清华大学:《网络安全 Network Security》课程教学资源(PPT课件讲稿)Lecture 01 Introduction

Network security Dan li CS Department, Tsinghua University 2021/2/3
Network Security 2021/2/3 1 Dan LI CS Department, Tsinghua University

Today's Lecture Overview of Network Security Cryptographic hash functions User authentication SSl IPSec IKE Distributed Denial of Service(DDos * Firewa‖l Reading List 2021/2/3
Today’s Lecture Overview of Network Security Cryptographic hash functions User authentication SSL IPSec & IKE Distributed Denial of Service (DDoS) Firewall Reading List 2021/2/3 2

Motivation https:// a wells fargo Account Sum, tary-Mlicre wge.com/imnl_aal_on/cg-bin/session.cgipSessargs-coan76ax52lTpxbuocterbfmmdmdK-egoLinksa0vahoomapsamapbLstadctIonary" Hone I Help Center I Cordnct Us I Locating I Ste Map I Aply siun on 构 Account Summary aet Log on January 06, 2004 Wells Forno Accounts ook Accounts lip: Select an account's balance to access the Account History Account Servces Enrollfor online statement: My Message center My Message Center cash Accounts Account Available Balance rld pILPaY access to end your session, be sure to sign om ign up for the rogram and get 91995-2003Wells Fago. All rohe reserved 2, 500 points. 2021/2/3 3
Motivation 2021/2/3 3 https://

EXcerpt From“ General Terms of use” File Edit View Favcriters Tools Help Bnk·回的心品 ahttp://www.wellsfargo.com/privacy_security/terms_of_use,jhtml v aGo ire General Terms of uae 二二二二,的 二二二二:二二 DN BFRVICE OF MERCHNDEE PROMOED THRouC THE AE RVICE 靠o片 PURCHATED VLINHTD ETTES oEu NOT ATTCT ANY MANuFAC TUFFRT Na了 o Inte 山2904 2021/2/3 4
Excerpt From “General Terms of Use” 2021/2/3 4

Privacy and Security File Edt view. Favorits Tools Heo Bak·的品 shrahttp://www.wellfargo.com/privacy_security/indexjhtml Gou“e Privacy and security a Emend huw Buen awDcalaan custine salwN and petachiah anu uur fm wson renan wa storag 二二二二二二二能计二二 Uadarnd how w uan an nrel thema i图 已 tar Is s EIs w hans wur satai has peen comgtonisea 20049于注DHA加 2021/2/3
Privacy and Security 2021/2/3 5

What do you think What do you think should be included in privacy and security"for an e-commerce Website? 2021/2/3
What Do You Think What do you think should be included in “privacy and security” for an e-commerce website? 2021/2/3 6

Desirable Security Properties Authenticity Confidentiality Integrity Availability Accountability and non-repudiation Freshness Access control Privacy of collected information Integrity of routing and dNS infrastructure 2021/2/3
Desirable Security Properties Authenticity Confidentiality Integrity Availability Accountability and non-repudiation Freshness Access control Privacy of collected information Integrity of routing and DNS infrastructure 2021/2/3 7

Peek at the dark side SCULT OF THE DEAD COW PARAMED|A·est1984v0 Blackhato usA· EUROPE·A5IA Trainin 2021/2/3
Peek at the Dark Side 2021/2/3 8

What drives the attackers? Put up a fake financial website collect users logins and passwords, empty out their accounts Insert a hidden program into unsuspecting users' computers, use them to spread spam Subvert copy protection, gain access to music and video files 2021/2/3
What Drives the Attackers? Put up a fake financial website, collect users’ logins and passwords, empty out their accounts Insert a hidden program into unsuspecting users’ computers, use them to spread spam Subvert copy protection, gain access to music and video files 2021/2/3 9

