DOC PREVIEW
U of I CS 498 - Introduction to Cyber Security Lab

This preview shows page 1-2-3 out of 9 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 9 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 9 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 9 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 9 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Slide 1Slide 2Slide 3Slide 4Slide 5Slide 6Slide 7Slide 8Slide 91/15/2008 Cyber Security Spring 2008Introduction to Cyber Security LabCS498shSusan HinrichsSpring 20081/15/2008 Cyber Security Spring 2008Administrivia•Meet Tuesdays/Thursdays 11:00-12:15 1131 Siebel•Security lab in 222 SC•Office hours in lab, time TBA–[email protected]–Office 4224 SC•Newsgroup cs.class.cs498sh•Web site http://www.cs.uiuc.edu/class/cs498sh1/15/2008 Cyber Security Spring 2008Class Structure•Complements introductory security courses like Information Assurance–Teach computer and network security mechanisms used in the field–Teach design techniques–A sampling of security technologies•Class meetings–Lectures on background material–In class exercises in lab–Guest lectures1/15/2008 Cyber Security Spring 2008Class Non-Goal•Class will not make you expert in any particular security technology•If that is your goal, better to take a specific technology training course or self study1/15/2008 Cyber Security Spring 2008Topics•Secure Programming –Least-privilege programming and impersonation –Worm anatomy –Malware frameworks•OS security –Windows ACLs and security policies –Vista security additions –SE Linux domain type enforcement policies –Mandatory access controls in SE Linux and perhaps other OS's –User identity •Database Security1/15/2008 Cyber Security Spring 2008More Topics•Network Security –Firewall configuration –IPSec –IPv6 –Access control servers –Network intrusion detection and monitoring –Honey pots –Wireless security –Network scanning •Defensive system design –Security architectures –Penetration testing1/15/2008 Cyber Security Spring 2008Reading Materials•Introductory Security Text for reference–Like Pfleeger and Pfleeger from Information Assurance, or Bishop's text, or Stalling's text•Supplemented with many papers and manuals1/15/2008 Cyber Security Spring 2008Course Evaluation•~5 Lab exercises – 50%•~2 Papers – 25%•Final design project – 25%•Folks taking for graduate credit –Research/deploy an additional technology•Pick your technology soon•e.g. PAM, AppArmour, BitLocker1/15/2008 Cyber Security Spring 2008Questions for the class•Have you taken an introductory security class?•Are you familiar with Windows and/or Linux?•Are you comfortable with C, C++, and/or Java?•Are you familiar with IP networking?•What do you hope to get out of this


View Full Document

U of I CS 498 - Introduction to Cyber Security Lab

Documents in this Course
Lecture 5

Lecture 5

13 pages

LECTURE

LECTURE

39 pages

Assurance

Assurance

44 pages

LECTURE

LECTURE

36 pages

Pthreads

Pthreads

29 pages

Load more
Download Introduction to Cyber Security Lab
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Introduction to Cyber Security Lab and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Introduction to Cyber Security Lab 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?