lecture-1
lecture-1
Instructor:
Dr. Mohammad Wazid
Professor, Department of CSE
Head of Cyber security and IoT research group
Graphic Era (Deemed to be University), Dehradun, India
Email: [email protected]
Homepage: https://sites.google.com/site/mwazidiiith/home
About the instructor
Qualification:
1.Postdoc from Cyber Security and Networks Lab, Innopolis
University, Innopolis, Russia.
2. Ph. D (CSE) from Center for Security, Theory and Algorithmic
Research of the International Institute of Information Technology
(IIIT), Hyderabad, India.
3. M. Tech. Computer Network Engineering from Graphic Era
Deemed to be University, Dehradun, India.
4. B. E. (CSE) from KEC, Dwarahat, (Regional Engineering College
(REC) Uttarakhand, India.
About the instructor
Research background:
Published 133 papers in international journals and conferences, along with
13 patents have been granted/published in the fields of
Cyber Security
Authentication
Internet of Things (IoT)
Cloud Computing
Big Data
Blockchain
About the instructor
Research background:
Some of the research findings were published in top cited journals, such as
the IEEE TIFS, IEEE TDSC, IEEE Transactions on Smart Grid, IEEE
Internet of Things Journal, IEEE Transactions on Industrial Informatics,
IEEE Journal of Biomedical and Health Informatics, IEEE Consumer
Electronics Magazine, Future Generation Computer Systems, and Journal of
Network and Computer Applications.
Awards:
• University Gold Medal in M. Tech program
• Young Scientist Award by UCOST, Department of Science and Technology,
Government of Uttarakhand
• Dr. A.P.J Abdul Kalam innovator of the year award
• IEEE TNSE and ICT Express (Elsevier) Best Research Reviewer Award
Course Outcomes
• After completion of the course students will be able to:
• 1. Explain different security threats and attacks
• 2. Know the working of different attacks and security protocols
• 3. Analyse the different security protocols
• 4. Use programming to implement security protocols
• 5. Apply security mechanisms to secure various applications
• 6. Develop system security protocols
Grading scheme
• As per the University scheme.
Contents of this course
Reference Books:
Security in Computing, 5th Edition by C. P. Pfleeger, S. L. Pfleeger, J.
Margulies
Unit 1. Introduction to System security
Unit 1: Topics
• Overview of computer system security, control hijacking
attacks
• Browser memory protection, Sandboxing and Isolation,
• Tools and techniques for writing robust application software,
Security vulnerability, detection tools, and techniques
• Program analysis (static, concolic and dynamic analysis)
• Privileges, access control, and Operating System Security,
Exploitation techniques, and Fuzzing
Overview computer system security