TCP/IP Protocoles de base - College of Information Technology

puffyyaphankyonkersNetworking and Communications

Oct 26, 2013 (3 years and 7 months ago)

80 views

1

Information Security


Program

Zouheir Trabelsi

Email: trabelsi@uaeu.ac.ae

United Arab Emirates University

College of Information Technology

2

What is Information Security

Information Security Program

Security courses

Security labs

Why should I Join the Security Program?

Where can I work as a Security Specialist?

Careers

Outline

3

Data bases

Data bases

Data bases

Data bases

Web

servers

FTP

servers

E
-
Commerce

servers

Electronic

transactions

Users/Clients

(Password, Data,..)

Applications

Software

Networks: Routers, Switches,


4

Router/Firewall

Internet

Hacker

Web Server

Hacker

Hacker

Your Network

Hacking is a Real THREAT

Data bases

Data bases

5

Read your emails

Spy your network

Crash your

computers

Get your

passwords

Get your

confidential data

Send fake

emails

Hacker

The Destructive Power of Hackers

6

Web site of Al
-
Jazeera.net,
September 27
th
, 2007

7

United States Department of Justice,
August 18th, 1996


8

Data bases

Data bases

Data bases

Data bases

Web

servers

FTP

servers

E
-
Commerce

servers

Electronic

transactions

Users/Clients

(Password, Data,..)

Applications

Software

Networks

Visa, MasterCard


Mechanisms, Models, Techniques, Protocols,


9

Data bases

Data bases

Servers

(web, email

)

E
-
Commerce

Users/Clients

(Password, Data,..)

Applications

Software

Networks

Cryptography

Firewall

IDS / IPS

VPN

Secure network

architecture

Mechanisms, Models, Techniques, Protocols, Solutions


Biometrics

AntiVirus

10

more productivity, better
services, more clients,


Securing

IT applications/systems leads to:

11

Information Security


Program

Firewall

Iris Recognition

Fingerprint Recognition

12

Security students learn

how to:





Design secure systems and networks



Secure IT applications



Use available security solutions





13

Security Courses

Intrusion Detection

Network Border


Control

Security

Architecture

and Mechanisms

Cryptography

Policy Criteria

Secure Mobile Code

Hands
-
on


labs

Secure Protocols for


the Internet and

E
-
Commerce

14

Firewall

&

VPN

State
-
of
-
the
-
Art 5 Security Labs in CIT

IDS

Biometrics

Ethical

Hacking

Wireless

security

Cryptography

15

Security students get

extensive
hand
-
on labs
on:

Hacking techniques

Viruses

Biometrics

Cryptography solutions

Firewall technology

Intrusion Detection Systems

Routers and Switches

Wireless security



Hacker

Iris recognition

Virus

Firewall

16

Mr. Sanjay the president of EC
-
COUNCIL:

“…
I visited many universities around the world, but I did not
see


similar excellent security program and

state
-
of
-
the
-
art security labs like you have in UAEU


17

Intrusion Detection & Biometrics Lab

IDS devices

Biometrics devices

18

Why should I Join the Security Program?



Security is :




NEW, promising, and evolving




Very interesting, practical and useful

Up to date security courses

State of the art security labs in CIT

19

Why should I Join the Security Program?

All institutions (Banks, Police,
Universities

) need security specialists

The job market for

security specialists is BIG

Limited number of information
SECURITY specialists

Most universities in the UAE do not

offer strong security programs

20

Security Skills in Demand

21

Where can I work?



IT applications/systems



Databases, e
-
commerce,



Software development,





Networks

22

Information Security Faculty

Faculty members

Instructors

23

Thank You

Zouheir Trabelsi

Email: trabelsi@uaeu.ac.ae

Tel: 037135570

Room#: 3141