Information Session for Master Seminar Innovative Internet-Technologies and Mobile Communications

Size: px
Start display at page:

Download "Information Session for Master Seminar Innovative Internet-Technologies and Mobile Communications"

Transcription

1 Network Architectures and Services Department Computer Science Technische Universität München Information Session for Master Seminar Innovative Internet-Technologies and Mobile Communications WS 2012/2013 Prof. Dr.-Ing. Georg Carle and Staff Organisation: Corinna Schmitt

2 Administrative Things for all Seminars Responsibilities Grading Today: Topic Selection for Seminar Innovative Internet-Technologies and Mobile Communications Seminars WS 2012/2013 2

3 Administrative Things for all Seminars Responsibilities Grading Today: Topic Selection for Seminar Innovative Internet-Technologies and Mobile Communications Seminars WS 2012/2013 3

4 Responsibilities Seminars Organisation: Prof. Dr.-Ing. Carle, Schmitt Appointments: Seminar IITM: ~ 16 Slots weekly Lecture Mondays 14:00-16:00 in room Formality: Main Language: German Diplom: 2 SWS B.Sc./ M.Sc: 4 ECTS Attendance list exists Each participant will be session chair for one talk (moderation, discussion leader, min. 1 question concerning the talk) Successfull attendance (Talk, Paper, Review) Using department templates on our homepage Registration via Seminar homepage Seminars WS 2012/2013 4

5 Material See homepage: Slides: Talk: How to write a scientific paper? Talk: How to write a review? Talk: How to give feedback? Example: 1st paper version Advisor review 2nd paper version Questions: Send them to advisor first before inquiring schmitt@net.in.tum.de Advisors offer the opportunity of test talks (dry runs) Seminars WS 2012/2013 5

6 Hints for Topic Handling Attention: From your advisor(s) you may receive some literature. Starting from this you have to do research for papers on your own. Make scholar.google.com /acm.org /ieee.org your friend! (and your source s sources ) With all topics the task is especially not taking the literature given and presenting it. You fill the topic with life. Your goal: make it interesting for you, me, and the other participants (your audience!) Seminars WS 2012/2013 6

7 Grading for the seminars Guidelines Grading parts: 1. Personal meeting with advisor is compulsory! 2. Both of your paper submissions (6 8 pages in ACM format) 1st Version Peer review process 2nd version (final) for publication 3. Your talk (20 25min, following discussion and feedback) Content counts; personal presentation style is not counted 4. Your review of papers from other seminar participants Further things to consider: Attendance at all appointments is compulsory Observance of deadlines (upload form on homepage) Write the paper yourself! (plagiarism checks in every upload!) Session chair for one talk Plagiarism = DISQUALIFICATION. Missing deadlines = 0.3 degrading each time Seminars WS 2012/2013 7

8 You have the chance to get your talk recorded Seminar goals:,,, Improving your presentation skills. They said I did this and that no way! Have a look at yourself after the talk! Your talk was great? Now you have the chance to show it to your friends. Want to know something about a topic that was already in the seminar? Watch your fellow students explaining the topic Seminars WS 2012/2013 8

9 Seminars WS 2012/2013 9

10 Seminar Future Internet Administrative Things for all Seminars Today: Topic Selection for Seminar Innovative Internet-Technologies and Mobile Communications Challenging Topics! Sometimes previous knowledge required! Seminars WS 2012/

11 Deadlines Seminar IITM Deadline might be shifted depending on number of participants. Dates Topic Selection (14:00 p.m., room ) Pick up literature per mail or personal by advisor Advisor meeting to group topic (discussion of received literature be prepared (MUST) until until Detailed structure of paper and talk until Final slides* discussion with advisor * Slides must be presentable, otherwise -0.3 degree in grading. They can be modified until final talk. No later than 1 week before talk Upload paper (1. Version) Talks Schedule comes soon Uploads Reviews Upload paper (2. Version) and final slides Publication in Proceeding t.b.a. Seminars WS 2012/

12 Rootkits Rootkits offer data hiding techniques in context of operating systems Intrusion detection systems and malware use this technique Hide running processes, loaded modules, files... Different mechanisms: User mode and kernel mode rootkits How do rootkits work? Simple demonstration Possible detection mechanisms Simon, Lothar Seminars WS 2012/

13 VMI-IDS Host-based IDS resides inside the monitored host Deep view into the monitored system Disadvantage: Low resistance against attacks, e.g. by malware Possible solution: Use of virtualization Isolation between IDS and monitored system Monitoring can be done using Virtual Machine Introspection How does VMI work? Which VMI-IDS are available? Classification? Simon, Lothar Seminars WS 2012/

14 VM-based system debugging and analysis tools Slightly another focus compared to the work above. Those tools have been developed to examine system anomalies and study kernel-mode malware. This task can be difficult or sometimesimpossible with conventional appraoches. Your Task: Analyse and compare K-tracer, PoKeR and AfterSight. What is most suitable in certain circumstances? What goals they have? What is protected? It would be helpful to have some basic knowledge about VMs, Virtual Machine Introspection Win XP Linux Solaris x86 and kernel internals. Virtual Machine Monitor Operating System (Physical Host) Nadine, Stephan P. Physical Hardware Seminars WS 2012/

