TKK | Tietoverkkolaboratorio | Opetus

S-38.153 Security of Communication Protocols (2 cr)
 


Latest News:
 



Course information, spring 2003

Groups | Lectures | Exercises | Extra material

Lectures (27 hours):    Seminar, supervisor Jorma Jormakka
                                        Tuesday 10-12 S2
Exercises (13 hours):    Wednesday 14:15 - 16, Wednesday 16:15 -18
                                           Networking lab's student laboratory at G-wing, second floor
                                            Supervisor for exercises: Massimo Nardone
Language: English

Time schedule for lectures:

How the course is organized:
In the first lecture students are divided into groups of 4 students.
1. Each group makes the exercises and produces an exercise report.

2. Each group also prepares and keeps one two-hour lecture. Each student prepares a 20 min lecture, and gives it, thus the group members together lecture 4*20+ time for questions = 2*45 min lecture. Each student must be prepared to present his lecture one week before the scheduled time since there may be occasions when somebody cannot be present.

The topic of the lecture:
The topic of the lecture may be the topic of the lecture from the year 2002 and it can be based on the lecture notes from 2002 (The slides from spring 2002 are here). However, the lecture can also be from another topic and based on new lecture notes. It is forbidden to use existing lecture notes except for the ones from this course. The topic must be announced in email to jorma.jormakka@hut.fi by 21.1.2003.

Passing the course:
To pass the course you must have:

  • your group must have returned the exercise report and it must be accepted (return the report  by the end of May 2003 as a paper version into the locker number 10 in front of the notice board for this course).
  • you must have presented 20 min lecture
  • your group must have returned about 30 power point slides of lecture notes for the 2*45 min lecture
  • you must pass the exam
  • Grade of the course: Grade of the slides for the lecture notes:
    If they are the slides from 2002 directly, 0 points but accepted. If they are very good new slides with new content 3 points. Modifies or poor original slides 1-2 points.

    Literature:
    There are many good books. The one I use is D. Atkins et al: Internet Security, Professional Reference, Second edition, New Riders, 1997 you can try to get it but at the moment it is out of print.

    Any sufficiently thick book dealing with the matters in the planned content should do. Lecture notes will come through Edita but they do not replace a book. No material is promised to be available through the Web.


    Contents

    After the name of the course was selected and the description in the study program given, the planned character of the course has been modified. Contrary to what stated in the study program the course does not look at cryptological methods, the course is only briefly explaining the terms, which are needed here. Knowledge of basic cryptology is not a requirement for taking this course, however, one should learn this information in some way if one is interested in security issues. One could for instance read B. Schneier's Applied Cryptography for a good overview.

    This course deals with practical methods of security attacks and defenses in the Internet. Basic method and tools used to build security are described. Protocols for building security, like IPSEC, PGP, SET etc. are explained in some detail. See the planned content. The course is basically following the mentioned book, except for IPSEC and SET and such things, which are from other books. The lecturer does not possess any real expert knowledge on these issues and the lectures are only as good as they can be, but as security issues are important, we offer this course - it should get better over time. The exercises are connected with our new research on security attacks and being research, have totally unknown quality which mostly depends on the students taking the course. Hopefully they will be interesting.

    The exercises consist of dividing the students to a group of attackers and a group of defenders and trying the methods in a set of experiment scenarios in a laboratory network. The attackers scan the network for holes, try to put trapdoors, crack passwords. The defenders use IDS, try to notice and to stop the attacks. The lecture and assisting personal try to get some results from the scenarios. This is the difficult idea, which will be tried in the exercises.

    Lectures start at normal time, end at normal time, the course will be given provided that there are minimum 5 students taking it. To all other questions, I say, as usual.


    Tietoverkkolaboratorio on nyt osa Tietoliikenne- ja tietoverkkotekniikan laitosta. Tällä sivulla oleva tieto voi olla vanhentunutta.

    Kurssien ajantasainen tieto on MyCourses-palvelussa.

    Tämän sivun sisällöstä vastaavat ja Webmaster.
    Sivua on viimeksi päivitetty 14.01.2004 06:57.
    URI: http://www.netlab.tkk.fi/opetus/s38153/k2003/index.shtml
    [ TKK > Sähkö- ja tietoliikennetekniikan osasto > Tietoverkkolaboratorio > Opetus ]
    ?Kysy =>Anna palautetta!