Networking Attacks
How Can we Detect and Prevent Network Attacks?
Exploration
Read chapter five Computer Systems Security: Planning for Success
Activities
Monday: Laboratory session Tuesday and Thursday: Computer Networking - Understand design and use of networking protocols
- Learn how to detect and defend against network attacks
- Learn how to exploit network protocol vulnerabilities
- Continued highlighting of the concept of a “security synapse”
- Instructor presentations that feature:
- Explanation of a high-level concept networking protocols
- In-class activity that connects concepts to real-world scenarios
- Hands-on examples of the operation and behavior of networking protocols
- No student discussion leaders for this week’s material