TKK | Tietoverkkolaboratorio | Opetus
S-38.153 Security of Communication Protocols (2 cr)
Latest News:
The grade of this course does NOT depend on how well you speak english. It is the content that matters; for example, have you understood the subject without major errors.
About the slides: do them as clearly and well as you personally would expect other lecturers to do them.
Course information, spring 2003
Groups | Lectures | Exercises | Extra material
Lectures (27 hours): Seminar, supervisor Jorma
Jormakka
Tuesday 10-12 S2
Exercises (13 hours): Wednesday 14:15 - 16,
Wednesday 16:15 -18
Networking lab's student laboratory at G-wing, second floor
Supervisor for exercises: Massimo Nardone
Language: English
Time schedule for lectures:
1. Each group makes the exercises and produces an exercise report.The topic of the lecture:2. Each group also prepares and keeps one two-hour lecture. Each student prepares a 20 min lecture, and gives it, thus the group members together lecture 4*20+ time for questions = 2*45 min lecture. Each student must be prepared to present his lecture one week before the scheduled time since there may be occasions when somebody cannot be present.
Passing the course:
To pass the course you must have:
Grade of the course:your group must have returned the exercise report and it must be accepted (return the report by the end of May 2003 as a paper version into the locker number 10 in front of the notice board for this course). you must have presented 20 min lecture your group must have returned about 30 power point slides of lecture notes for the 2*45 min lecture you must pass the exam
Literature:
There are many good books. The one I use is D. Atkins et al: Internet
Security, Professional Reference, Second edition, New Riders, 1997 you
can try to get it but at the moment it is out of print.
Any sufficiently thick book dealing with the matters in the planned
content should do. Lecture notes will come through Edita but they do not
replace a book. No material is promised to be available through the Web.
This course deals with practical methods of security attacks and defenses in the Internet. Basic method and tools used to build security are described. Protocols for building security, like IPSEC, PGP, SET etc. are explained in some detail. See the planned content. The course is basically following the mentioned book, except for IPSEC and SET and such things, which are from other books. The lecturer does not possess any real expert knowledge on these issues and the lectures are only as good as they can be, but as security issues are important, we offer this course - it should get better over time. The exercises are connected with our new research on security attacks and being research, have totally unknown quality which mostly depends on the students taking the course. Hopefully they will be interesting.
The exercises consist of dividing the students to a group of attackers and a group of defenders and trying the methods in a set of experiment scenarios in a laboratory network. The attackers scan the network for holes, try to put trapdoors, crack passwords. The defenders use IDS, try to notice and to stop the attacks. The lecture and assisting personal try to get some results from the scenarios. This is the difficult idea, which will be tried in the exercises.
Lectures start at normal time, end
at normal time, the course will be given provided that there are minimum
5 students taking it. To all other questions, I say, as usual.
Tietoverkkolaboratorio on nyt osa Tietoliikenne- ja tietoverkkotekniikan laitosta. Tällä sivulla oleva tieto voi olla vanhentunutta.
Kurssien ajantasainen tieto on MyCourses-palvelussa.
Tämän sivun sisällöstä vastaavat ja
Webmaster.
Sivua on viimeksi päivitetty 14.01.2004 06:57. URI: http://www.netlab.tkk.fi/opetus/s38153/k2003/index.shtml [ TKK > Sähkö- ja tietoliikennetekniikan osasto > Tietoverkkolaboratorio > Opetus ] |
![]() |
![]() |