15 Honeypot-Architectures using VMI Techniques The honeypot has emerged as an effective tool to provide insights into new attacks and current exploitation trends. Though effective, a single honeypot or multiple independently operated honeypots only provide a limited local view of network attacks. Problem: coordinated honeypot deployment and operation require close and consistent collaboration across participating network domains Approach: Using VMI Techniques Your Task: Analyse and compare VMScope and Collapsar. Get an insight into honeypot usage in general and compare it with VMI based solutions. What is improved? Are there new problems and issues? It would be helpful to have some basic knowledge about VMs, Virtual Machine Introspection and anomaly detection. Nadine, Stephan P. Seminars WS 2012/

16 Protect Guest Kernel Integrity and monitor Guest Kernel Behavior Virtualization can be used to improve security, because an additional layer is inserted between hardware and OS. Focus in this work: Kernel Integrity and Control Flow Integrity of the Guest OS Your Task: Analyse and compare SIM, NICKLE, HookSafe and VMWatcher. What is most suitable in certain circumstances? What goals they have? What is protected? It would be helpful to have some basic knowledge about VMs, Virtual Machine Introspection and kernel internals. Guest Application Guest Application Guest Application Guest Application Guest Application Guest Application Guest OS Guest OS VMM VMM Host OS Host Hardware Host Hardware Nadine, Stephan P. Seminars WS 2012/

17 Layer 1-based Security for Wireless Sensors Stephan, Corinna Problem: Wireless sensors often lack the computational power or battery capacity to do expensive crypto-operations, such as RSA. Side-channel information of wireless communication can be used in an energy-efficient way to still get strong authentication of communication partners. Examples: direction, signal strength, noise,... To this end, nodes exchange this information with neighbors and make decisions in a decentralized fashion. Your Task: Explore which properties of wireless communication can serve strong authentication Prerequisites: Knowledge of layer 1 and wireless communication Seminars WS 2012/

18 SPKI: The forgotten standard Ralph PKI!= X.509 (or GPG) Simple PKI Local namespaces! Simple cert format Clear purposes Some reasoning about paths from name to name Your task: You get starting some directions to start with Research using above starting points there are several RFCs and papers Understand, analyse local namespaces Analyse at least one trust metric for name mappings Prerequisites: PKI and willingness to learn Seminars WS 2012/

19 Resource-Management-Tools - Corinna General: Resources of wireless sevices are limited and must be saved Most energy is consumed during data transmission Management-Tool 2 topics are possible! Student thesis is offered! Different approaches: Tiny Network Manager(TNM) (2010) Peloton (2009) Collective Intelligence (2009) Questions: What are the challenges during the development of a management-tool that must be faced? Characterization and comparision of different tools Seminars WS 2012/

20 Sensor network as a database - Corinna Current situation: The application range of wireless sensor networks rises together with the amount of collected data. In order to save the recorded data and to use the data independently of the real system for analysis purposes the data must be stored. Idea: Use the sensor network as a database TinyDB Flask devopment in Harvard Problem of storage solution: must include all needed information for the data interpretation should allow an easy way to request a subset of the data. Questions: Characterize and compare existing approaches. What challenges must be faced? What requirements to the infrastructure exist? Seminars WS 2012/

21 Intrusion Tolerant Algorithms Wormhole Heiko, Stephan P. Basic idea Multiple servers, diverse servers Detect suspicious behaviour Agreement protocol via wormhole Reset suspicious / compromised server Your task Present wormhole concept / model Relate to byzantine fault model Present an application of concept What does it achieve and what not? What does it require? Easy or difficult? Seminars WS 2012/

22 Publish-Subscribe Internet (Heiko) Push Model of IP and many services a problem DoS, Hacking, Worms, Spam, Phishing, Basic idea Use Pull Model Your task Describe concept and idea of Publish-Subscribe Internet Does it solve the problems mentioned? Is it practical? What s its current state? Literature Pursuit Project, PSIRP Project, Seminars WS 2012/

23 Software Defined Networking with OpenFlow OpenFlow Layer 2 communications protocol that gives access to the forwarding plane of a network switch or router over the network. enabler of Software Defined Networking (SDN). Daniel, Florian Frenetic as a domain-specific language for highlevel programming of SDNs Testing of new (routing-) protocols within real world networks Goals: 1. Overview to OpenFlow 2. Explain if/why it is useful 3. Give a Brief excursus to Frenetic Literature can be found easily though searching the highlighted buzzwords on Google Seminars WS 2012/

24 The Future of Software Routers There is ongoing research about using PC-Systems for packet switching as an alternative to dedicated hardware for reasons of flexibility as it is cheap.because we can ;-) Florian, Daniel Goals: 1. Compare PC-based packet switching with dedicated hardware 2. Explain motivation for using software routers 3. Brief overview of current research projects and their goals Tonns of literature on the WWW (for instance start with papers from the RouteBricks project) Seminars WS 2012/

25 Bootstrapping P2P VPN Benjamin, Lukas Look at the current n2n design What are the weaknesses? Identify the general problems of bootstrapping Learning information about a community NAT... Research solutions Evaluate solutions Security and privacy implications Deployability Applicability to n2n Seminars WS 2012/

26 What is individual-related data? Introduction: How unique is your web browser? Peter Eckersley In Proceedings of the 10th international conference on Privacy enhancing technologies (PETS'10) Result: 10 Bits of Entropy for user agent! Johann Legislation in Germany and EU: What is individual-related data? Reasons for legitimate storage Conditions for storage and analysis Sensitivity of HTTP Header and webserver logs: IP User Agent Referrer Query strings Timestamps Cookies Server-based geolocation Outlook: Privacy Extensions Seminars WS 2012/

