Network and System security Risk assessment Introduction
Network and System Security Risk Assessment --Introduction
Outline Why to begin this subject? 口 Network Security a System Security What is in this course? a Network protocols and problems a System security configuration and programming 知己知彼,百战不殆
Outline ◼ Why to begin this subject? ❑ Network Security ❑ System Security ◼ What is in this course? ❑ Network protocols and problems ❑ System security configuration and programming ◼ 知己知彼,百战不殆
some interesting examples Conan Kevin mitnick And other hackers
some interesting examples ◼ Conan ◼ Kevin Mitnick ◼ And other hackers
An interesting movie clip Phreaking a is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks
An interesting movie clip ◼ Phreaking ❑ is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks
An interesting interview Kevin mitnick interview Kevin mitnick attack in 1994
An interesting interview ◼ Kevin Mitnick interview ◼ Kevin Mitnick attack in 1994
Purpose of the course provide a basic introduction on common network and system security vulnerabilities Cultivate basic networking and system programming skills
Purpose of the Course ◼ provide a basic introduction on common network and system security vulnerabilities; ◼ Cultivate basic networking and system programming skills;
Content of the course Analysis of packet structure a Packet sniffing a Port scanning a Introduction to a number of threats and vulnerabilities of TCP/P pr rotocol stack 口 ARP poison a TCP SYN Flooding
Content of the Course ◼ Analysis of packet structure ❑ Packet sniffing ❑ Port scanning…. ❑ …. ◼ Introduction to a number of threats and vulnerabilities of TCP/IP protocol stack: ❑ ARP poison… ❑ TCP SYN Flooding ❑ …
Content of the course Cover some computer system security problems and programming Firewall: iptables& netfilter 口 Kernel module 口 Rootkit
Content of the Course ◼ Cover some computer system security problems and programming ❑ Firewall: iptables & netfilter ❑ Kernel module ❑ Rootkit ❑ …
Experiments Write simple programs o backdoor 口 sniffer 口 Firewall 口 Rootkit;
Experiments ◼ Write simple programs: ❑ backdoor; ❑ sniffer; ❑ Firewall; ❑ Rootkit; ❑ …
Expectation Get an in-depth understanding of TCP/IP protocol stack Familiarize with usage of various network commands and tools Master socket programming, netfilter, etc
Expectation: ◼ Get an in-depth understanding of TCP/IP protocol stack ◼ Familiarize with usage of various network commands and tools ◼ Master socket programming, netfilter, etc