0% found this document useful (0 votes)
20 views

00 Security Course Intro 2

This document provides an overview of an information security course. It introduces the lecturers and course contacts. It outlines the learning objectives, prerequisites, lectures, weekly exercises, exam structure, course plan, and recommended reading. The course aims to teach security concepts and the adversarial mindset through lectures and hands-on exercises.

Uploaded by

Trus Athola
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views

00 Security Course Intro 2

This document provides an overview of an information security course. It introduces the lecturers and course contacts. It outlines the learning objectives, prerequisites, lectures, weekly exercises, exam structure, course plan, and recommended reading. The course aims to teach security concepts and the adversarial mindset through lectures and hands-on exercises.

Uploaded by

Trus Athola
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Welcome to the

Information Security course!


Tuomas Aura
CS-C3130 Information security

Aalto University, 2022 course


About the teachers
▪ Lecturer: Tuomas Aura
– Professor at Aalto since 2008
– Microsoft Research, UK, 2001–2009; teaching at UCL
– Doctoral degree at TKK in 2000,
MSc (Tech) in computer science in 1996
▪ Research themes:
– Security protocol engineering, e.g., mobility, device bootstrapping
– Security analysis of new technologies
▪ Co-teacher: Lachlan Gunn

2
Course contacts
▪ Course materials and up-to-date info in MyCourses:
https://mycourses.aalto.fi/course/view.php?id=37064
▪ MyCourses front page and announcements for the latest info
▪ MyCourses discussion forum for public questions

▪ Email: [email protected]
Please use this address for all course-related email.
Avoid sending email directly to the teachers.
▪ Sorry, no 24/7 chat forum

▪ Full course staff: Tuomas Aura, Lachlan Gunn, Aleksi Peltonen,


Jacopo Bufalino, Jose Luis Martin Navarro, exercise assistants

3
Learning objectives
▪ Learn concepts and abstractions for thinking and talking about
information security
▪ Learn the adversarial mindset of security engineering. Be able to
model threats and analyze the security of a system critically, from
the attacker’s viewpoint
▪ Understand the purpose and function of several security
technologies, as well as their limitations
– security policies , authentication, access control, cryptography, network
protocols, identity management etc.
▪ Have hands-on experience of security flaws in software,
to be a better programmer
▪ Basis for further study and research

4
Prerequisite knowledge
▪ Ability to program in many languages
▪ Broad knowledge of information technology
– Linux shell, Windows, databases, web programming, internet, C

FAQ: Can I take this course?


▪ Yes, if you really want to. Nothing is very difficult, but the less you
know, the more extra work there will be to learn the technologies.
▪ The more you know about IT, the more you can focus on security.
▪ Advice: Budget some hours for each exercise round and stop when
they have been used. Do not feel bad about parts B and C.

5
Lectures
▪ Recorded lectures published during lecture period I
– Streaming and download from Panopto, link in MyCourses
– Approximately 10 lectures of 1-2 hours each, split to smaller parts

▪ Lecture slides will be in MyCourses


– Handouts include some pages not shown in the lectures
– Pages that can be safely skipped are marked with Extra
material

▪ Flipped classroom sessions to support learning of selected lecture


content; optional help for those who like it
– Tue and Thu at 14:15-16 on campus (variable location!) starting from the
second week

6
Weekly exercises
▪ Exercises provide hands-on experience especially in software
security to make us better programmers
▪ Exercises are not mandatory but strongly recommended
▪ 5 weekly rounds of exercises. Deadline Fridays at 18:00.
First deadline on 16 September 2021
▪ Problems published in MyCourses at least one week earlier
▪ No mandatory exercise sessions to attend
▪ Course assistant reception hours for help and advice:
– Tue, Wed and Thu at 16:15-18 on campus

Extensive log files from the exercise platform will


be used for course development and research.
7
Advice for the exercises
▪ Programming skills are required for the exercises
▪ Try to solve all problems at least partly
▪ Exercises have two or three parts:
– Part A should be easy (10 points)
– Part B should be more difficult (10 points)
– Parts C is for bonus points and challenge (10 points)
▪ Do not expect to solve all parts! Try to do at least part A
– Join the exercise sessions for help, especially on part A
▪ Individual work: Discuss with other students but
do all practical experiments independently
8
Exam and course grading
▪ The exam will be on campus during the exam week
▪ Grading based on a weighted sum of exam and exercise points:
total_points = exam + round_up(exercises / 10)
▪ Maximum points: 30+10 (exam + 5 * exercise parts A and B)
– plus a few bonus points for exercise parts C
▪ Collect at least 40% of the total points (≥16) to pass the course

9
Course plan
Lectures on information security: Exercises :
Course intro 1. Access control in Linux and
1. Access control models Windows
2. Access control in operating systems 2. Software and web security 1
3. User authentication (SQL injection)
4. Software security Note: The exercises focus on
5. Cryptography software security while the
3. Software and web security 2
6. Data encryption lectures(+exam) cover (web security)
information security broadly 4. Software and IoT security 3
7. Security protocols
8. PKI and web security (buffer overrun)
9. Threat analysis 5. Software and web security 4
10. Identity management (XSS)

10
Recommended reading
▪ Best coverage of the course syllabus :
– William Stallings, Computer Security: Principles and Practice, 4th ed.,
2018
▪ Better books by real experts, but less content covered:
– Matt Bishop, Computer Security. Art and Science, 2018 (for
prospective research students)
– Ross Anderson, Security Engineering: A Guide to Building Dependable
Distributed Systems, 3rd ed., 2020 (good reading)
▪ Read lecture slides, including the extra slides, and
search for online sources on each lecture topic!
11

You might also like