics

320 views

Published on

Security basics.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
320
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
8
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Security basics

  1. 1. SECURITY 24. huhtikuuta 14
  2. 2. CLASS SCHEDULE Feedback Course schedule Aspects of security Exercise for next week 24. huhtikuuta 14
  3. 3. FEEDBACK Wish to learn abstract principles for security Wish to learn practical things Like project based learning Prefer traditional teaching To learn more about Internet security Worried about flipped classroom method Enjoy team work Traditional teaching outdated Learn fundamentals of information security Security problems are complex Decent level of security Access control Good reading material Protocol specific security issues and how they were fixed What kind of jobs we can do in this field Wish: Discussion forum 24. huhtikuuta 14
  4. 4. MOODLE All exercise related information will be on Moodle Lecture slides will be on Noppa There is a discussion forum in Moodle. If you have questions about course content, ask them there, so that others may benefit from the answers too. 24. huhtikuuta 14
  5. 5. COURSE SCHEDULE Week Tuesday Thursday April 14 - April 20 Introduction Easter April 21 - April 27 Easter What is security April 28- May 4 Access control 1st May May 5 - May 11 Access control 2 Incentive May 12 - May 18 Certificates Protocols 1 May 19 - May 25 Protocols 2 Security topics May 26 - June 1 Security topics Lab work on securityLab work on security 24. huhtikuuta 14
  6. 6. WHAT IS SECURITY? 24. huhtikuuta 14
  7. 7. FRAMEWORK FOR SECURITY Policy, mechanism, assurance, incentive 24. huhtikuuta 14
  8. 8. ASPECTS OF SECURITY 24. huhtikuuta 14
  9. 9. ASPECTS OF SECURITY Communication securityInformation security Human issues in security 24. huhtikuuta 14
  10. 10. ASPECTS OF SECURITY Protocol security Communication securityInformation security Human issues in security 24. huhtikuuta 14
  11. 11. ASPECTS OF SECURITY Protocol security Protocol Analysis Communication securityInformation security Human issues in security 24. huhtikuuta 14
  12. 12. ASPECTS OF SECURITY Cryptography Protocol security Protocol Analysis Communication securityInformation security Human issues in security 24. huhtikuuta 14
  13. 13. ASPECTS OF SECURITY Cryptography Cryptanalysis Protocol security Protocol Analysis Communication securityInformation security Human issues in security 24. huhtikuuta 14
  14. 14. ASPECTS OF SECURITY Cryptography Cryptanalysis Protocol security Protocol Analysis Communication securityInformation security Human issues in security System security 24. huhtikuuta 14
  15. 15. ASPECTS OF SECURITY Cryptography Cryptanalysis Protocol security Protocol Analysis Communication securityInformation security Human issues in security Security analysis System security 24. huhtikuuta 14
  16. 16. ASPECTS OF SECURITY Cryptography Cryptanalysis Protocol security Protocol Analysis Communication securityInformation security Human issues in security Security analysis System security Threat modeling 24. huhtikuuta 14
  17. 17. ASPECTS OF SECURITY Cryptography Cryptanalysis Protocol security Protocol Analysis Communication securityInformation security Human issues in security Organization security Security analysis System security Threat modeling 24. huhtikuuta 14
  18. 18. ASPECTS OF SECURITY Cryptography Cryptanalysis Protocol security Protocol Analysis Communication securityInformation security Human issues in security Organization security Process security Security analysis System security Threat modeling 24. huhtikuuta 14
  19. 19. ASPECTS OF SECURITY Cryptography Cryptanalysis Protocol security Protocol Analysis Communication securityInformation security Human issues in security Security economics Organization security Process security Security analysis System security Threat modeling 24. huhtikuuta 14
  20. 20. ASPECTS OF SECURITY Cryptography Cryptanalysis Protocol security Protocol Analysis Communication securityInformation security Human issues in security Security economics Organization security Process security Security analysis System security Threat modeling Access control 24. huhtikuuta 14
  21. 21. GROUP EXERCISE Discuss and make a presentation what are the assets that Aalto University has to protect? People affiliated with Aalto: What categories do they belong to? Where do the potential security threats come from? 24. huhtikuuta 14
  22. 22. HOMEWORK (1) Read chapter 4 of the book. There will be classroom exercises based on section 4.2 and discussion on the rest of chapter. Write a lecture log about this class (1-2 pages). Deadline Monday 12 pm (noon) You can use the following questions to help you: what did you learn about security and it’s different parts during class and pre- assignment? Was something difficult to understand? What? 24. huhtikuuta 14
  23. 23. ACCESS CONTROL EXERCISE The CIA model (Confidentiality, Intergrity, Availability) is a fairly useful tool for analyzing the security requirements in various situations. Deadline Monday 12 PM 1) Use the CIA model to analyze the security requirements for the following problems a single (computer) file containing the exam questions for this course: a day before the exam, when the exam starts, and a day after the exam a student's exam answers a published research paper an unpublished research paper a teacher's slides for a course 2) Take a look at https:// oma.aalto.fi and check your Personal Attributes for Aalto Shibboleth authentication. What is Shibboleth and how is this information used? Try to analyze what roles do you have in Aalto? 24. huhtikuuta 14

×