27 DHT-based multicast Bart Seminars WS 2012/

28 Quicksilver multicast Bart Seminars WS 2012/

29 Multicast Key Management Bart Seminars WS 2012/

30 Administrative Things for all Seminars Today: Topic Selection for Seminar Innovative Internet- Technologies and Mobile Communications Challenging Topics! Sometimes previous knowledge required! Seminars WS 2012/

31 Topic assignment (I) Speaker Title Advisor(s) Sebastian Wiesner Simon Hager SPKI: The forgotten standard Layer 1-based Security for Wireless Sensors Ralph Markus Grimm Publish-Subscribe Internet Heiko Stephan P., Corinna Michael Pangerl VM-based system debugging and analysis tools Nadine, Stephan P. Anh Nguyen Resource-Management-Tools Corinna Robert Schmidpeter Josias Montag Sensor network as a database Software Defined Networking with OpenFlow Corinna Daniel, Florian Thomas Schultz The Future of Software Routers Florian, Daniel Pei Li Bootstrapping P2P VPN Lukas, Benjamin Stephan Liebald Rootkits Simon Seminars WS 2012/

32 Topic assignment (II) Speaker Title Advisor(s) Christian Eckert What is invidual-related data? Johann Alexander Kurtz Galois Fields Stephan G. Frei Honeypot-Architectures using VMI Techniques Nadine, Stephan P. Frei VMI-IDS Simon Frei DHT-based multicast Bart Frei Quicksilver multicast Bart Frei Multicast Key Management Bart Frei Intrusion Tolerant Algorithms Wormhole Heiko, Stephan P. Frei Protect Guest Kernel Integrity and monitor Guest Kernel Behavior Nadine, Stephan P. Seminars WS 2012/

Information Session for Master Seminar Future Internet

Information Session for Master Seminar Future Internet Network Architectures and Services Department Computer Science Technische Universität München Information Session for Master Seminar Future Internet Prof. Dr.-Ing. Georg Carle and Staff Organisation: Raumer,

More information

Pre-Course Meeting Proseminar Network Hacking & Defense

Pre-Course Meeting Proseminar Network Hacking & Defense Network Architectures and Services Department Computer Science Technische Universität München Pre-Course Meeting Proseminar Network Hacking & Defense Dr. Holger Kinkelin and Nadine Herold Content q Administrative

More information

Information Session for the Master-Seminar. Sensor Nodes: Operation Modes, Networks and Applications

Information Session for the Master-Seminar. Sensor Nodes: Operation Modes, Networks and Applications Information Session for the Master-Seminar Sensor Nodes: Operation Modes, Networks and Applications SS 2011 Prof. Baumgarten, Prof. Carle, Corinna Schmitt, Alexander Klein, Christoph Söllner Administration

More information

Resource Virtualization and the Enterprise

Resource Virtualization and the Enterprise Resource Virtualization and the Enterprise Syllabus Web Page http://www.cs.northwestern.edu/~pdinda/virt-mitp Instructor Peter A. Dinda Technological Institute, Room L463 847-467-7859 pdinda@northwestern.edu

More information

1.1 Constraint satisfaction problems

1.1 Constraint satisfaction problems Seminar: Search and Optimization September 18, 2014 1. Organization, Seminar Schedule & Topics Seminar: Search and Optimization 1. Organization, Seminar Schedule & Topics Gabi Röger Universität Basel September

More information

Advisory: Students should have already taken MICROCOMPUTER APPLICATIONS II - 431

Advisory: Students should have already taken MICROCOMPUTER APPLICATIONS II - 431 Cyber Security I - CoSci 411 Los Angeles Mission College - Spring 2018 Instructor: Javier Rios E-mail: rios.javier@gmail.com E-mail communications will be will receive a response within 24 hours. Advisory:

More information

IT Security in Large IT Infrastructures SS18 Lecture 00: Preliminary Discussion

IT Security in Large IT Infrastructures SS18 Lecture 00: Preliminary Discussion IT Security in Large IT Infrastructures SS18 Lecture 00: Preliminary Discussion Florian Fankhauser Christian Schanes Christian Brem Franz Mairhofer INSO Industrial Software Institute of Information Systems

More information

ISA 564 SECURITY LAB. Introduction & Class Mechanics. Angelos Stavrou, George Mason University

ISA 564 SECURITY LAB. Introduction & Class Mechanics. Angelos Stavrou, George Mason University ISA 564 SECURITY LAB Introduction & Class Mechanics Angelos Stavrou, George Mason University Course Mechanics Course URL: http://cs.gmu.edu/~astavrou/isa564_f16.html Instructor Angelos Stavrou Email: astavrou@gmu.edu

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Chapter 7 - Network Measurements Introduction Architecture & Mechanisms

More information

University of Maryland College Park College of Information Studies. INST 702 Advanced Usability Testing Spring 2019

University of Maryland College Park College of Information Studies. INST 702 Advanced Usability Testing Spring 2019 University of Maryland College Park College of Information Studies Instructor: Vera T. Rhoads Contact Info : Office hours: e-mail: vrhoads@umd.edu Phone: (703) 867-4297 Skype: Progled Twitter: @vtrhoads

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Dr. Nils

More information

Course Syllabus: CompTIA Network+

Course Syllabus: CompTIA Network+ Course Syllabus: CompTIA Network+ Instructor: Roger Elliott Email: relliott@c-tec.edu Phone: Office: (740) 364-2299 Cell (740) 814-7504 Courseware Course #: Hours: TestOut Network Pro 4.1 CompTIA Network+

