SlideShare une entreprise Scribd logo
1  sur  23
Télécharger pour lire hors ligne
SECURITY
24. huhtikuuta 14
CLASS SCHEDULE
Feedback
Course schedule
Aspects of security
Exercise for next week
24. huhtikuuta 14
FEEDBACK
Wish to learn abstract
principles for security
Wish to learn practical things
Like project based learning
Prefer traditional teaching
To learn more about Internet
security
Worried about flipped
classroom method
Enjoy team work
Traditional teaching outdated
Learn fundamentals of
information security
Security problems are
complex
Decent level of security
Access control
Good reading material
Protocol specific security
issues and how they were
fixed
What kind of jobs we can do
in this field
Wish: Discussion forum
24. huhtikuuta 14
MOODLE
All exercise related
information will be on
Moodle
Lecture slides will be on
Noppa
There is a discussion
forum in Moodle. If you
have questions about
course content, ask
them there, so that
others may benefit from
the answers too.
24. huhtikuuta 14
COURSE SCHEDULE
Week Tuesday Thursday
April 14 - April 20 Introduction Easter
April 21 - April 27 Easter What is security
April 28- May 4 Access control 1st May
May 5 - May 11 Access control 2 Incentive
May 12 - May 18 Certificates Protocols 1
May 19 - May 25 Protocols 2 Security topics
May 26 - June 1 Security topics
Lab work on securityLab work on security
24. huhtikuuta 14
WHAT IS SECURITY?
24. huhtikuuta 14
FRAMEWORK FOR
SECURITY
Policy,
mechanism,
assurance,
incentive
24. huhtikuuta 14
ASPECTS OF SECURITY
24. huhtikuuta 14
ASPECTS OF SECURITY
Communication securityInformation security
Human issues in security
24. huhtikuuta 14
ASPECTS OF SECURITY
Protocol security
Communication securityInformation security
Human issues in security
24. huhtikuuta 14
ASPECTS OF SECURITY
Protocol security
Protocol Analysis
Communication securityInformation security
Human issues in security
24. huhtikuuta 14
ASPECTS OF SECURITY
Cryptography
Protocol security
Protocol Analysis
Communication securityInformation security
Human issues in security
24. huhtikuuta 14
ASPECTS OF SECURITY
Cryptography
Cryptanalysis
Protocol security
Protocol Analysis
Communication securityInformation security
Human issues in security
24. huhtikuuta 14
ASPECTS OF SECURITY
Cryptography
Cryptanalysis
Protocol security
Protocol Analysis
Communication securityInformation security
Human issues in security
System security
24. huhtikuuta 14
ASPECTS OF SECURITY
Cryptography
Cryptanalysis
Protocol security
Protocol Analysis
Communication securityInformation security
Human issues in security
Security analysis
System security
24. huhtikuuta 14
ASPECTS OF SECURITY
Cryptography
Cryptanalysis
Protocol security
Protocol Analysis
Communication securityInformation security
Human issues in security
Security analysis
System security
Threat modeling
24. huhtikuuta 14
ASPECTS OF SECURITY
Cryptography
Cryptanalysis
Protocol security
Protocol Analysis
Communication securityInformation security
Human issues in security
Organization
security
Security analysis
System security
Threat modeling
24. huhtikuuta 14
ASPECTS OF SECURITY
Cryptography
Cryptanalysis
Protocol security
Protocol Analysis
Communication securityInformation security
Human issues in security
Organization
security
Process security
Security analysis
System security
Threat modeling
24. huhtikuuta 14
ASPECTS OF SECURITY
Cryptography
Cryptanalysis
Protocol security
Protocol Analysis
Communication securityInformation security
Human issues in security
Security
economics
Organization
security
Process security
Security analysis
System security
Threat modeling
24. huhtikuuta 14
ASPECTS OF SECURITY
Cryptography
Cryptanalysis
Protocol security
Protocol Analysis
Communication securityInformation security
Human issues in security
Security
economics
Organization
security
Process security
Security analysis
System security
Threat modeling
Access control
24. huhtikuuta 14
GROUP EXERCISE
Discuss and make a
presentation
what are the assets
that Aalto University
has to protect?
People affiliated with
Aalto: What
categories do they
belong to?
Where do the
potential security
threats come from?
24. huhtikuuta 14
HOMEWORK (1)
Read chapter 4 of the
book. There will be
classroom exercises based
on section 4.2 and
discussion on the rest of
chapter.
Write a lecture log about
this class (1-2 pages).
Deadline Monday 12 pm
(noon)
You can use the following
questions to help you:
what did you learn
about security and it’s
different parts during
class and pre-
assignment?
Was something difficult
to understand? What?
24. huhtikuuta 14
ACCESS CONTROL
EXERCISE
The CIA model (Confidentiality,
Intergrity, Availability) is a fairly
useful tool for analyzing the
security requirements in various
situations.
Deadline Monday 12 PM
1) Use the CIA model to analyze
the security requirements for the
following problems
a single (computer) file
containing the exam questions
for this course: a day before
the exam, when the exam
starts, and a day after the exam
a student's exam answers
a published research paper
an unpublished research paper
a teacher's slides for a course
2) Take a look at https://
oma.aalto.fi and check your
Personal Attributes for Aalto
Shibboleth authentication.
What is Shibboleth and how is
this information used?
Try to analyze what roles do
you have in Aalto?
24. huhtikuuta 14

