27
Muhammad Rizwan Asghar July 29, 2020 INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security

INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example

Slide title

In CAPITALS

50 pt

Slide subtitle

32 pt

Muhammad Rizwan Asghar

July 29, 2020

INTRODUCTION

Lecture 1

COMPSCI 316

Cyber Security

Page 2: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

2

TEACHING TEAM: LECTURERS

Course Coordinator and Lecturer

– Rizwan Asghar

– Office: Building 303S, Room 585

– Address: 38 Princes Street, Auckland

– Email: [email protected]

– Homepage: https://www.cs.auckland.ac.nz/~asghar

Lecturer

– Wanqing Tu

– Office: Building 303S, Room 592

– Address: 38 Princes Street, Auckland

– Email: [email protected]

– Homepage: https://unidirectory.auckland.ac.nz/profile/wtu808

Page 3: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

3

TEACHING TEAM: TUTOR

Tutor

– Samuel Dobson

– Office: Building 303, Room 210

– Address: 38 Princes Street, Auckland

– Email: [email protected]

– Homepage: https://unidirectory.auckland.ac.nz/profile/samuel-

dobson

Page 4: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

4

TEACHING TEAM: MARKERS

Marker

– Amith Murthy

– Email: [email protected]

Marker

– Ankush Pandita

– Email: [email protected]

Page 5: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

5

ABOUT YOU

Current degree

Any experience related to this course

Your expectations from this course

Your expectations from teaching staff (i.e., me)

Page 6: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

6

CLASS REPRESENTATIVE (CR)

Who

– Any volunteer

Core responsibilities

– An important link between students and the staff

– A CR gives the school feedback on different aspects of the

course

Benefit

– At the end of the semester, a CR can request a Class Rep

certificate

For further information, visit:

– http://www.ausa.org.nz/support/class-reps

Page 7: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

7

WHEN AND WHERE

Day Time Location

Wednesday 13:00 – 14:00 OGGB3/260-092

Thursday 11:00 – 12:00 405-470

Friday 14:00 – 15:00 405-460

Page 8: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

8

COURSE STRUCTURE

This course focuses on cyber security

fundamentals

It mainly covers software, system, and network

security

Page 9: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

9

COURSE STRUCTURE:

FIRST HALF (BY ME)

Lectures (Week 1 to 6)

– Introduction

– Cryptography

– Privacy and anonymity

Right to be forgotten

TOR

– Software security

Malware

Attack surface

Static and dynamic analysis

– System security

Hardware security

Identity and access management

Page 10: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

10

COURSE STRUCTURE:

SECOND HALF (BY WANQING)

Lectures (Week 7 to 12)

– Network security

Introduction to network security

Application layer security

Network layer security

IDS and honeypots

Wireless security

– Hot topics

Blockchain

Bitcoin

Page 11: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

11

COURSE STRUCTURE:

GUEST LECTURE

Guest lecture

– TBD

Page 12: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

12

EXPECTED FROM STUDENTS

Attend lectures and tutorials

Active class participation

Time allocation: 150 hours (average)

– 15 credit points

Rights and responsibilities

– Academic integrity: http://www.auckland.ac.nz/uoa/home/about/teaching-learning/honesty

– Inclusiveness: https://www.auckland.ac.nz/en/about/eo-equity-office/zero-tolerance-for-

discrimination.html

Page 13: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

13

MY TEACHING PHILOSOPHY

Giving feedback to you

Sharing my knowledge and experience

Creating an environment where I can offer you

enough learning opportunities

Encouraging inclusiveness

Page 14: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

14

IMPORTANT DATES

Assignment 1 will be released by the end of Week 1

Assignment 1 will be due by Monday, September 21

Assignment 2 will be released by Week 7

Assignment 2 will be due in Week 12

Page 15: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

15

SUPPORT DURING THIS COURSE

There are 10 tutorials

One tutorial every week except Week 1 and Week 7

Tutorials are helpful in preparing for assignments

Tutorials will also provide a platform for discussions

Page 16: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

16

FUTURE POSSIBILITIES

Report

Project

Dissertation

Thesis

Page 17: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

17

LEARNING OUTCOMES

Learn cyber security fundamentals

Understand the most common vulnerabilities and

attacks

Review the real-world exploits and breaches

Identify threats to software, systems, and

communication networks

Describe countermeasures for protecting software,

systems, and communication networks

Page 18: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

18

ASSESSMENTS

30% assignments

20% mid-semester test

50% final exam

Page 19: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

19

ASSIGNMENTS

There are two assignments

– 15% each assignment

– In case of late submission, 10% penalty for each extra day

– No submission will be accepted as soon as we release the

sample answers

See: https://www.cs.auckland.ac.nz/compsci316s2c/assignments

Page 20: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

20

TUTORIALS

The first stream on Monday for pre-recording

The next four for attending questions in person

The last two streams on Friday for a live Q&A session

via Zoom (recorded)

There are 10 tutorials

– Attend one of the tutorial streams

– https://canvas.auckland.ac.nz/courses/46251/groups#tab-10834

See: https://www.cs.auckland.ac.nz/compsci316s2c/assignments

Page 21: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

21

MID-SEMESTER TEST

Format is Multiple-Choice Question (MCQ)

Based on the first half of the course

– Week 1 to 6

Closed book

Duration: Around 1 hour

Page 22: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

22

FINAL EXAM

Format is MCQ

Based on the whole course (Week 1 to 12)

– At most 1/3 from the first half (Week 1 to 6)

– At least 2/3 from the second half (Week 7 to 12)

Closed book

Duration: Around 2 hours

Page 23: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

23

CHANGES IMPLEMENTED

IN SEMESTER 2, 2020

A practical question in each assignment

Balancing the mid-semester test and final exam

Sample questions from each half

ECC topic is not covered due to time constraints

Page 24: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

24

RECOMMENDED BOOK

Computer Security: Principles and Practice

Fourth Edition

William Stallings and Lawrie Brown

Pearson Higher Ed USA

ISBN 1292220635

Page 25: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

25

LECTURE UPLOAD POLICY

Presentation slides will be uploaded to Canvas

after each lecture

Page 26: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

26

CANVAS AND COURSE WEBSITE

Canvas for almost everything

– https://canvas.auckland.ac.nz/courses/46251

Lecture recordings will be available within a day after

we receive recording links

Course website for lectures and assignments

– https://www.cs.auckland.ac.nz/compsci316s2c

Piazza

– https://piazza.com/aucklanduni.ac.nz/semester22020/compsci316

Page 27: INTRODUCTION Lecture 1 · 2020-07-29 · INTRODUCTION Lecture 1 COMPSCI 316 Cyber Security. Top right corner for field customer or partner logotypes. See Best practice for example

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

27

Questions?

Thanks for your attention!