introduction lecture 1 · 2020-07-29 · introduction lecture 1 compsci 316 cyber security. top...
TRANSCRIPT
![Page 1: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example](https://reader034.vdocument.in/reader034/viewer/2022050413/5f89c4876ddd5e4da54f8777/html5/thumbnails/1.jpg)
Slide title
In CAPITALS
50 pt
Slide subtitle
32 pt
Muhammad Rizwan Asghar
July 29, 2020
INTRODUCTION
Lecture 1
COMPSCI 316
Cyber Security
![Page 2: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example](https://reader034.vdocument.in/reader034/viewer/2022050413/5f89c4876ddd5e4da54f8777/html5/thumbnails/2.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
2
TEACHING TEAM: LECTURERS
Course Coordinator and Lecturer
– Rizwan Asghar
– Office: Building 303S, Room 585
– Address: 38 Princes Street, Auckland
– Email: [email protected]
– Homepage: https://www.cs.auckland.ac.nz/~asghar
Lecturer
– Wanqing Tu
– Office: Building 303S, Room 592
– Address: 38 Princes Street, Auckland
– Email: [email protected]
– Homepage: https://unidirectory.auckland.ac.nz/profile/wtu808
![Page 3: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example](https://reader034.vdocument.in/reader034/viewer/2022050413/5f89c4876ddd5e4da54f8777/html5/thumbnails/3.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
3
TEACHING TEAM: TUTOR
Tutor
– Samuel Dobson
– Office: Building 303, Room 210
– Address: 38 Princes Street, Auckland
– Email: [email protected]
– Homepage: https://unidirectory.auckland.ac.nz/profile/samuel-
dobson
![Page 4: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example](https://reader034.vdocument.in/reader034/viewer/2022050413/5f89c4876ddd5e4da54f8777/html5/thumbnails/4.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
4
TEACHING TEAM: MARKERS
Marker
– Amith Murthy
– Email: [email protected]
Marker
– Ankush Pandita
– Email: [email protected]
![Page 5: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example](https://reader034.vdocument.in/reader034/viewer/2022050413/5f89c4876ddd5e4da54f8777/html5/thumbnails/5.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
5
ABOUT YOU
Current degree
Any experience related to this course
Your expectations from this course
Your expectations from teaching staff (i.e., me)
![Page 6: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example](https://reader034.vdocument.in/reader034/viewer/2022050413/5f89c4876ddd5e4da54f8777/html5/thumbnails/6.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
6
CLASS REPRESENTATIVE (CR)
Who
– Any volunteer
Core responsibilities
– An important link between students and the staff
– A CR gives the school feedback on different aspects of the
course
Benefit
– At the end of the semester, a CR can request a Class Rep
certificate
For further information, visit:
– http://www.ausa.org.nz/support/class-reps
![Page 7: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example](https://reader034.vdocument.in/reader034/viewer/2022050413/5f89c4876ddd5e4da54f8777/html5/thumbnails/7.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
7
WHEN AND WHERE
Day Time Location
Wednesday 13:00 – 14:00 OGGB3/260-092
Thursday 11:00 – 12:00 405-470
Friday 14:00 – 15:00 405-460
![Page 8: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example](https://reader034.vdocument.in/reader034/viewer/2022050413/5f89c4876ddd5e4da54f8777/html5/thumbnails/8.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
8
COURSE STRUCTURE
This course focuses on cyber security
fundamentals
It mainly covers software, system, and network
security
![Page 9: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example](https://reader034.vdocument.in/reader034/viewer/2022050413/5f89c4876ddd5e4da54f8777/html5/thumbnails/9.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
9
COURSE STRUCTURE:
FIRST HALF (BY ME)
Lectures (Week 1 to 6)
– Introduction
– Cryptography
– Privacy and anonymity
Right to be forgotten
TOR
– Software security
Malware
Attack surface
Static and dynamic analysis
– System security
Hardware security
Identity and access management
![Page 10: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example](https://reader034.vdocument.in/reader034/viewer/2022050413/5f89c4876ddd5e4da54f8777/html5/thumbnails/10.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
10
COURSE STRUCTURE:
SECOND HALF (BY WANQING)
Lectures (Week 7 to 12)
– Network security
Introduction to network security
Application layer security
Network layer security
IDS and honeypots
Wireless security
– Hot topics
Blockchain
Bitcoin
![Page 11: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example](https://reader034.vdocument.in/reader034/viewer/2022050413/5f89c4876ddd5e4da54f8777/html5/thumbnails/11.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
11
COURSE STRUCTURE:
GUEST LECTURE
Guest lecture
– TBD
![Page 12: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example](https://reader034.vdocument.in/reader034/viewer/2022050413/5f89c4876ddd5e4da54f8777/html5/thumbnails/12.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
12
EXPECTED FROM STUDENTS
Attend lectures and tutorials
Active class participation
Time allocation: 150 hours (average)
– 15 credit points
Rights and responsibilities
– Academic integrity: http://www.auckland.ac.nz/uoa/home/about/teaching-learning/honesty
– Inclusiveness: https://www.auckland.ac.nz/en/about/eo-equity-office/zero-tolerance-for-
discrimination.html
![Page 13: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example](https://reader034.vdocument.in/reader034/viewer/2022050413/5f89c4876ddd5e4da54f8777/html5/thumbnails/13.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
13
MY TEACHING PHILOSOPHY
Giving feedback to you
Sharing my knowledge and experience
Creating an environment where I can offer you
enough learning opportunities
Encouraging inclusiveness
