SlideShare uma empresa Scribd logo
1 de 23
Baixar para ler offline
SECURITY
24. huhtikuuta 14
CLASS SCHEDULE
Feedback
Course schedule
Aspects of security
Exercise for next week
24. huhtikuuta 14
FEEDBACK
Wish to learn abstract
principles for security
Wish to learn practical things
Like project based learning
Prefer traditional teaching
To learn more about Internet
security
Worried about flipped
classroom method
Enjoy team work
Traditional teaching outdated
Learn fundamentals of
information security
Security problems are
complex
Decent level of security
Access control
Good reading material
Protocol specific security
issues and how they were
fixed
What kind of jobs we can do
in this field
Wish: Discussion forum
24. huhtikuuta 14
MOODLE
All exercise related
information will be on
Moodle
Lecture slides will be on
Noppa
There is a discussion
forum in Moodle. If you
have questions about
course content, ask
them there, so that
others may benefit from
the answers too.
24. huhtikuuta 14
COURSE SCHEDULE
Week Tuesday Thursday
April 14 - April 20 Introduction Easter
April 21 - April 27 Easter What is security
April 28- May 4 Access control 1st May
May 5 - May 11 Access control 2 Incentive
May 12 - May 18 Certificates Protocols 1
May 19 - May 25 Protocols 2 Security topics
May 26 - June 1 Security topics
Lab work on securityLab work on security
24. huhtikuuta 14
WHAT IS SECURITY?
24. huhtikuuta 14
FRAMEWORK FOR
SECURITY
Policy,
mechanism,
assurance,
incentive
24. huhtikuuta 14
ASPECTS OF SECURITY
24. huhtikuuta 14
ASPECTS OF SECURITY
Communication securityInformation security
Human issues in security
24. huhtikuuta 14
ASPECTS OF SECURITY
Protocol security
Communication securityInformation security
Human issues in security
24. huhtikuuta 14
ASPECTS OF SECURITY
Protocol security
Protocol Analysis
Communication securityInformation security
Human issues in security
24. huhtikuuta 14
ASPECTS OF SECURITY
Cryptography
Protocol security
Protocol Analysis
Communication securityInformation security
Human issues in security
24. huhtikuuta 14
ASPECTS OF SECURITY
Cryptography
Cryptanalysis
Protocol security
Protocol Analysis
Communication securityInformation security
Human issues in security
24. huhtikuuta 14
ASPECTS OF SECURITY
Cryptography
Cryptanalysis
Protocol security
Protocol Analysis
Communication securityInformation security
Human issues in security
System security
24. huhtikuuta 14
ASPECTS OF SECURITY
Cryptography
Cryptanalysis
Protocol security
Protocol Analysis
Communication securityInformation security
Human issues in security
Security analysis
System security
24. huhtikuuta 14
ASPECTS OF SECURITY
Cryptography
Cryptanalysis
Protocol security
Protocol Analysis
Communication securityInformation security
Human issues in security
Security analysis
System security
Threat modeling
24. huhtikuuta 14
ASPECTS OF SECURITY
Cryptography
Cryptanalysis
Protocol security
Protocol Analysis
Communication securityInformation security
Human issues in security
Organization
security
Security analysis
System security
Threat modeling
24. huhtikuuta 14
ASPECTS OF SECURITY
Cryptography
Cryptanalysis
Protocol security
Protocol Analysis
Communication securityInformation security
Human issues in security
Organization
security
Process security
Security analysis
System security
Threat modeling
24. huhtikuuta 14
ASPECTS OF SECURITY
Cryptography
Cryptanalysis
Protocol security
Protocol Analysis
Communication securityInformation security
Human issues in security
Security
economics
Organization
security
Process security
Security analysis
System security
Threat modeling
24. huhtikuuta 14
ASPECTS OF SECURITY
Cryptography
Cryptanalysis
Protocol security
Protocol Analysis
Communication securityInformation security
Human issues in security
Security
economics
Organization
security
Process security
Security analysis
System security
Threat modeling
Access control
24. huhtikuuta 14
GROUP EXERCISE
Discuss and make a
presentation
what are the assets
that Aalto University
has to protect?
People affiliated with
Aalto: What
categories do they
belong to?
Where do the
potential security
threats come from?
24. huhtikuuta 14
HOMEWORK (1)
Read chapter 4 of the
book. There will be
classroom exercises based
on section 4.2 and
discussion on the rest of
chapter.
Write a lecture log about
this class (1-2 pages).
Deadline Monday 12 pm
(noon)
You can use the following
questions to help you:
what did you learn
about security and it’s
different parts during
class and pre-
assignment?
Was something difficult
to understand? What?
24. huhtikuuta 14
ACCESS CONTROL
EXERCISE
The CIA model (Confidentiality,
Intergrity, Availability) is a fairly
useful tool for analyzing the
security requirements in various
situations.
Deadline Monday 12 PM
1) Use the CIA model to analyze
the security requirements for the
following problems
a single (computer) file
containing the exam questions
for this course: a day before
the exam, when the exam
starts, and a day after the exam
a student's exam answers
a published research paper
an unpublished research paper
a teacher's slides for a course
2) Take a look at https://
oma.aalto.fi and check your
Personal Attributes for Aalto
Shibboleth authentication.
What is Shibboleth and how is
this information used?
Try to analyze what roles do
you have in Aalto?
24. huhtikuuta 14