Contenu connexe

Similaire à SECURITY ASPECTS

Cyber Education: Your Options & Resources Mapped Out
Cyber Education: Your Options & Resources Mapped OutCyber Education: Your Options & Resources Mapped Out
Cyber Education: Your Options & Resources Mapped OutKelly Shortridge
 
BAIT1103 Course Overview
BAIT1103 Course OverviewBAIT1103 Course Overview
BAIT1103 Course Overviewlimsh
 
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity laurieannwilliams
 
Lecture 1 Introduction to Network Security
Lecture 1 Introduction to Network SecurityLecture 1 Introduction to Network Security
Lecture 1 Introduction to Network SecurityDarwish Ahmad
 
Mirror mirrror
Mirror mirrrorMirror mirrror
Mirror mirrrorFlinturgy
 
information security management
information security managementinformation security management
information security managementGurpreetkaur838
 
Information Systems Security: Security Management, Metrics, Frameworks and Be...
Information Systems Security: Security Management, Metrics, Frameworks and Be...Information Systems Security: Security Management, Metrics, Frameworks and Be...
Information Systems Security: Security Management, Metrics, Frameworks and Be...Wiley India Private Limited
 
NIST Privacy Engineering Working Group -- Risk Models
 NIST Privacy Engineering Working Group -- Risk Models NIST Privacy Engineering Working Group -- Risk Models
NIST Privacy Engineering Working Group -- Risk ModelsDavid Sweigert
 
lecture on cyber security_1234567890.ppt
lecture on cyber security_1234567890.pptlecture on cyber security_1234567890.ppt
lecture on cyber security_1234567890.pptVijayDSK1
 
Technophilia or Technophobia - Exploring Teacher Autonomy In Learning ICT/Web...
Technophilia or Technophobia - Exploring Teacher Autonomy In Learning ICT/Web...Technophilia or Technophobia - Exploring Teacher Autonomy In Learning ICT/Web...
Technophilia or Technophobia - Exploring Teacher Autonomy In Learning ICT/Web...Phil Longwell
 
Peter burgess, prio NORDsteva NCoE
Peter burgess, prio NORDsteva NCoEPeter burgess, prio NORDsteva NCoE
Peter burgess, prio NORDsteva NCoENordForsk
 
Dave Tyson Profile for CISO Insights
Dave Tyson Profile for CISO InsightsDave Tyson Profile for CISO Insights
Dave Tyson Profile for CISO Insightsciso_insights
 
Ethics & Privacy for Learning Analytics
Ethics & Privacy for Learning AnalyticsEthics & Privacy for Learning Analytics
Ethics & Privacy for Learning AnalyticsTore Hoel
 
Executive Information Security Training
Executive Information Security TrainingExecutive Information Security Training
Executive Information Security TrainingAngela Samuels
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summarySensePost
 

Similaire à SECURITY ASPECTS (20)

Cyber Education: Your Options & Resources Mapped Out
Cyber Education: Your Options & Resources Mapped OutCyber Education: Your Options & Resources Mapped Out
Cyber Education: Your Options & Resources Mapped Out
 
BAIT1103 Course Overview
BAIT1103 Course OverviewBAIT1103 Course Overview
BAIT1103 Course Overview
 
Csci e46-syllabus-spring19-v1-2
Csci e46-syllabus-spring19-v1-2Csci e46-syllabus-spring19-v1-2
Csci e46-syllabus-spring19-v1-2
 
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
 
Lecture 1 Introduction to Network Security
Lecture 1 Introduction to Network SecurityLecture 1 Introduction to Network Security
Lecture 1 Introduction to Network Security
 
Mirror mirrror
Mirror mirrrorMirror mirrror
Mirror mirrror
 
information security management
information security managementinformation security management
information security management
 
Information Systems Security: Security Management, Metrics, Frameworks and Be...
Information Systems Security: Security Management, Metrics, Frameworks and Be...Information Systems Security: Security Management, Metrics, Frameworks and Be...
Information Systems Security: Security Management, Metrics, Frameworks and Be...
 