![Page 14: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example](https://reader034.vdocument.in/reader034/viewer/2022050413/5f89c4876ddd5e4da54f8777/html5/thumbnails/14.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
14
IMPORTANT DATES
Assignment 1 will be released by the end of Week 1
Assignment 1 will be due by Monday, September 21
Assignment 2 will be released by Week 7
Assignment 2 will be due in Week 12
![Page 15: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example](https://reader034.vdocument.in/reader034/viewer/2022050413/5f89c4876ddd5e4da54f8777/html5/thumbnails/15.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
15
SUPPORT DURING THIS COURSE
There are 10 tutorials
One tutorial every week except Week 1 and Week 7
Tutorials are helpful in preparing for assignments
Tutorials will also provide a platform for discussions
![Page 16: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example](https://reader034.vdocument.in/reader034/viewer/2022050413/5f89c4876ddd5e4da54f8777/html5/thumbnails/16.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
16
FUTURE POSSIBILITIES
Report
Project
Dissertation
Thesis
![Page 17: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example](https://reader034.vdocument.in/reader034/viewer/2022050413/5f89c4876ddd5e4da54f8777/html5/thumbnails/17.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
17
LEARNING OUTCOMES
Learn cyber security fundamentals
Understand the most common vulnerabilities and
attacks
Review the real-world exploits and breaches
Identify threats to software, systems, and
communication networks
Describe countermeasures for protecting software,
systems, and communication networks
![Page 18: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example](https://reader034.vdocument.in/reader034/viewer/2022050413/5f89c4876ddd5e4da54f8777/html5/thumbnails/18.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
18
ASSESSMENTS
30% assignments
20% mid-semester test
50% final exam
![Page 19: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example](https://reader034.vdocument.in/reader034/viewer/2022050413/5f89c4876ddd5e4da54f8777/html5/thumbnails/19.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
19
ASSIGNMENTS
There are two assignments
– 15% each assignment
– In case of late submission, 10% penalty for each extra day
– No submission will be accepted as soon as we release the
sample answers
See: https://www.cs.auckland.ac.nz/compsci316s2c/assignments
![Page 20: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example](https://reader034.vdocument.in/reader034/viewer/2022050413/5f89c4876ddd5e4da54f8777/html5/thumbnails/20.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
20
TUTORIALS
The first stream on Monday for pre-recording
The next four for attending questions in person
The last two streams on Friday for a live Q&A session
via Zoom (recorded)
There are 10 tutorials
– Attend one of the tutorial streams
– https://canvas.auckland.ac.nz/courses/46251/groups#tab-10834
See: https://www.cs.auckland.ac.nz/compsci316s2c/assignments
![Page 21: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example](https://reader034.vdocument.in/reader034/viewer/2022050413/5f89c4876ddd5e4da54f8777/html5/thumbnails/21.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
21
MID-SEMESTER TEST
Format is Multiple-Choice Question (MCQ)
Based on the first half of the course
– Week 1 to 6
Closed book
Duration: Around 1 hour
![Page 22: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example](https://reader034.vdocument.in/reader034/viewer/2022050413/5f89c4876ddd5e4da54f8777/html5/thumbnails/22.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
22
FINAL EXAM
Format is MCQ
Based on the whole course (Week 1 to 12)
– At most 1/3 from the first half (Week 1 to 6)
– At least 2/3 from the second half (Week 7 to 12)
Closed book
Duration: Around 2 hours
![Page 23: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example](https://reader034.vdocument.in/reader034/viewer/2022050413/5f89c4876ddd5e4da54f8777/html5/thumbnails/23.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
23
CHANGES IMPLEMENTED
IN SEMESTER 2, 2020
A practical question in each assignment
Balancing the mid-semester test and final exam
Sample questions from each half
ECC topic is not covered due to time constraints
![Page 24: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example](https://reader034.vdocument.in/reader034/viewer/2022050413/5f89c4876ddd5e4da54f8777/html5/thumbnails/24.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
24
RECOMMENDED BOOK
Computer Security: Principles and Practice
Fourth Edition
William Stallings and Lawrie Brown
Pearson Higher Ed USA
ISBN 1292220635
![Page 25: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example](https://reader034.vdocument.in/reader034/viewer/2022050413/5f89c4876ddd5e4da54f8777/html5/thumbnails/25.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
25
LECTURE UPLOAD POLICY
Presentation slides will be uploaded to Canvas
after each lecture
![Page 26: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example](https://reader034.vdocument.in/reader034/viewer/2022050413/5f89c4876ddd5e4da54f8777/html5/thumbnails/26.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
26
CANVAS AND COURSE WEBSITE
Canvas for almost everything
– https://canvas.auckland.ac.nz/courses/46251
Lecture recordings will be available within a day after
we receive recording links
Course website for lectures and assignments
– https://www.cs.auckland.ac.nz/compsci316s2c
Piazza
– https://piazza.com/aucklanduni.ac.nz/semester22020/compsci316
![Page 27: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example](https://reader034.vdocument.in/reader034/viewer/2022050413/5f89c4876ddd5e4da54f8777/html5/thumbnails/27.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
27
Questions?
Thanks for your attention!