SlideShare a Scribd company logo
SECURITY
24. huhtikuuta 14
CLASS SCHEDULE
Feedback
Course schedule
Aspects of security
Exercise for next week
24. huhtikuuta 14
FEEDBACK
Wish to learn abstract
principles for security
Wish to learn practical things
Like project based learning
Prefer traditional teaching
To learn more about Internet
security
Worried about flipped
classroom method
Enjoy team work
Traditional teaching outdated
Learn fundamentals of
information security
Security problems are
complex
Decent level of security
Access control
Good reading material
Protocol specific security
issues and how they were
fixed
What kind of jobs we can do
in this field
Wish: Discussion forum
24. huhtikuuta 14
MOODLE
All exercise related
information will be on
Moodle
Lecture slides will be on
Noppa
There is a discussion
forum in Moodle. If you
have questions about
course content, ask
them there, so that
others may benefit from
the answers too.
24. huhtikuuta 14
COURSE SCHEDULE
Week Tuesday Thursday
April 14 - April 20 Introduction Easter
April 21 - April 27 Easter What is security
April 28- May 4 Access control 1st May
May 5 - May 11 Access control 2 Incentive
May 12 - May 18 Certificates Protocols 1
May 19 - May 25 Protocols 2 Security topics
May 26 - June 1 Security topics
Lab work on securityLab work on security
24. huhtikuuta 14
WHAT IS SECURITY?
24. huhtikuuta 14
FRAMEWORK FOR
SECURITY
Policy,
mechanism,
assurance,
incentive
24. huhtikuuta 14
ASPECTS OF SECURITY
24. huhtikuuta 14
ASPECTS OF SECURITY
Communication securityInformation security
Human issues in security
24. huhtikuuta 14
ASPECTS OF SECURITY
Protocol security
Communication securityInformation security
Human issues in security
24. huhtikuuta 14
ASPECTS OF SECURITY
Protocol security
Protocol Analysis
Communication securityInformation security
Human issues in security
24. huhtikuuta 14
ASPECTS OF SECURITY
Cryptography
Protocol security
Protocol Analysis
Communication securityInformation security
Human issues in security
24. huhtikuuta 14
ASPECTS OF SECURITY
Cryptography
Cryptanalysis
Protocol security
Protocol Analysis
Communication securityInformation security
Human issues in security
24. huhtikuuta 14
ASPECTS OF SECURITY
Cryptography
Cryptanalysis
Protocol security
Protocol Analysis
Communication securityInformation security
Human issues in security
System security
24. huhtikuuta 14
ASPECTS OF SECURITY
Cryptography
Cryptanalysis
Protocol security
Protocol Analysis
Communication securityInformation security
Human issues in security
Security analysis
System security
24. huhtikuuta 14
ASPECTS OF SECURITY
Cryptography
Cryptanalysis
Protocol security
Protocol Analysis
Communication securityInformation security
Human issues in security
Security analysis
System security
Threat modeling
24. huhtikuuta 14
ASPECTS OF SECURITY
Cryptography
Cryptanalysis
Protocol security
Protocol Analysis
Communication securityInformation security
Human issues in security
Organization
security
Security analysis
System security
Threat modeling
24. huhtikuuta 14
ASPECTS OF SECURITY
Cryptography
Cryptanalysis
Protocol security
Protocol Analysis
Communication securityInformation security
Human issues in security
Organization
security
Process security
Security analysis
System security
Threat modeling
24. huhtikuuta 14
ASPECTS OF SECURITY
Cryptography
Cryptanalysis
Protocol security
Protocol Analysis
Communication securityInformation security
Human issues in security
Security
economics
Organization
security
Process security
Security analysis
System security
Threat modeling
24. huhtikuuta 14
ASPECTS OF SECURITY
Cryptography
Cryptanalysis
Protocol security
Protocol Analysis
Communication securityInformation security
Human issues in security
Security
economics
Organization
security
Process security
Security analysis
System security
Threat modeling
Access control
24. huhtikuuta 14
GROUP EXERCISE
Discuss and make a
presentation
what are the assets
that Aalto University
has to protect?
People affiliated with
Aalto: What
categories do they
belong to?
Where do the
potential security
threats come from?
24. huhtikuuta 14
HOMEWORK (1)
Read chapter 4 of the
book. There will be
classroom exercises based
on section 4.2 and
discussion on the rest of
chapter.
Write a lecture log about
this class (1-2 pages).
Deadline Monday 12 pm
(noon)
You can use the following
questions to help you:
what did you learn
about security and it’s
different parts during
class and pre-
assignment?
Was something difficult
to understand? What?
24. huhtikuuta 14
ACCESS CONTROL
EXERCISE
The CIA model (Confidentiality,
Intergrity, Availability) is a fairly
useful tool for analyzing the
security requirements in various
situations.
Deadline Monday 12 PM
1) Use the CIA model to analyze
the security requirements for the
following problems
a single (computer) file
containing the exam questions
for this course: a day before
the exam, when the exam
starts, and a day after the exam
a student's exam answers
a published research paper
an unpublished research paper
a teacher's slides for a course
2) Take a look at https://
oma.aalto.fi and check your
Personal Attributes for Aalto
Shibboleth authentication.
What is Shibboleth and how is
this information used?
Try to analyze what roles do
you have in Aalto?
24. huhtikuuta 14