Security, Devices and Education
Security, Devices and EducationSecurity, Devices and Education
Security, Devices and Education
 
ceh pdf work.pdf
ceh pdf work.pdfceh pdf work.pdf
ceh pdf work.pdf
 
NIST Privacy Engineering Working Group -- Risk Models
 NIST Privacy Engineering Working Group -- Risk Models NIST Privacy Engineering Working Group -- Risk Models
NIST Privacy Engineering Working Group -- Risk Models
 
lecture on cyber security_1234567890.ppt
lecture on cyber security_1234567890.pptlecture on cyber security_1234567890.ppt
lecture on cyber security_1234567890.ppt
 
Technophilia or Technophobia - Exploring Teacher Autonomy In Learning ICT/Web...
Technophilia or Technophobia - Exploring Teacher Autonomy In Learning ICT/Web...Technophilia or Technophobia - Exploring Teacher Autonomy In Learning ICT/Web...
Technophilia or Technophobia - Exploring Teacher Autonomy In Learning ICT/Web...
 
Peter burgess, prio NORDsteva NCoE
Peter burgess, prio NORDsteva NCoEPeter burgess, prio NORDsteva NCoE
Peter burgess, prio NORDsteva NCoE
 
ISM Chapter 1.ppt
ISM Chapter 1.pptISM Chapter 1.ppt
ISM Chapter 1.ppt
 
Ethics and information security 2
Ethics and information security 2Ethics and information security 2
Ethics and information security 2
 
Dave Tyson Profile for CISO Insights
Dave Tyson Profile for CISO InsightsDave Tyson Profile for CISO Insights
Dave Tyson Profile for CISO Insights
 
Ethics & Privacy for Learning Analytics
Ethics & Privacy for Learning AnalyticsEthics & Privacy for Learning Analytics
Ethics & Privacy for Learning Analytics
 
Executive Information Security Training
Executive Information Security TrainingExecutive Information Security Training
Executive Information Security Training
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summary
 

Plus de Mikko Särelä

Ropecon nain rakennat kaupungin
Ropecon nain rakennat kaupunginRopecon nain rakennat kaupungin
Ropecon nain rakennat kaupunginMikko Särelä
 
Living+ kickoff slideset
Living+ kickoff slidesetLiving+ kickoff slideset
Living+ kickoff slidesetMikko Särelä
 
Industrial internet roundtable
Industrial internet roundtableIndustrial internet roundtable
Industrial internet roundtableMikko Särelä
 
Lisää kaupunkia Helsinkiin -ryhmästä kaupunkitutkijoille
Lisää kaupunkia Helsinkiin -ryhmästä kaupunkitutkijoilleLisää kaupunkia Helsinkiin -ryhmästä kaupunkitutkijoille
Lisää kaupunkia Helsinkiin -ryhmästä kaupunkitutkijoilleMikko Särelä
 
Tukholman reissu 06092014
Tukholman reissu 06092014Tukholman reissu 06092014
Tukholman reissu 06092014Mikko Särelä
 
Avoimesta datasta avoimeen kaupunkisuunnitteluun
Avoimesta datasta avoimeen kaupunkisuunnitteluunAvoimesta datasta avoimeen kaupunkisuunnitteluun
Avoimesta datasta avoimeen kaupunkisuunnitteluunMikko Särelä
 

Plus de Mikko Särelä (7)

Ropecon nain rakennat kaupungin
Ropecon nain rakennat kaupunginRopecon nain rakennat kaupungin
Ropecon nain rakennat kaupungin
 
Living+ kickoff slideset
Living+ kickoff slidesetLiving+ kickoff slideset
Living+ kickoff slideset
 
06 protocols2
06 protocols206 protocols2
06 protocols2
 
Industrial internet roundtable
Industrial internet roundtableIndustrial internet roundtable
Industrial internet roundtable
 
Lisää kaupunkia Helsinkiin -ryhmästä kaupunkitutkijoille
Lisää kaupunkia Helsinkiin -ryhmästä kaupunkitutkijoilleLisää kaupunkia Helsinkiin -ryhmästä kaupunkitutkijoille
Lisää kaupunkia Helsinkiin -ryhmästä kaupunkitutkijoille
 
Tukholman reissu 06092014
Tukholman reissu 06092014Tukholman reissu 06092014
Tukholman reissu 06092014
 
Avoimesta datasta avoimeen kaupunkisuunnitteluun
Avoimesta datasta avoimeen kaupunkisuunnitteluunAvoimesta datasta avoimeen kaupunkisuunnitteluun
Avoimesta datasta avoimeen kaupunkisuunnitteluun
 

Dernier

(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 

Dernier (20)

