Introduction to Computer and Network Security

NSF Chautauqua 2006 - Dayton, OHIO

Monday - May 22, 2006

9-10:30

10:30 - noon

Vulnerabilities (Hazards)

1 - 3 p.m.

Windows Networks Fundmanentals

3 - 4 p.m.

Securing Windows Computers and Networks

4 - 5 p.m.

Q & A

Tuesday - May 23, 2006

9-10:30

TCP/IP Fundamentals

·        Lab 6: Network Security – port scanner

·        Lab 7: Network protocol analyzer

10:30 - noon

Exploiting Linux/Unix Computers and Networks

1 – 3 p.m.

Securing Linux/Unix Computers and Networks

·        Lab 9 – Securing Linux Systems

·        Lab 10 – Troubleshooting Linux and Apache Systems

Secure Linux

Open BSD

Free BSD


3 - 4 p.m.

Network Security

FAQ: Network Intrusion Detection Systems

Chapter 5 - Firewalls

Chapter 10 - Incident and Disaster Response

4 - 5 p.m.

Q & A

Wednesday - May 24, 2006

9 - noon

Network Security Wireless Network Security
  • Wireless Personel Area Networks (WPAN)
    • IEEE 802.15.1 - Bluetooth
    • Security Issues [ Serious flaws in bluetooth security lead to disclosure of personal data
      • SNARF attack - gain access to restricted portions of the stored data
      • BACKDOOR attack - establishes a trust relationship
      • BLUEBUG attack - creates a serial profile connection
      • Bluejacking - mechanism for exchanging anonymous messages in public places
    • Radio Frequency Identification (RFID) Security Issues
  • Wireless Security Techniques: An Overview
  • Wireless Network Security
  • Wireless Metropolitan Area Networks (WMAN) Community Networks
    • IEEE 802.16 - WiMAX
    • Security Implementations
      • authentication uses PKM-EAP (Extensible Authentication Protocol) and TLS (Transport Layer Security
      • encryption uses CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) using the AES algorithm (also supports Triple DES)
Home Network Security

1 - 3 p.m.

·         Security Policies

·         Security Planning

·         Risk Assessment