More information

Syllabus Revised 01/03/2018

Syllabus Revised 01/03/2018 Department of Information Sciences and Technology Volgenau School of Engineering George Mason University Spring 2018 IT 445 Advanced Networking Principles II Syllabus Revised 01/03/2018 Section DL1: Instructor:

More information

Networks and Communications MS216 - Course Outline -

Networks and Communications MS216 - Course Outline - Networks and Communications MS216 - Course Outline - Objective Lecturer Times Overall Learning Outcomes Format Programme(s) The objective of this course is to develop in students an understanding of the

More information

Peer-to-Peer Systems and Security IN2194

Peer-to-Peer Systems and Security IN2194 Network Architectures and Services Department of Computer Science TU München Peer-to-Peer Systems and Security IN2194 Dr. Heiko Niedermayer Christian Grothoff, PhD Prof. Dr.-Ing Georg Carle Course organization

More information

Business Informatics at the University of Mannheim

Business Informatics at the University of Mannheim Business Informatics at the University of Mannheim Fakultät WIM 09.02.2018 1 in the degree program Master of Science in Business Informatics at the University of Mannheim Spring 2018 2 These slides will

More information

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8 Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 8 System Vulnerabilities and Denial of Service Attacks System Vulnerabilities and

More information

Use NAT to Hide the Real IP Address of CTC to Establish a Session with ONS 15454

Use NAT to Hide the Real IP Address of CTC to Establish a Session with ONS 15454 Use NAT to Hide the Real IP Address of CTC to Establish a Session with ONS 15454 Document ID: 65122 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Topology

More information

ECE 646 Cryptography and Computer Network Security. Course web page: Kris Gaj Research and teaching interests: Contact: ECE web page Courses ECE 646

ECE 646 Cryptography and Computer Network Security. Course web page: Kris Gaj Research and teaching interests: Contact: ECE web page Courses ECE 646 646 Cryptography and Computer Network Security Course web page: web page Courses 646 Kris Gaj Research and teaching interests: cryptography network security computer arithmetic FPGA & ASIC design and testing

More information

Multi-Aspect Profiling of Kernel Rootkit Behavior

Multi-Aspect Profiling of Kernel Rootkit Behavior Multi-Aspect Profiling of Kernel Rootkit Behavior Ryan Riley, Xuxian Jiang, Dongyan Xu Purdue University, North Carolina State University EuroSys 2009 Nürnberg, Germany Rootkits Stealthy malware Hide attacker

More information

ISA 564 SECURITY LAB. Introduction & Class Mechanics. Angelos Stavrou, George Mason University

ISA 564 SECURITY LAB. Introduction & Class Mechanics. Angelos Stavrou, George Mason University ISA 564 SECURITY LAB Introduction & Class Mechanics Angelos Stavrou, George Mason University Course Mechanics Course URL: http://cs.gmu.edu/~astavrou/isa564_f15.html Instructor Angelos Stavrou Email: astavrou@gmu.edu

More information

CSCI 4250/6250 Fall 2013 Computer and Network Security. Instructor: Prof. Roberto Perdisci

CSCI 4250/6250 Fall 2013 Computer and Network Security. Instructor: Prof. Roberto Perdisci CSCI 4250/6250 Fall 2013 Computer and Network Security Instructor: Prof. Roberto Perdisci perdisci@cs.uga.edu CSCI 4250/6250 What is the purpose of this course? Combined Undergrad/Graduate Intro to Computer

More information

Syllabus Revised 08/15/2018

Syllabus Revised 08/15/2018 Department of Information Sciences and Technology Volgenau School of Engineering George Mason University Fall 2018 IT 445 Advanced Networking Principles II Syllabus Revised 08/15/2018 Section DL1: Instructor:

More information

FIT5044 Network security. Unit Guide. Semester 1, 2010

FIT5044 Network security. Unit Guide. Semester 1, 2010 FIT5044 Network security Unit Guide Semester 1, 2010 The information contained in this unit guide is correct at time of publication. The University has the right to change any of the elements contained

More information

SAMPLE. ITS430 Network Enterprise Solutions. Course Description and Outcomes. Participation & Attendance. Credit Hours: 3

SAMPLE. ITS430 Network Enterprise Solutions. Course Description and Outcomes. Participation & Attendance. Credit Hours: 3 ITS430 Network Enterprise Solutions Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The exact number

More information

System Administration

System Administration System Administration MTAT.08.021 6 ECTS Markko Merzin markko.merzin@ut.ee http://courses.cs.ut.ee/2012/syshald/ 1/55 Markko Merzin Lecturer worked as a System administrator: 15 years (and counting) Researcher:

More information

The next step in IT security after Snowden

The next step in IT security after Snowden The next step in IT security after Snowden Prof. Dr. (TU NN) Norbert Pohlmann Institute for Internet Security - if(is) Westphalian University of Applied Sciences Gelsenkirchen, Germany www.internet-sicherheit.de

More information

Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) Certified Ethical Hacker (CEH) COURSE OVERVIEW: The most effective cybersecurity professionals are able to predict attacks before they happen. Training in Ethical Hacking provides professionals with the

More information

Introduction April 27 th 2016

Introduction April 27 th 2016 Social Web Mining Summer Term 2016 1 Introduction April 27 th 2016 Dr. Darko Obradovic Insiders Technologies GmbH Kaiserslautern d.obradovic@insiders-technologies.de Outline for Today 1.1 1.2 1.3 1.4 1.5

More information

UNIT OUTLINE. Network Engineering 304. Mr Iain Murray. Department of Electrical and Computer Engineering Curtin Engineering

UNIT OUTLINE. Network Engineering 304. Mr Iain Murray. Department of Electrical and Computer Engineering Curtin Engineering 305682 Network Engineering 304 Mr Iain Murray Department of Electrical and Computer Engineering Curtin Engineering UNIT OUTLINE Semester 2 2009 CRICOS (Perth - 00301J) (Sydney - 02637B) Table of Contents

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department of Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Stephan Günther

More information

Professor Yashar Ganjali Department of Computer Science University of Toronto.

