12. Network Security

Поделиться
HTML-код
  • Опубликовано: 29 мар 2017
  • MIT 6.858 Computer Systems Security, Fall 2014
    View the complete course: ocw.mit.edu/6-858F14
    Instructor: Nickolai Zeldovich
    In this lecture, Professor Zeldovich discusses network security, and how TCP/IP has evolved.
    License: Creative Commons BY-NC-SA
    More information at ocw.mit.edu/terms
    More courses at ocw.mit.edu

Комментарии • 34

  • @dooboodot
    @dooboodot 2 года назад +7

    He seems to be so glad on students asking questions! Great teacher.

  • @twitter47
    @twitter47 23 дня назад

    very informative .Thanks to MIT OpenCourse.

  • @bpgpw
    @bpgpw 5 лет назад +3

    After he said that port is kind of below sequence number, it all makes sense for me.
    btw, i love the explanation, so depth and clear.

  • @frankorbis7474
    @frankorbis7474 6 лет назад +1

    So if A: C->S ACK(SNs) would be changed with an insert to A: C->S NACK(SNs)
    Would A: C->S NACK(SNs) what should be A: C->S ACK(SNs) not produce a loop?
    Then why not use a total length and total CRC32 to prevent that a packet gets in-
    serted like B = 1 Byte indicate Start [Filename what comes first + Pkt number] +
    Total CRC32] so [B][FName][PKT Number][CRC32] in case you have a B to
    start, we know followed by the File name how many packet numbers there will be
    for Filename based on the file length, protected by an total CRC32 over the complete
    File and send packets like [PKT][PKT number][CRC32] - next then it will hard to insert
    another PKT is that not correct?

  • @AmitSingh-gv6rt
    @AmitSingh-gv6rt 4 года назад +3

    I had done bachelor in electrical engineering can I opt the course of network and Internet security analysis for further studies because I am too much interested?

  • @elinelindazagovawintersong708
    @elinelindazagovawintersong708 5 лет назад +2

    Thank you)

  • @SinghGlobeTrotting
    @SinghGlobeTrotting 6 лет назад +1

    Great explanation!!!

  • @TheLollisoft
    @TheLollisoft 7 лет назад +8

    Interesting stuff. The audio quality is neglectable given the in-depth content's information :-) I was able to follow the complete video.

    • @beuman0
      @beuman0 5 лет назад

      It may be harder for non native English speaker to understand. But it's our role to provide donation so they can buy better camera/microphone as the courses are free :p

  • @ronytesler
    @ronytesler 2 года назад

    If the timestamp is part of the message, then why does it matter if "you connect on the minute boundary"? (1:08:32)

  • @monishanazare1269
    @monishanazare1269 4 года назад

    For Notes on Network Security, please visit the link below :
    monishanazare.wixsite.com/lastminutenotes/post/network-security-key-concepts

  • @SyedAli-qz1cp
    @SyedAli-qz1cp 4 года назад

    How could Newton considered that gravity is actually nothing but the curvature of the space when he “discover” gravity? How Graham Bell could possibly know that wireless communication is possible as well? How could Edison consider the possibility of energy saving light bulbs? How could the engineers of ENIAC possibly know smart phones? How could Wright brothers come up with the design of 787? In the same way how can we predict and design future technology now unless we go through years of research.

  • @bcoda
    @bcoda 6 лет назад +1

    "TCP protocol"
    Like an ATM machine?

  • @angel2703504
    @angel2703504 4 года назад

    what paper is he talking about?

  • @ronytesler
    @ronytesler 2 года назад

    When he talks about packets get confused between connections, he only talks about packets from the server to the client, right?

  • @kaja9917
    @kaja9917 6 лет назад +39

    14.46 me in high school

    • @hashim_iraq
      @hashim_iraq 3 года назад

      😂😂😂😂😂😂😂

  • @Zap12348
    @Zap12348 4 года назад +4

    14:46, 52:20 , 52:34

  • @hormarinaftaada539
    @hormarinaftaada539 6 лет назад +2

    i subscrabed you because you deserve it . thanks

  • @swapnilshingote8773
    @swapnilshingote8773 4 года назад +1

    14:51 Me in High School...Raised the Hand but thank god Sir didnt saw and I just pretend it never happened in first place.........and rest is history ..........

  • @AmitSingh-gv6rt
    @AmitSingh-gv6rt 4 года назад

    I had done my bachelor in electrical engineering stream can I choose the network and Internet security analysis course for further studies because I am too much interested it is possible or not?

    • @gangipellisrikanth5410
      @gangipellisrikanth5410 4 года назад

      i have same doubt too, what is the progress?

    • @waqasmahmood_uk
      @waqasmahmood_uk 4 года назад

      Computer systems were invented by Electrical engineers. In fact, earlier universities used to offer Computer science only to Electrical engineers. Anyone should be able to take up Networks and Security who has an interest in it.

  • @Rookiemi
    @Rookiemi 7 лет назад +2

    please either ask the management to fix the squeaky noise on the door when used or use a different lecture room.

    • @stoicc6510
      @stoicc6510 7 лет назад +2

      This was from 3 years ago. I hope it's fixed by now!

  • @MrTigerstyle80
    @MrTigerstyle80 5 лет назад +2

    Sucks that none of the students will let the prof finish his thought. They’re college kids so I can’t be too upset. Also they’re subsidizing my free education on TCP/IP. It’s still annoying though.

    • @philippederome2434
      @philippederome2434 5 лет назад

      The prof can instruct the class to be more patient and hold their thoughts; if he is ok with that it is because he is fine with it in all likelihood.

    • @philippederome2434
      @philippederome2434 5 лет назад

      it is a graduate course btw. So the students are not so young.

  • @ryanchiang9587
    @ryanchiang9587 3 года назад +1

    國家?女人? 國事為重!

  • @amitvasistha8001
    @amitvasistha8001 6 лет назад +1

    for heavens sake slow down sir
    you are running !!

  • @24reyeser
    @24reyeser 5 лет назад

    Professor is kind of annoying