More Related Content

Similar to Security basics

Cyber Education: Your Options & Resources Mapped Out
Cyber Education: Your Options & Resources Mapped OutCyber Education: Your Options & Resources Mapped Out
Cyber Education: Your Options & Resources Mapped Out
Kelly Shortridge
 
BAIT1103 Course Overview
BAIT1103 Course OverviewBAIT1103 Course Overview
BAIT1103 Course Overviewlimsh
 
Csci e46-syllabus-spring19-v1-2
Csci e46-syllabus-spring19-v1-2Csci e46-syllabus-spring19-v1-2
Csci e46-syllabus-spring19-v1-2
BSD Certification Group
 
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
laurieannwilliams
 
Lecture 1 Introduction to Network Security
Lecture 1 Introduction to Network SecurityLecture 1 Introduction to Network Security
Lecture 1 Introduction to Network Security
Darwish Ahmad
 
Mirror mirrror
Mirror mirrrorMirror mirrror
Mirror mirrror
Flinturgy
 
information security management
information security managementinformation security management
information security management
Gurpreetkaur838
 
Information Systems Security: Security Management, Metrics, Frameworks and Be...
Information Systems Security: Security Management, Metrics, Frameworks and Be...Information Systems Security: Security Management, Metrics, Frameworks and Be...
Information Systems Security: Security Management, Metrics, Frameworks and Be...
Wiley India Private Limited
 
Security, Devices and Education
Security, Devices and EducationSecurity, Devices and Education
Security, Devices and Education
Universidad Nacional de Educación a Distancia
 
ceh pdf work.pdf
ceh pdf work.pdfceh pdf work.pdf
ceh pdf work.pdf
SecuriumSolutions2
 
NIST Privacy Engineering Working Group -- Risk Models
 NIST Privacy Engineering Working Group -- Risk Models NIST Privacy Engineering Working Group -- Risk Models
NIST Privacy Engineering Working Group -- Risk Models
David Sweigert
 
lecture on cyber security_1234567890.ppt
lecture on cyber security_1234567890.pptlecture on cyber security_1234567890.ppt
lecture on cyber security_1234567890.ppt
VijayDSK1
 
Technophilia or Technophobia - Exploring Teacher Autonomy In Learning ICT/Web...
Technophilia or Technophobia - Exploring Teacher Autonomy In Learning ICT/Web...Technophilia or Technophobia - Exploring Teacher Autonomy In Learning ICT/Web...
Technophilia or Technophobia - Exploring Teacher Autonomy In Learning ICT/Web...
Phil Longwell
 