Professor Yashar Ganjali Department of Computer Science University of Toronto. Professor Yashar Ganjali Department of Computer Science University of Toronto yganjali@cs.toronto.edu http://www.cs.toronto.edu/~yganjali Today Outline What this course is about Logistics Course structure,

More information

Kris Gaj Research and teaching interests: ECE 646 Cryptography and Computer Network Security. Course web page: Contact: ECE 646

Kris Gaj Research and teaching interests: ECE 646 Cryptography and Computer Network Security. Course web page: Contact: ECE 646 646 and Computer Network Security Course web page: web page Courses 646 Kris Gaj Research and teaching interests: cryptography network security computer arithmetic FPGA & ASIC design and testing Contact:

More information

Seminar Real-time communication systems

Seminar Real-time communication systems Seminar Real-time communication systems Morteza Hashemi Farzaneh Robotics and Embedded Systems Department of Informatics I6 Technische Universität München www6.in.tum.de hashemif@in.tum.de 089-289-18130

More information

University of San Francisco Course Syllabus and Outline

University of San Francisco Course Syllabus and Outline College of Professional Studies BSIS 340 Business Data Networks and Telecommunications University of San Francisco Fall Semester 2008 Robert C. Hughes, M.S. Email: rchughes3@usfca.edu Enrolled Student

More information

CFRS : Kernel Forensics and Analysis

CFRS : Kernel Forensics and Analysis CFRS 775-001: Kernel Forensics and Analysis Computer Forensics Program (http://cfrs.gmu.edu) Department of Electrical and Computer Engineering (https://ece.gmu.edu/) Volgenau School of Engineering (http://volgenau.gmu.edu/)

More information

Course Syllabus: CompTIA Network+

Course Syllabus: CompTIA Network+ Course Syllabus: CompTIA Network+ Instructor: Roger Elliott Email: relliott@c-tec.edu Phone: Office: (740) 364-2299 Cell (740) 814-7504 Courseware Course #: Hours: CompTIA Network+ (Exam N10-006) 30Bird

More information

Syllabus Revised 08/21/17

Syllabus Revised 08/21/17 Department of Information Sciences and Technology Volgenau School of Engineering George Mason University Fall 2017 IT 445 Advanced Networking Principles II Syllabus Revised 08/21/17 Instructor: Pouyan

More information

IEEE ComSoc Distinguished Lecture Tour Australia, June 8-18, 2014 Ying-Dar Lin, IEEE Fellow National Chiao Tung University, TAIWAN July 5, 2014

IEEE ComSoc Distinguished Lecture Tour Australia, June 8-18, 2014 Ying-Dar Lin, IEEE Fellow National Chiao Tung University, TAIWAN July 5, 2014 IEEE ComSoc Distinguished Lecture Tour Australia, June 8-18, 2014 Ying-Dar Lin, IEEE Fellow National Chiao Tung University, TAIWAN July 5, 2014 DLT Planning This was my first DLT (Distinguished Lecture

More information

European Internet Situation Awareness The Global View

European Internet Situation Awareness The Global View European Internet Situation Awareness The Global View Prof. Dr. Norbert Pohlmann Institute for Internet Security - if(is) University of Applied Sciences Gelsenkirchen http://www.internet-sicherheit.de

More information

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017 Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017 ITD 3443 Network Security Students will provide Cyber Defense while understanding Cyber Threats. Their attack types

More information

Information for 2016 Poster Displays

Information for 2016 Poster Displays Information for 2016 Poster Displays What is a poster display at the International Forum? Each year we receive hundreds of online submissions to display a poster board at our International Forum. A poster

More information

Stopping Advanced Persistent Threats In Cloud and DataCenters

Stopping Advanced Persistent Threats In Cloud and DataCenters Stopping Advanced Persistent Threats In Cloud and DataCenters Frederik Van Roosendael PSE Belgium Luxembourg 10/9/2015 Copyright 2013 Trend Micro Inc. Agenda How Threats evolved Transforming Your Data

More information

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107) Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master

More information

Instructor: Eric Rettke Phone: (every few days)

Instructor: Eric Rettke Phone: (every few days) Instructor: Eric Rettke Phone: 818 364-7775 email: rettkeeg@lamission.edu (every few days) Fall 2016 Computer Science 411 - Principles of Cyber Security 1 Please keep a copy of the syllabus handy for the

More information

Internet Praktikum TK WS17/18 (Kickoff) Lecturer: Christian Meurisch, Sebastian Kauschke

Internet Praktikum TK WS17/18 (Kickoff) Lecturer: Christian Meurisch, Sebastian Kauschke Internet Praktikum TK WS17/18 (Kickoff) Lecturer: Christian Meurisch, Sebastian Kauschke LECTURERS Christian Meurisch meurisch@tk.tu-darmstadt.de S2/02 A112 Sebastian Kauschke kauschke@tk.tu-darmstadt.de

More information

Internet Architecture and Assumptions. David Andersen CMU Computer Science

Internet Architecture and Assumptions. David Andersen CMU Computer Science Internet Architecture and Assumptions David Andersen CMU Computer Science Waitlist ~14 slots in the class ~11-13 students enrolled 16 on waitlist 2 Ph.D. 14 MS Outlook not too good for the MS students.