(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 

SECURITY ASPECTS

  • 2. CLASS SCHEDULE Feedback Course schedule Aspects of security Exercise for next week 24. huhtikuuta 14
  • 3. FEEDBACK Wish to learn abstract principles for security Wish to learn practical things Like project based learning Prefer traditional teaching To learn more about Internet security Worried about flipped classroom method Enjoy team work Traditional teaching outdated Learn fundamentals of information security Security problems are complex Decent level of security Access control Good reading material Protocol specific security issues and how they were fixed What kind of jobs we can do in this field Wish: Discussion forum 24. huhtikuuta 14
  • 4. MOODLE All exercise related information will be on Moodle Lecture slides will be on Noppa There is a discussion forum in Moodle. If you have questions about course content, ask them there, so that others may benefit from the answers too. 24. huhtikuuta 14
  • 5. COURSE SCHEDULE Week Tuesday Thursday April 14 - April 20 Introduction Easter April 21 - April 27 Easter What is security April 28- May 4 Access control 1st May May 5 - May 11 Access control 2 Incentive May 12 - May 18 Certificates Protocols 1 May 19 - May 25 Protocols 2 Security topics May 26 - June 1 Security topics Lab work on securityLab work on security 24. huhtikuuta 14
  • 6. WHAT IS SECURITY? 24. huhtikuuta 14
  • 8. ASPECTS OF SECURITY 24. huhtikuuta 14
  • 9. ASPECTS OF SECURITY Communication securityInformation security Human issues in security 24. huhtikuuta 14
  • 10. ASPECTS OF SECURITY Protocol security Communication securityInformation security Human issues in security 24. huhtikuuta 14
  • 11. ASPECTS OF SECURITY Protocol security Protocol Analysis Communication securityInformation security Human issues in security 24. huhtikuuta 14
  • 12. ASPECTS OF SECURITY Cryptography Protocol security Protocol Analysis Communication securityInformation security Human issues in security 24. huhtikuuta 14
  • 13. ASPECTS OF SECURITY Cryptography Cryptanalysis Protocol security Protocol Analysis Communication securityInformation security Human issues in security 24. huhtikuuta 14
  • 14. ASPECTS OF SECURITY Cryptography Cryptanalysis Protocol security Protocol Analysis Communication securityInformation security Human issues in security System security 24. huhtikuuta 14
  • 15. ASPECTS OF SECURITY Cryptography Cryptanalysis Protocol security Protocol Analysis Communication securityInformation security Human issues in security Security analysis System security 24. huhtikuuta 14
  • 16. ASPECTS OF SECURITY Cryptography Cryptanalysis Protocol security Protocol Analysis Communication securityInformation security Human issues in security Security analysis System security Threat modeling 24. huhtikuuta 14
  • 17. ASPECTS OF SECURITY Cryptography Cryptanalysis Protocol security Protocol Analysis Communication securityInformation security Human issues in security Organization security Security analysis System security Threat modeling 24. huhtikuuta 14
  • 18. ASPECTS OF SECURITY Cryptography Cryptanalysis Protocol security Protocol Analysis Communication securityInformation security Human issues in security Organization security Process security Security analysis System security Threat modeling 24. huhtikuuta 14
  • 19. ASPECTS OF SECURITY Cryptography Cryptanalysis Protocol security Protocol Analysis Communication securityInformation security Human issues in security Security economics Organization security Process security Security analysis System security Threat modeling 24. huhtikuuta 14
  • 20. ASPECTS OF SECURITY Cryptography Cryptanalysis Protocol security Protocol Analysis Communication securityInformation security Human issues in security Security economics Organization security Process security Security analysis System security Threat modeling Access control 24. huhtikuuta 14
  • 21. GROUP EXERCISE Discuss and make a presentation what are the assets that Aalto University has to protect? People affiliated with Aalto: What categories do they belong to? Where do the potential security threats come from? 24. huhtikuuta 14
  • 22. HOMEWORK (1) Read chapter 4 of the book. There will be classroom exercises based on section 4.2 and discussion on the rest of chapter. Write a lecture log about this class (1-2 pages). Deadline Monday 12 pm (noon) You can use the following questions to help you: what did you learn about security and it’s different parts during class and pre- assignment? Was something difficult to understand? What? 24. huhtikuuta 14
  • 23. ACCESS CONTROL EXERCISE The CIA model (Confidentiality, Intergrity, Availability) is a fairly useful tool for analyzing the security requirements in various situations. Deadline Monday 12 PM 1) Use the CIA model to analyze the security requirements for the following problems a single (computer) file containing the exam questions for this course: a day before the exam, when the exam starts, and a day after the exam a student's exam answers a published research paper an unpublished research paper a teacher's slides for a course 2) Take a look at https:// oma.aalto.fi and check your Personal Attributes for Aalto Shibboleth authentication. What is Shibboleth and how is this information used? Try to analyze what roles do you have in Aalto? 24. huhtikuuta 14