Mais conteúdo relacionado

Semelhante a SECURITY ASPECTS

Cyber Education: Your Options & Resources Mapped Out
Cyber Education: Your Options & Resources Mapped OutCyber Education: Your Options & Resources Mapped Out
Cyber Education: Your Options & Resources Mapped OutKelly Shortridge
 
BAIT1103 Course Overview
BAIT1103 Course OverviewBAIT1103 Course Overview
BAIT1103 Course Overviewlimsh
 
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity laurieannwilliams
 
Lecture 1 Introduction to Network Security
Lecture 1 Introduction to Network SecurityLecture 1 Introduction to Network Security
Lecture 1 Introduction to Network SecurityDarwish Ahmad
 
Mirror mirrror
Mirror mirrrorMirror mirrror
Mirror mirrrorFlinturgy
 
information security management
information security managementinformation security management
information security managementGurpreetkaur838
 
Information Systems Security: Security Management, Metrics, Frameworks and Be...
Information Systems Security: Security Management, Metrics, Frameworks and Be...Information Systems Security: Security Management, Metrics, Frameworks and Be...
Information Systems Security: Security Management, Metrics, Frameworks and Be...Wiley India Private Limited
 
NIST Privacy Engineering Working Group -- Risk Models
 NIST Privacy Engineering Working Group -- Risk Models NIST Privacy Engineering Working Group -- Risk Models
NIST Privacy Engineering Working Group -- Risk ModelsDavid Sweigert
 
lecture on cyber security_1234567890.ppt
lecture on cyber security_1234567890.pptlecture on cyber security_1234567890.ppt
lecture on cyber security_1234567890.pptVijayDSK1
 
Technophilia or Technophobia - Exploring Teacher Autonomy In Learning ICT/Web...
Technophilia or Technophobia - Exploring Teacher Autonomy In Learning ICT/Web...Technophilia or Technophobia - Exploring Teacher Autonomy In Learning ICT/Web...
Technophilia or Technophobia - Exploring Teacher Autonomy In Learning ICT/Web...Phil Longwell
 
Peter burgess, prio NORDsteva NCoE
Peter burgess, prio NORDsteva NCoEPeter burgess, prio NORDsteva NCoE
Peter burgess, prio NORDsteva NCoENordForsk
 
Dave Tyson Profile for CISO Insights
Dave Tyson Profile for CISO InsightsDave Tyson Profile for CISO Insights
Dave Tyson Profile for CISO Insightsciso_insights
 
Ethics & Privacy for Learning Analytics
Ethics & Privacy for Learning AnalyticsEthics & Privacy for Learning Analytics
Ethics & Privacy for Learning AnalyticsTore Hoel
 
Executive Information Security Training
Executive Information Security TrainingExecutive Information Security Training
Executive Information Security TrainingAngela Samuels
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summarySensePost
 

Semelhante a SECURITY ASPECTS (20)

Cyber Education: Your Options & Resources Mapped Out
Cyber Education: Your Options & Resources Mapped OutCyber Education: Your Options & Resources Mapped Out
Cyber Education: Your Options & Resources Mapped Out
 
BAIT1103 Course Overview
BAIT1103 Course OverviewBAIT1103 Course Overview
BAIT1103 Course Overview
 
Csci e46-syllabus-spring19-v1-2
Csci e46-syllabus-spring19-v1-2Csci e46-syllabus-spring19-v1-2
Csci e46-syllabus-spring19-v1-2
 
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
 
Lecture 1 Introduction to Network Security
Lecture 1 Introduction to Network SecurityLecture 1 Introduction to Network Security
Lecture 1 Introduction to Network Security
 
Mirror mirrror
Mirror mirrrorMirror mirrror
Mirror mirrror
 
information security management
information security managementinformation security management
information security management
 
Information Systems Security: Security Management, Metrics, Frameworks and Be...
Information Systems Security: Security Management, Metrics, Frameworks and Be...Information Systems Security: Security Management, Metrics, Frameworks and Be...
Information Systems Security: Security Management, Metrics, Frameworks and Be...
 