More information

Operating Systems, Spring 2015 Course Syllabus

Operating Systems, Spring 2015 Course Syllabus Operating Systems, Spring 2015 Course Syllabus Instructor: Dr. Rafael Ubal Email: ubal@ece.neu.edu Office: 140 The Fenway, 3rd floor (see detailed directions below) Phone: 617-373-3895 Office hours: Wednesday

More information

Introduction. Software Architecture VO/KU ( / ) Roman Kern. KTI, TU Graz

Introduction. Software Architecture VO/KU ( / ) Roman Kern. KTI, TU Graz Introduction Software Architecture VO/KU (707.023/707.024) Roman Kern KTI, TU Graz 2013-10-02 Roman Kern (KTI, TU Graz) Introduction 2013-10-02 1 / 32 Introduction Introduction Basic organisational information

More information

Customer relationships in the era of messaging apps

Customer relationships in the era of messaging apps Customer relationships in the era of messaging apps Content: The customer is king (again)... 3 Messaging apps are virtual companions... 4 Fade-away for email, post and phone... 5 Messaging apps have tremendous

More information

Security Protocols and Infrastructures

Security Protocols and Infrastructures Security Protocols and Infrastructures Dr. Michael Schneider michael.schneider@h-da.de October 9, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 1 1 Formalities 2 Contents, Time Table 3 Literature

More information

Course Description. This course combines semesters three and four of the Cisco Networking Academy CCNA

Course Description. This course combines semesters three and four of the Cisco Networking Academy CCNA Cabrillo College Syllabus: CIS 83 Fall 2013 Section 83928 Gerlinde Brady Phone: 831-477-5672 Office: Room 827 Class Meetings: Wednesdays 1:30 pm 3:30 pm online via CCCConfer and 2 hours recorded lecture

More information

Course Syllabus: CompTIA A+ Hardware

Course Syllabus: CompTIA A+ Hardware Course Syllabus: CompTIA A+ Hardware Instructor: Email: Phone: Office: (740) 364-364-2299 Cell: Course Material: CompTIA A+ Certification (Exam 220-901) 30Bird Media Supplemental Material Course #: Hours:

More information

Computer Networking CCE1030. Module Leader: Usama Arusi. Faculty of Science and Technology. Term (AY/JS/T3) AY

Computer Networking CCE1030. Module Leader: Usama Arusi. Faculty of Science and Technology. Term (AY/JS/T3) AY Faculty of Science and Technology Computer Networking Module Leader: Usama Arusi Term (AY/JS/T3) AY Duration of the module in weeks (24 weeks) Document Version 01 Department of Computer Science Computer

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for

More information

System models for distributed systems

System models for distributed systems System models for distributed systems INF5040/9040 autumn 2010 lecturer: Frank Eliassen INF5040 H2010, Frank Eliassen 1 System models Purpose illustrate/describe common properties and design choices for

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department of Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Chair for Network Architectures and

More information

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems ACS-3921/4921-001 Computer Security And Privacy Chapter 9 Firewalls and Intrusion Prevention Systems ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been

More information

Course Title: Computer Networking 2. Course Section: CNS (Winter 2018) FORMAT: Face to Face

Course Title: Computer Networking 2. Course Section: CNS (Winter 2018) FORMAT: Face to Face Course Title: Computer Networking 2 Course Section: CNS-106-50 (Winter 2018) FORMAT: Face to Face TIME FRAME: Start Date: 15 January 2018 End Date: 28 February 2018 Monday & Wednesday 1:00pm 5:00pm CREDITS:

More information

Course Syllabus: CompTIA A+

Course Syllabus: CompTIA A+ Course Syllabus: CompTIA A+ Instructor: Shawn Decker Email: sdecker@c-tec.edu Phone: Office: (740) 364-364-2299 Course Material: Supplemental Material Course #: Hours: TestOut PC Pro 5.1 -CompTIA A+ Certification

More information

Distributed Data Analytics Introduction

Distributed Data Analytics Introduction G-3.1.09, Campus III Hasso Plattner Institut Information Systems Team Prof. Felix Naumann Dr. Ralf Krestel Tim Repke Diana Stephan project DuDe Duplicate Detection Data Fusion Sebastian Kruse Data Change

More information

CSC 407 Database System I COURSE PARTICULARS COURSE INSTRUCTORS COURSE DESCRIPTION

CSC 407 Database System I COURSE PARTICULARS COURSE INSTRUCTORS COURSE DESCRIPTION CSC 407 Database System I COURSE PARTICULARS Course Code: CSC 407 Course Title: Database System I No. of Units: 3 Course Duration: 2 hours of theory and 1 hour of tutorial per week for 14 weeks. Status:

More information

SAMPLE. ITS405: Intermediate Networking. Course Description and Outcomes. Participation & Attendance. Credit Hours: 3

SAMPLE. ITS405: Intermediate Networking. Course Description and Outcomes. Participation & Attendance. Credit Hours: 3 ITS405: Intermediate Networking Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The exact number of

More information

Data Sources for Cyber Security Research

Data Sources for Cyber Security Research Data Sources for Cyber Security Research Melissa Turcotte mturcotte@lanl.gov Advanced Research in Cyber Systems, Los Alamos National Laboratory 14 June 2018 Background Advanced Research in Cyber Systems,

More information

Course Design Document. IS436: Data Security and Privacy. Version 1.0

Course Design Document. IS436: Data Security and Privacy. Version 1.0 Course Design Document IS436: Data Security and Privacy Version 1.0 7 July 2014 Table of Content 1 Versions History... 3 2 Overview of Data Security and Privacy Course... 3 2.1 Synopsis... 3 2.2 Prerequisites...