Peter burgess, prio NORDsteva NCoE
Peter burgess, prio NORDsteva NCoEPeter burgess, prio NORDsteva NCoE
Peter burgess, prio NORDsteva NCoENordForsk
 
ISM Chapter 1.ppt
ISM Chapter 1.pptISM Chapter 1.ppt
ISM Chapter 1.ppt
SajjadAbdullah4
 
Ethics and information security 2
Ethics and information security 2Ethics and information security 2
Ethics and information security 2
PT Bank Syariah Mandiri
 
Dave Tyson Profile for CISO Insights
Dave Tyson Profile for CISO InsightsDave Tyson Profile for CISO Insights
Dave Tyson Profile for CISO Insightsciso_insights
 
Ethics & Privacy for Learning Analytics
Ethics & Privacy for Learning AnalyticsEthics & Privacy for Learning Analytics
Ethics & Privacy for Learning Analytics
Tore Hoel
 
Executive Information Security Training
Executive Information Security TrainingExecutive Information Security Training
Executive Information Security Training
Angela Samuels
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summary
SensePost
 

Similar to Security basics (20)

Cyber Education: Your Options & Resources Mapped Out
Cyber Education: Your Options & Resources Mapped OutCyber Education: Your Options & Resources Mapped Out
Cyber Education: Your Options & Resources Mapped Out
 
BAIT1103 Course Overview
BAIT1103 Course OverviewBAIT1103 Course Overview
BAIT1103 Course Overview
 
Csci e46-syllabus-spring19-v1-2
Csci e46-syllabus-spring19-v1-2Csci e46-syllabus-spring19-v1-2
Csci e46-syllabus-spring19-v1-2
 
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
 
Lecture 1 Introduction to Network Security
Lecture 1 Introduction to Network SecurityLecture 1 Introduction to Network Security
Lecture 1 Introduction to Network Security
 
Mirror mirrror
Mirror mirrrorMirror mirrror
Mirror mirrror
 
information security management
information security managementinformation security management
information security management
 
Information Systems Security: Security Management, Metrics, Frameworks and Be...
Information Systems Security: Security Management, Metrics, Frameworks and Be...Information Systems Security: Security Management, Metrics, Frameworks and Be...
Information Systems Security: Security Management, Metrics, Frameworks and Be...
 
Security, Devices and Education
Security, Devices and EducationSecurity, Devices and Education
Security, Devices and Education
 
ceh pdf work.pdf
ceh pdf work.pdfceh pdf work.pdf
ceh pdf work.pdf
 
NIST Privacy Engineering Working Group -- Risk Models
 NIST Privacy Engineering Working Group -- Risk Models NIST Privacy Engineering Working Group -- Risk Models
NIST Privacy Engineering Working Group -- Risk Models
 
lecture on cyber security_1234567890.ppt
lecture on cyber security_1234567890.pptlecture on cyber security_1234567890.ppt
lecture on cyber security_1234567890.ppt
 
Technophilia or Technophobia - Exploring Teacher Autonomy In Learning ICT/Web...
Technophilia or Technophobia - Exploring Teacher Autonomy In Learning ICT/Web...Technophilia or Technophobia - Exploring Teacher Autonomy In Learning ICT/Web...
Technophilia or Technophobia - Exploring Teacher Autonomy In Learning ICT/Web...
 
Peter burgess, prio NORDsteva NCoE
Peter burgess, prio NORDsteva NCoEPeter burgess, prio NORDsteva NCoE
Peter burgess, prio NORDsteva NCoE
 
ISM Chapter 1.ppt
ISM Chapter 1.pptISM Chapter 1.ppt
ISM Chapter 1.ppt
 
Ethics and information security 2
Ethics and information security 2Ethics and information security 2
Ethics and information security 2
 
Dave Tyson Profile for CISO Insights
Dave Tyson Profile for CISO InsightsDave Tyson Profile for CISO Insights
Dave Tyson Profile for CISO Insights
 
Ethics & Privacy for Learning Analytics
Ethics & Privacy for Learning AnalyticsEthics & Privacy for Learning Analytics
Ethics & Privacy for Learning Analytics
 