Security, Devices and Education
Security, Devices and EducationSecurity, Devices and Education
Security, Devices and Education
 
ceh pdf work.pdf
ceh pdf work.pdfceh pdf work.pdf
ceh pdf work.pdf
 
NIST Privacy Engineering Working Group -- Risk Models
 NIST Privacy Engineering Working Group -- Risk Models NIST Privacy Engineering Working Group -- Risk Models
NIST Privacy Engineering Working Group -- Risk Models
 
lecture on cyber security_1234567890.ppt
lecture on cyber security_1234567890.pptlecture on cyber security_1234567890.ppt
lecture on cyber security_1234567890.ppt
 
Technophilia or Technophobia - Exploring Teacher Autonomy In Learning ICT/Web...
Technophilia or Technophobia - Exploring Teacher Autonomy In Learning ICT/Web...Technophilia or Technophobia - Exploring Teacher Autonomy In Learning ICT/Web...
Technophilia or Technophobia - Exploring Teacher Autonomy In Learning ICT/Web...
 
Peter burgess, prio NORDsteva NCoE
Peter burgess, prio NORDsteva NCoEPeter burgess, prio NORDsteva NCoE
Peter burgess, prio NORDsteva NCoE
 
ISM Chapter 1.ppt
ISM Chapter 1.pptISM Chapter 1.ppt
ISM Chapter 1.ppt
 
Ethics and information security 2
Ethics and information security 2Ethics and information security 2
Ethics and information security 2
 
Dave Tyson Profile for CISO Insights
Dave Tyson Profile for CISO InsightsDave Tyson Profile for CISO Insights
Dave Tyson Profile for CISO Insights
 
Ethics & Privacy for Learning Analytics
Ethics & Privacy for Learning AnalyticsEthics & Privacy for Learning Analytics
Ethics & Privacy for Learning Analytics
 
Executive Information Security Training
Executive Information Security TrainingExecutive Information Security Training
Executive Information Security Training
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summary
 

Mais de Mikko Särelä

Ropecon nain rakennat kaupungin
Ropecon nain rakennat kaupunginRopecon nain rakennat kaupungin
Ropecon nain rakennat kaupunginMikko Särelä
 
Living+ kickoff slideset
Living+ kickoff slidesetLiving+ kickoff slideset
Living+ kickoff slidesetMikko Särelä
 
Industrial internet roundtable
Industrial internet roundtableIndustrial internet roundtable
Industrial internet roundtableMikko Särelä
 
Lisää kaupunkia Helsinkiin -ryhmästä kaupunkitutkijoille
Lisää kaupunkia Helsinkiin -ryhmästä kaupunkitutkijoilleLisää kaupunkia Helsinkiin -ryhmästä kaupunkitutkijoille
Lisää kaupunkia Helsinkiin -ryhmästä kaupunkitutkijoilleMikko Särelä
 
Tukholman reissu 06092014
Tukholman reissu 06092014Tukholman reissu 06092014
Tukholman reissu 06092014Mikko Särelä
 
Avoimesta datasta avoimeen kaupunkisuunnitteluun
Avoimesta datasta avoimeen kaupunkisuunnitteluunAvoimesta datasta avoimeen kaupunkisuunnitteluun
Avoimesta datasta avoimeen kaupunkisuunnitteluunMikko Särelä
 

Mais de Mikko Särelä (7)

Ropecon nain rakennat kaupungin
Ropecon nain rakennat kaupunginRopecon nain rakennat kaupungin
Ropecon nain rakennat kaupungin
 
Living+ kickoff slideset
Living+ kickoff slidesetLiving+ kickoff slideset
Living+ kickoff slideset
 
06 protocols2
06 protocols206 protocols2
06 protocols2
 
Industrial internet roundtable
Industrial internet roundtableIndustrial internet roundtable
Industrial internet roundtable
 
Lisää kaupunkia Helsinkiin -ryhmästä kaupunkitutkijoille
Lisää kaupunkia Helsinkiin -ryhmästä kaupunkitutkijoilleLisää kaupunkia Helsinkiin -ryhmästä kaupunkitutkijoille
Lisää kaupunkia Helsinkiin -ryhmästä kaupunkitutkijoille
 
Tukholman reissu 06092014
Tukholman reissu 06092014Tukholman reissu 06092014
Tukholman reissu 06092014
 
Avoimesta datasta avoimeen kaupunkisuunnitteluun
Avoimesta datasta avoimeen kaupunkisuunnitteluunAvoimesta datasta avoimeen kaupunkisuunnitteluun
Avoimesta datasta avoimeen kaupunkisuunnitteluun
 

Último

Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 

Último (20)

Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 

SECURITY ASPECTS

  • 2. CLASS SCHEDULE Feedback Course schedule Aspects of security Exercise for next week 24. huhtikuuta 14
  • 3. FEEDBACK Wish to learn abstract principles for security Wish to learn practical things Like project based learning Prefer traditional teaching To learn more about Internet security Worried about flipped classroom method Enjoy team work Traditional teaching outdated Learn fundamentals of information security Security problems are complex Decent level of security Access control Good reading material Protocol specific security issues and how they were fixed What kind of jobs we can do in this field Wish: Discussion forum 24. huhtikuuta 14
  • 4. MOODLE All exercise related information will be on Moodle Lecture slides will be on Noppa There is a discussion forum in Moodle. If you have questions about course content, ask them there, so that others may benefit from the answers too. 24. huhtikuuta 14
  • 5. COURSE SCHEDULE Week Tuesday Thursday April 14 - April 20 Introduction Easter April 21 - April 27 Easter What is security April 28- May 4 Access control 1st May May 5 - May 11 Access control 2 Incentive May 12 - May 18 Certificates Protocols 1 May 19 - May 25 Protocols 2 Security topics May 26 - June 1 Security topics Lab work on securityLab work on security 24. huhtikuuta 14
  • 6. WHAT IS SECURITY? 24. huhtikuuta 14
  • 8. ASPECTS OF SECURITY 24. huhtikuuta 14
  • 9. ASPECTS OF SECURITY Communication securityInformation security Human issues in security 24. huhtikuuta 14
  • 10. ASPECTS OF SECURITY Protocol security Communication securityInformation security Human issues in security 24. huhtikuuta 14
  • 11. ASPECTS OF SECURITY Protocol security Protocol Analysis Communication securityInformation security Human issues in security 24. huhtikuuta 14
  • 12. ASPECTS OF SECURITY Cryptography Protocol security Protocol Analysis Communication securityInformation security Human issues in security 24. huhtikuuta 14
  • 13. ASPECTS OF SECURITY Cryptography Cryptanalysis Protocol security Protocol Analysis Communication securityInformation security Human issues in security 24. huhtikuuta 14
  • 14. ASPECTS OF SECURITY Cryptography Cryptanalysis Protocol security Protocol Analysis Communication securityInformation security Human issues in security System security 24. huhtikuuta 14
  • 15. ASPECTS OF SECURITY Cryptography Cryptanalysis Protocol security Protocol Analysis Communication securityInformation security Human issues in security Security analysis System security 24. huhtikuuta 14
  • 16. ASPECTS OF SECURITY Cryptography Cryptanalysis Protocol security Protocol Analysis Communication securityInformation security Human issues in security Security analysis System security Threat modeling 24. huhtikuuta 14
  • 17. ASPECTS OF SECURITY Cryptography Cryptanalysis Protocol security Protocol Analysis Communication securityInformation security Human issues in security Organization security Security analysis System security Threat modeling 24. huhtikuuta 14
  • 18. ASPECTS OF SECURITY Cryptography Cryptanalysis Protocol security Protocol Analysis Communication securityInformation security Human issues in security Organization security Process security Security analysis System security Threat modeling 24. huhtikuuta 14
  • 19. ASPECTS OF SECURITY Cryptography Cryptanalysis Protocol security Protocol Analysis Communication securityInformation security Human issues in security Security economics Organization security Process security Security analysis System security Threat modeling 24. huhtikuuta 14
  • 20. ASPECTS OF SECURITY Cryptography Cryptanalysis Protocol security Protocol Analysis Communication securityInformation security Human issues in security Security economics Organization security Process security Security analysis System security Threat modeling Access control 24. huhtikuuta 14
  • 21. GROUP EXERCISE Discuss and make a presentation what are the assets that Aalto University has to protect? People affiliated with Aalto: What categories do they belong to? Where do the potential security threats come from? 24. huhtikuuta 14
  • 22. HOMEWORK (1) Read chapter 4 of the book. There will be classroom exercises based on section 4.2 and discussion on the rest of chapter. Write a lecture log about this class (1-2 pages). Deadline Monday 12 pm (noon) You can use the following questions to help you: what did you learn about security and it’s different parts during class and pre- assignment? Was something difficult to understand? What? 24. huhtikuuta 14
  • 23. ACCESS CONTROL EXERCISE The CIA model (Confidentiality, Intergrity, Availability) is a fairly useful tool for analyzing the security requirements in various situations. Deadline Monday 12 PM 1) Use the CIA model to analyze the security requirements for the following problems a single (computer) file containing the exam questions for this course: a day before the exam, when the exam starts, and a day after the exam a student's exam answers a published research paper an unpublished research paper a teacher's slides for a course 2) Take a look at https:// oma.aalto.fi and check your Personal Attributes for Aalto Shibboleth authentication. What is Shibboleth and how is this information used? Try to analyze what roles do you have in Aalto? 24. huhtikuuta 14