More information

Virtual Dispersive Networking Spread Spectrum IP

Virtual Dispersive Networking Spread Spectrum IP Virtual Dispersive Networking Spread Spectrum IP DSI Proprietary 1 DSI Proprietary 2 Problem Lies Outside of Existing Security: On the Internet Internet Routers Virus Software Phishing Software etc POLICY

More information

Gerlinde Brady Phone: Office Hours: see Web at:

Gerlinde Brady Phone: Office Hours: see Web at: Cabrillo College Syllabus: CIS 83 Fall 2015 Section 89004 Gerlinde Brady Phone: 831-477-5672 Class Meetings: TUE 6:00 pm 8:05 pm (829) & 2 hours online Office: Room 827 D Office Hours: see Web at: http://babyface.cabrillo.edu/salsa/listing.jsp?staffid=156

More information

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague Brmlab, hackerspace Prague Lightning talks, November 2016 in general in general WTF is an? in general WTF is an? Computer Security in general WTF is an? Computer Security Incident Response in general WTF

More information

Brief introduction of WG 3

Brief introduction of WG 3 Platform Industrie 4.0 Brief introduction of WG 3 Security of networked systems Michael Jochem, Robert Bosch GmbH, Chair of WG3 Platform Industrie 4.0 Five things we do. 1 2 3 Focus on the needs of businesses

More information

Cisco Next Generation Firewall Services

Cisco Next Generation Firewall Services Toronto,. CA May 30 th, 2013 Cisco Next Generation Firewall Services Eric Kostlan Cisco Technical Marketing 2011 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 1 Objectives At the

More information

A Comparative Study of Teaching Forensics at a University Degree Level

A Comparative Study of Teaching Forensics at a University Degree Level A Comparative Study of Teaching Forensics at a University Degree Level Martin Mink University of Mannheim, Germany IMF 2006, Stuttgart October 19 Joint Work Laboratory for Dependable Distributed Systems

More information

ASSESSMENT QUERIES 3 SUBMITTING YOUR WORK IN TURNITIN 4. How do I upload my case report/work in Turnitin? 4 ACCESSING YOUR FEEDBACK 5

ASSESSMENT QUERIES 3 SUBMITTING YOUR WORK IN TURNITIN 4. How do I upload my case report/work in Turnitin? 4 ACCESSING YOUR FEEDBACK 5 FAQs Contents Who should I contact with a query about assessment? 2 Who should I contact with a technical issues or issues regarding the teaching and learning materials on the module? 2 Who should I contact

More information

FSE 100x: Introduction to Engineering: Imagine. Design. Engineer! Spring C 2018

FSE 100x: Introduction to Engineering: Imagine. Design. Engineer! Spring C 2018 FSE 100x: Introduction to Engineering: Imagine. Design. Engineer! Spring C 2018 I. COURSE OVERVIEW This 15-week 2-credit hour course is an active introduction to developing an engineering mindset that

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

COMP 4337/ Securing Wireless Networks Implementation Assignment (V1.0)

COMP 4337/ Securing Wireless Networks Implementation Assignment (V1.0) COMP 4337/9337 - Securing Wireless Networks Implementation Assignment (V1.0) April 28, 2016 Change Log a. Version 1.0 released on April 29th, 2016 Due Date: 30th May 2016, 11:59 pm Total Marks: 20 (towards

More information

STUDY GUIDE: MASTER S DEGREE IN ECONOMIC POLICY

STUDY GUIDE: MASTER S DEGREE IN ECONOMIC POLICY STUDY GUIDE: MASTER S DEGREE IN ECONOMIC POLICY This study guide informs you about the rules and policies for the Master s program in Economic Policy. It is based on the official examination regulations

More information

A Management System for Online Presentations at Meetings. Krzysztof Wrona (ZEUS) DESY Hamburg

A Management System for Online Presentations at Meetings. Krzysztof Wrona (ZEUS) DESY Hamburg A Management System for Online Presentations at Meetings Krzysztof Wrona (ZEUS) DESY Hamburg 22 April, 2002 1 Motivation Daily tasks at research institutes Preparing and improving an experiment Collecting

More information

Basic Web Application Development Spring credit hour Student Taught (Satisfactory/Unsatisfactory)

Basic Web Application Development Spring credit hour Student Taught (Satisfactory/Unsatisfactory) Basic Web Application Development Spring 2014 1 credit hour Student Taught (Satisfactory/Unsatisfactory) Matthew Schurr mschurr@rice.edu (404) 395-0511 Instructor Matthew Schurr Duncan College Class of

More information

Cisco Tetration Analytics

Cisco Tetration Analytics Cisco Tetration Analytics Real-time application visibility and policy management using advanced analytics Yogesh Kaushik, Sr. Director Product Management PSOACI-2100 Agenda Market context Introduction:

More information

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education COURSE OF STUDY 2017-2018 (C)ITM 820 Information Systems Security and Privacy

More information

Machine Learning Concepts for Adaptive Video Streaming Systems (SS17)

Machine Learning Concepts for Adaptive Video Streaming Systems (SS17) Machine Learning Concepts for Adaptive Video Streaming Systems (SS17) Kickoff Denny Stohr, M.Sc. Jeremias Blendin Prof. Dr.-Ing. Wolfgang Effelsberg www.dms.informatik.tu-darmstadt.de 21.04.17 Department

