Tutorial 3
Network Defense Essentials
|
Srinivas Mukammala
Department of Computer Science, & Institute for Complex Additive
Systems Analysis
New Mexico Tech
USA
E-mail: srinivas@cs.nmt.edu |
Srinivas Mukammala (srinivas@cs.nmt.edu)
is a Ph.D. candidate and researcher with New Mexico Tech's Institute
for Complex Additive Systems Analysis. He is a frequent speaker on information
assurance in conferences and tutorials. He is currently working in the
areas of information assurance and security and has over 50 publications
in the areas of information security.
Srinivas Mukkamala received his B.E. in Computer Science and Engineering
from University of Madras in 1999, M.S. in Computer Science form New
Mexico Tech. He is currently a Ph.D. candidate at New Mexico Tech’s
Computer Science Department and a student lead of the information assurance
research group at New Mexico Tech.
Scope:
There is an increasing need for governments, enterprises, educational
institutions and individuals to employ enhanced security measures and
security devices to protect their computer networks and information
assets.
This tutorial begins with an introduction to the basic concepts and
issues of the Internet and networking technology. An assortment of important
current topics will be discussed; including information assurance, audit
trails, computer attacks, vulnerability analysis, vulnerability scanners,
firewalls, intrusion detection systems, data protection mechanisms,
risk analysis, common vulnerabilities and exposures (CVE), and information
sharing and analysis centers (ISACs).
Tutorial Goals:
To give a general introduction to network security and network security
tools with emphasis on selected information security problems.
Duration: 3.00 HR
Program:
1. Introduction to Information Assurance
Basic Concepts
Security Policy
IA Technology
2. Risk Management
Introduction to Risk
Assessment
Risk analysis
Judicious deploying
of security infrastructure
Incident reports
Incident analysis and
recovery
3. Malicious Logic
Malware Classification
Current Anti Virus Technologies
Limitations of Current
Malware Detection
4. Security Technologies
Firewalls
Intrusion Detection
and Prevention Systems
Vulnerability Scanners
Relevant Security Technologies
5. Infosec Challenges
Stealth Attacks
Software Security
Polymorphic and Metamorphic
Malware
Fourth Generation Attacks
Target Audience:
Attendees of ICANNGA
with general interest in information and system security
Attendees who are beginners
to the field of information and system security
Prerequisites: None
Sample Tutorials Presented:
[1] S. Mukkamala. (2004) Principles
of Network Defense. Briefing to the Information Technology Oversight
Committee of the State of New Mexico
[2] A. H. Sung, S. Mukkamala, Ed. Paz.
(2004) Principles and Challenges in Information Security. IEEE International
Conference on Information Technology (ITCC 04)
[3] A.H. Sung, S. Mukkamala. (2003)
Information Security. 10th International Conference on High Performance
Computing (HiPC 2003)
[4] A.H. Sung, S. Mukkamala. (2003)
Information Assurance. IEEE International Conference on IRI (IRI 03)
[5] A.H. Sung, S. Mukkamala. (2003)
Need for Information Assurance and Security. IEEE International Conference
Systems, Man, and Cybernetics (IEEE SMC 03)
[6] A.H. Sung, S. Mukkamala. (2003)
Information Assurance. Third International Conference on Intelligent
Systems Design and Applications (ISDA 03)
|