What drives the attackers? Stage denial of service attacks on websites extort money Wreak havoc, achieve fame and glory in the blackhat community 2021/2/3
What Drives the Attackers? Stage denial of service attacks on websites, extort money Wreak havoc, achieve fame and glory in the blackhat community 2021/2/3 10
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 安徽理工大学:《汇编语言》课程教学资源(PPT课件讲稿)第四章 汇编语言程序格式.ppt
- 《C程序设计》课程电子教案(PPT课件讲稿)第二章 基本数据类型及运算.ppt
- 浪潮公司:并行程序、编译与函数库简介、应用软件的调优.ppt
- 南京大学:《数据结构 Data Structures》课程教学资源(PPT课件讲稿)第二章 线性表.ppt
- 长春大学:《计算机应用基础》课程教学资源(PPT课件讲稿)第二章 操作系统.ppt
- 《C++语言基础教程》课程电子教案(PPT教学课件)教学资源(PPT课件)第2讲 C++语言基础.ppt
- 《网络安全 Network Security》教学资源(PPT讲稿)Topic 3 User Authentication.pptx
- 《数据结构》课程教学资源(PPT课件讲稿)第三章 栈和队列.ppt
- 中国水利水电出版社:《单片机原理及应用》课程PPT教学课件(C语言版)第2章 MCS-51单片机基本结构.ppt
- 电子科技大学:《Unix操作系统基础》课程教学资源(PPT课件)第一章 UNIX操作系统概述、第二章 UNIX使用入门.ppt
- 《计算机组成原理》课程教学资源(PPT课件讲稿)第五章 存储器层次结构.ppt
- Data Mining Association Analysis——Basic Concepts and Algorithms Chapter 6 Introduction to Data Mining.ppt
- 《信息安全与管理》课程教学资源(PPT课件讲稿)第六章 公开密钥设施PKI.ppt
- 《计算机应用基础》课程教学资源(PPT课件讲稿)第一章 计算机基础知识.ppt
- 《Computer Networking:A Top Down Approach》英文教材教学资源(PPT课件讲稿,3rd edition)Chapter 5 Link Layer.ppt
- 西安电子科技大学:《微机原理与接口技术》课程教学资源(PPT课件讲稿)第六章 存储器设计.pptx
- 《编译原理》课程教学资源(PPT课件讲稿)第五章 类型检查.ppt
- 《网络搜索和挖掘关键技术 Web Search and Mining》课程教学资源(PPT讲稿)Lecture 10 Query expansion.ppt
- 北京师范大学现代远程教育:《计算机应用基础》课程教学资源(PPT课件讲稿)第一章 计算机常识.ppt
- 中国科学技术大学:《网络信息安全 NETWORK SECURITY》课程教学资源(PPT课件讲稿)UNIX/LINUX 操作系统.ppt
- 《数据结构》课程教学资源(PPT课件讲稿)第六章 集合与字典.ppt
- 华东理工大学:《Visual Basic程序设计教程》课程教学资源(PPT课件)第四讲 VB语言基础(运算符、函数和表达式).pps
- 《软件工程》课程教学资源(PPT课件讲稿)第4章 软件总体设计.ppt
- 《网络综合布线》课程教学资源(PPT讲稿)模块2 综合布线工程设计.ppt
- 数据库接口技术(PPT讲稿)开放式数据库联接 Open DataBase Connectivity——ODBC.ppt
- 《网络系统集成技术》课程教学资源(PPT课件讲稿)第六章 网络互联技术.ppt
- 清华大学出版社:《网络信息安全技术》教材电子教案(PPT课件讲稿)第2章 密码技术.ppt
- 湖南生物机电职业技术学院:《电子商务概论》课程教学资源(PPT课件)第六章 网上支付.ppt
- 《计算机组装与维修》课程电子教案(PPT教学课件)第一章 计算机系统维护维修基础.ppt
- 《Java Web应用开发基础》课程教学资源(PPT课件)第8章 EL、JSTL和Ajax技术.ppt
- Dynamic Pricing in Spatial Crowdsourcing:A Matching-Based Approach.pptx
- 计算机软件技术基础:《Visual Basic6.0 程序设计》课程教学资源(PPT课件)第1章 Visual Basic(VB)概述.ppt
- 贵州电子信息职业技术学院:常用办公技巧(PPT讲稿,主讲:刘忠华).ppt
- 东南大学:《C++语言程序设计》课程教学资源(PPT课件讲稿)Chapter 09 Classes A Deeper Look(Part 1).ppt
- 同济大学:《大数据分析与数据挖掘 Big Data Analysis and Mining》课程教学资源(PPT课件讲稿)Clustering Basics(主讲:赵钦佩).pptx
- 电子工业出版社:《计算机网络》课程教学资源(第五版,PPT课件讲稿)第三章 数据链路层.ppt
- 上海交通大学:《网络安全技术》课程教学资源(PPT课件讲稿)比特币(主讲:刘振).pptx
- 中国科学技术大学:《并行算法实践》课程教学资源(PPT课件讲稿)上篇 并行程序设计导论 单元II 并行程序编程指南 第七章 OpenMP编程指南.ppt
- Online Minimum Matching in Real-Time Spatial Data:Experiments and Analysis.pptx
- 《数字图像处理 Digital Image Processing》课程教学资源(各章要求及必做题参考答案).pdf