Executive Information Security Training
Executive Information Security TrainingExecutive Information Security Training
Executive Information Security Training
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summary
 

More from Mikko Särelä

Ropecon nain rakennat kaupungin
Ropecon nain rakennat kaupunginRopecon nain rakennat kaupungin
Ropecon nain rakennat kaupungin
Mikko Särelä
 
Living+ kickoff slideset
Living+ kickoff slidesetLiving+ kickoff slideset
Living+ kickoff slideset
Mikko Särelä
 
06 protocols2
06 protocols206 protocols2
06 protocols2
Mikko Särelä
 
Industrial internet roundtable
Industrial internet roundtableIndustrial internet roundtable
Industrial internet roundtable
Mikko Särelä
 
Lisää kaupunkia Helsinkiin -ryhmästä kaupunkitutkijoille
Lisää kaupunkia Helsinkiin -ryhmästä kaupunkitutkijoilleLisää kaupunkia Helsinkiin -ryhmästä kaupunkitutkijoille
Lisää kaupunkia Helsinkiin -ryhmästä kaupunkitutkijoille
Mikko Särelä
 
Tukholman reissu 06092014
Tukholman reissu 06092014Tukholman reissu 06092014
Tukholman reissu 06092014
Mikko Särelä
 
Avoimesta datasta avoimeen kaupunkisuunnitteluun
Avoimesta datasta avoimeen kaupunkisuunnitteluunAvoimesta datasta avoimeen kaupunkisuunnitteluun
Avoimesta datasta avoimeen kaupunkisuunnitteluunMikko Särelä
 

More from Mikko Särelä (7)

Ropecon nain rakennat kaupungin
Ropecon nain rakennat kaupunginRopecon nain rakennat kaupungin
Ropecon nain rakennat kaupungin
 
Living+ kickoff slideset
Living+ kickoff slidesetLiving+ kickoff slideset
Living+ kickoff slideset
 
06 protocols2
06 protocols206 protocols2
06 protocols2
 
Industrial internet roundtable
Industrial internet roundtableIndustrial internet roundtable
Industrial internet roundtable
 
Lisää kaupunkia Helsinkiin -ryhmästä kaupunkitutkijoille
Lisää kaupunkia Helsinkiin -ryhmästä kaupunkitutkijoilleLisää kaupunkia Helsinkiin -ryhmästä kaupunkitutkijoille
Lisää kaupunkia Helsinkiin -ryhmästä kaupunkitutkijoille
 
Tukholman reissu 06092014
Tukholman reissu 06092014Tukholman reissu 06092014
Tukholman reissu 06092014
 
Avoimesta datasta avoimeen kaupunkisuunnitteluun
Avoimesta datasta avoimeen kaupunkisuunnitteluunAvoimesta datasta avoimeen kaupunkisuunnitteluun
Avoimesta datasta avoimeen kaupunkisuunnitteluun
 

Recently uploaded

Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABSDESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
itech2017
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
manasideore6
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 

Recently uploaded (20)

Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABSDESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 