More information

Collaborative Next Generation Networking

Collaborative Next Generation Networking CALL-FOR-PAPERS ACM/Springer Mobile Networks & Applications (MONET) http://link.springer.com/journal/11036 SPECIAL ISSUE ON Collaborative Next Generation Networking Overview: To catch up with the ever-increasing

More information

SWE3004: Operating Systems. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University

SWE3004: Operating Systems. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University SWE3004: Operating Systems Jin-Soo Kim (jinsookim@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu Introduction Schedule 16:30 17:45 (Monday), 13:30 14:45 (Wednesday) Lecture

More information

Course Information

Course Information Course Information 2018-2020 Master of Information Systems: Management and Innovation Institutt for teknologi / Department of Technology Index Index... i 1... 1 1.1 Content... 1 1.2 Name... 1 1.3 Programme

More information

Overlay and P2P Networks. Introduction. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction Prof. Sasu Tarkoma 14.1.2013 Contents Course Overview Lectures Assignments/Exercises Course Overview Overlay networks and peer-to-peer technologies have become key

More information

South Portland, Maine Computer Information Technology. Web Site: blackboard.smccme.edu. Course Syllabus

South Portland, Maine Computer Information Technology. Web Site: blackboard.smccme.edu. Course Syllabus South Portland, Maine 04106 Computer Information Technology Title: Routing & Switching Fundamentals Catalog Number: CMIT 225 D1 Credit Hours: 3 Total Contact Hours: 45 Lecture (or Lab): Lecture & Lab Instructor:

More information

Intelligent Agents in CloudDeakin

Intelligent Agents in CloudDeakin SENSES e L e a r n i n g p r o j e c t Intelligent Agents in CloudDeakin Intelligent Agents are automatic emails sent to students in response to their actions. It is an efficient way to personalise the

More information

1/11/11. o Syllabus o Assignments o News o Lecture notes (also on Blackboard)

1/11/11. o Syllabus o Assignments o News o Lecture notes (also on Blackboard) Dr. Jelena Mirkovic (Y-Ellen-a) University of Southern California Information Sciences Institute If you wish to enroll and do not have D clearance yet, send an email to CSci530@usc.edu with: o Your name

More information

CURRICULUM MASTER OF DISASTER MANAGEMENT

CURRICULUM MASTER OF DISASTER MANAGEMENT CURRICULUM MASTER OF DISASTER MANAGEMENT Applicable to students enrolling in one or more of the below components of the Master of Disaster Management (MDMa) as of September 1 st 2013 The programme is delivered

More information

Terra: A Virtual Machine-Based Platform for Trusted Computing by Garfinkel et al. (Some slides taken from Jason Franklin s 712 lecture, Fall 2006)

Terra: A Virtual Machine-Based Platform for Trusted Computing by Garfinkel et al. (Some slides taken from Jason Franklin s 712 lecture, Fall 2006) Terra: A Virtual Machine-Based Platform for Trusted Computing by Garfinkel et al. (Some slides taken from Jason Franklin s 712 lecture, Fall 2006) Trusted Computing Hardware What can you do if you have

More information

EECS 482 Introduction to Operating Systems

EECS 482 Introduction to Operating Systems EECS 482 Introduction to Operating Systems Winter 2018 Baris Kasikci barisk@umich.edu (Thanks, Harsha Madhyastha for the slides!) 1 About Me Prof. Kasikci (Prof. K.), Prof. Baris (Prof. Barish) Assistant

More information

Cyber security tips and self-assessment for business

Cyber security tips and self-assessment for business Cyber security tips and self-assessment for business Last year one in five New Zealand SMEs experienced a cyber-attack, so it s essential to be prepared. Our friends at Deloitte have put together this

More information

Internet of Things (IoT) Attacks. The Internet of Things (IoT) is based off a larger concept; the Internet of Things came

Internet of Things (IoT) Attacks. The Internet of Things (IoT) is based off a larger concept; the Internet of Things came Victoria Ellsworth Dr. Ping Li ICTN 4040 04/11/17 Internet of Things (IoT) Attacks The Internet of Things (IoT) is based off a larger concept; the Internet of Things came from idea of the Internet of Everything.

More information

Scalable overlay Networks

Scalable overlay Networks overlay Networks Dr. Samu Varjonen 1 Contents Course overview Lectures Assignments/Exercises 2 Course Overview Overlay networks and peer-to-peer technologies have become key components for building large

More information

IT in St John s College

IT in St John s College IT in St John s College Welcome to St John s. Below is some information on the main IT systems you ll find in both St John s College and the University as well as some help to get you online. It will also

More information

Collaborations with University of Coimbra and Budapest University of Technology and Economics

Collaborations with University of Coimbra and Budapest University of Technology and Economics Energy Efficiency in Large Scale Distributed Systems Collaborations with University of Coimbra and Budapest University of Technology and Economics Torsten Braun, Universität Bern, Switzerland braun@iam.unibe.ch,

More information

Achieving End-to-End Security in the Internet of Things (IoT)

Achieving End-to-End Security in the Internet of Things (IoT) Achieving End-to-End Security in the Internet of Things (IoT) Optimize Your IoT Services with Carrier-Grade Cellular IoT June 2016 Achieving End-to-End Security in the Internet of Things (IoT) Table of

More information

Programme Specification (Master s Level)

Programme Specification (Master s Level) Programme Specification (Master s Level) MSc Computing (Software Engineering) This document provides a definitive record of the main features of the programme and the learning outcomes that a typical student

More information