Security basics

  • 2. CLASS SCHEDULE Feedback Course schedule Aspects of security Exercise for next week 24. huhtikuuta 14
  • 3. FEEDBACK Wish to learn abstract principles for security Wish to learn practical things Like project based learning Prefer traditional teaching To learn more about Internet security Worried about flipped classroom method Enjoy team work Traditional teaching outdated Learn fundamentals of information security Security problems are complex Decent level of security Access control Good reading material Protocol specific security issues and how they were fixed What kind of jobs we can do in this field Wish: Discussion forum 24. huhtikuuta 14
  • 4. MOODLE All exercise related information will be on Moodle Lecture slides will be on Noppa There is a discussion forum in Moodle. If you have questions about course content, ask them there, so that others may benefit from the answers too. 24. huhtikuuta 14
  • 5. COURSE SCHEDULE Week Tuesday Thursday April 14 - April 20 Introduction Easter April 21 - April 27 Easter What is security April 28- May 4 Access control 1st May May 5 - May 11 Access control 2 Incentive May 12 - May 18 Certificates Protocols 1 May 19 - May 25 Protocols 2 Security topics May 26 - June 1 Security topics Lab work on securityLab work on security 24. huhtikuuta 14
  • 6. WHAT IS SECURITY? 24. huhtikuuta 14
  • 8. ASPECTS OF SECURITY 24. huhtikuuta 14
  • 9. ASPECTS OF SECURITY Communication securityInformation security Human issues in security 24. huhtikuuta 14
  • 10. ASPECTS OF SECURITY Protocol security Communication securityInformation security Human issues in security 24. huhtikuuta 14
  • 11. ASPECTS OF SECURITY Protocol security Protocol Analysis Communication securityInformation security Human issues in security 24. huhtikuuta 14
  • 12. ASPECTS OF SECURITY Cryptography Protocol security Protocol Analysis Communication securityInformation security Human issues in security 24. huhtikuuta 14
  • 13. ASPECTS OF SECURITY Cryptography Cryptanalysis Protocol security Protocol Analysis Communication securityInformation security Human issues in security 24. huhtikuuta 14
  • 14. ASPECTS OF SECURITY Cryptography Cryptanalysis Protocol security Protocol Analysis Communication securityInformation security Human issues in security System security 24. huhtikuuta 14
  • 15. ASPECTS OF SECURITY Cryptography Cryptanalysis Protocol security Protocol Analysis Communication securityInformation security Human issues in security Security analysis System security 24. huhtikuuta 14
  • 16. ASPECTS OF SECURITY Cryptography Cryptanalysis Protocol security Protocol Analysis Communication securityInformation security Human issues in security Security analysis System security Threat modeling 24. huhtikuuta 14
  • 17. ASPECTS OF SECURITY Cryptography Cryptanalysis Protocol security Protocol Analysis Communication securityInformation security Human issues in security Organization security Security analysis System security Threat modeling 24. huhtikuuta 14
  • 18. ASPECTS OF SECURITY Cryptography Cryptanalysis Protocol security Protocol Analysis Communication securityInformation security Human issues in security Organization security Process security Security analysis System security Threat modeling 24. huhtikuuta 14
  • 19. ASPECTS OF SECURITY Cryptography Cryptanalysis Protocol security Protocol Analysis Communication securityInformation security Human issues in security Security economics Organization security Process security Security analysis System security Threat modeling 24. huhtikuuta 14
  • 20. ASPECTS OF SECURITY Cryptography Cryptanalysis Protocol security Protocol Analysis Communication securityInformation security Human issues in security Security economics Organization security Process security Security analysis System security Threat modeling Access control 24. huhtikuuta 14
  • 21. GROUP EXERCISE Discuss and make a presentation what are the assets that Aalto University has to protect? People affiliated with Aalto: What categories do they belong to? Where do the potential security threats come from? 24. huhtikuuta 14
  • 22. HOMEWORK (1) Read chapter 4 of the book. There will be classroom exercises based on section 4.2 and discussion on the rest of chapter. Write a lecture log about this class (1-2 pages). Deadline Monday 12 pm (noon) You can use the following questions to help you: what did you learn about security and it’s different parts during class and pre- assignment? Was something difficult to understand? What? 24. huhtikuuta 14
  • 23. ACCESS CONTROL EXERCISE The CIA model (Confidentiality, Intergrity, Availability) is a fairly useful tool for analyzing the security requirements in various situations. Deadline Monday 12 PM 1) Use the CIA model to analyze the security requirements for the following problems a single (computer) file containing the exam questions for this course: a day before the exam, when the exam starts, and a day after the exam a student's exam answers a published research paper an unpublished research paper a teacher's slides for a course 2) Take a look at https:// oma.aalto.fi and check your Personal Attributes for Aalto Shibboleth authentication. What is Shibboleth and how is this information used? Try to analyze what roles do you have in Aalto? 24. huhtikuuta 14