12. Network Security

Sdílet
Vložit
  • čas přidán 29. 03. 2017
  • MIT 6.858 Computer Systems Security, Fall 2014
    View the complete course: ocw.mit.edu/6-858F14
    Instructor: Nickolai Zeldovich
    In this lecture, Professor Zeldovich discusses network security, and how TCP/IP has evolved.
    License: Creative Commons BY-NC-SA
    More information at ocw.mit.edu/terms
    More courses at ocw.mit.edu

Komentáře • 33

  • @dooboodot
    @dooboodot Před 2 lety +7

    He seems to be so glad on students asking questions! Great teacher.

  • @AmitSingh-gv6rt
    @AmitSingh-gv6rt Před 4 lety +3

    I had done bachelor in electrical engineering can I opt the course of network and Internet security analysis for further studies because I am too much interested?

  • @bpgpw
    @bpgpw Před 5 lety +3

    After he said that port is kind of below sequence number, it all makes sense for me.
    btw, i love the explanation, so depth and clear.

  • @frankorbis7474
    @frankorbis7474 Před 6 lety +1

    So if A: C->S ACK(SNs) would be changed with an insert to A: C->S NACK(SNs)
    Would A: C->S NACK(SNs) what should be A: C->S ACK(SNs) not produce a loop?
    Then why not use a total length and total CRC32 to prevent that a packet gets in-
    serted like B = 1 Byte indicate Start [Filename what comes first + Pkt number] +
    Total CRC32] so [B][FName][PKT Number][CRC32] in case you have a B to
    start, we know followed by the File name how many packet numbers there will be
    for Filename based on the file length, protected by an total CRC32 over the complete
    File and send packets like [PKT][PKT number][CRC32] - next then it will hard to insert
    another PKT is that not correct?

  • @TheLollisoft
    @TheLollisoft Před 7 lety +8

    Interesting stuff. The audio quality is neglectable given the in-depth content's information :-) I was able to follow the complete video.

    • @beuman0
      @beuman0 Před 5 lety

      It may be harder for non native English speaker to understand. But it's our role to provide donation so they can buy better camera/microphone as the courses are free :p

  • @ronytesler
    @ronytesler Před 2 lety

    If the timestamp is part of the message, then why does it matter if "you connect on the minute boundary"? (1:08:32)

  • @elinelindazagovawintersong708

    Thank you)

  • @aij457
    @aij457 Před 3 lety +4

    14:46, 52:20 , 52:34

  • @angel2703504
    @angel2703504 Před 4 lety

    what paper is he talking about?

  • @SinghGlobeTrotting
    @SinghGlobeTrotting Před 6 lety +1

    Great explanation!!!

  • @ronytesler
    @ronytesler Před 2 lety

    When he talks about packets get confused between connections, he only talks about packets from the server to the client, right?

  • @bcoda
    @bcoda Před 6 lety +1

    "TCP protocol"
    Like an ATM machine?

  • @SyedAli-qz1cp
    @SyedAli-qz1cp Před 4 lety

    How could Newton considered that gravity is actually nothing but the curvature of the space when he “discover” gravity? How Graham Bell could possibly know that wireless communication is possible as well? How could Edison consider the possibility of energy saving light bulbs? How could the engineers of ENIAC possibly know smart phones? How could Wright brothers come up with the design of 787? In the same way how can we predict and design future technology now unless we go through years of research.

  • @hormarinaftaada539
    @hormarinaftaada539 Před 6 lety +2

    i subscrabed you because you deserve it . thanks

  • @kaja9917
    @kaja9917 Před 6 lety +39

    14.46 me in high school

  • @swapnilshingote8773
    @swapnilshingote8773 Před 3 lety +1

    14:51 Me in High School...Raised the Hand but thank god Sir didnt saw and I just pretend it never happened in first place.........and rest is history ..........

  • @AmitSingh-gv6rt
    @AmitSingh-gv6rt Před 4 lety

    I had done my bachelor in electrical engineering stream can I choose the network and Internet security analysis course for further studies because I am too much interested it is possible or not?

    • @gangipellisrikanth5410
      @gangipellisrikanth5410 Před 4 lety

      i have same doubt too, what is the progress?

    • @waqasmahmood_uk
      @waqasmahmood_uk Před 4 lety

      Computer systems were invented by Electrical engineers. In fact, earlier universities used to offer Computer science only to Electrical engineers. Anyone should be able to take up Networks and Security who has an interest in it.

  • @monishanazare1269
    @monishanazare1269 Před 3 lety

    For Notes on Network Security, please visit the link below :
    monishanazare.wixsite.com/lastminutenotes/post/network-security-key-concepts

  • @MSA71260
    @MSA71260 Před 7 lety +2

    please either ask the management to fix the squeaky noise on the door when used or use a different lecture room.

    • @stoicc6510
      @stoicc6510 Před 7 lety +2

      This was from 3 years ago. I hope it's fixed by now!

  • @MrTigerstyle80
    @MrTigerstyle80 Před 5 lety +2

    Sucks that none of the students will let the prof finish his thought. They’re college kids so I can’t be too upset. Also they’re subsidizing my free education on TCP/IP. It’s still annoying though.

    • @philippederome2434
      @philippederome2434 Před 4 lety

      The prof can instruct the class to be more patient and hold their thoughts; if he is ok with that it is because he is fine with it in all likelihood.

    • @philippederome2434
      @philippederome2434 Před 4 lety

      it is a graduate course btw. So the students are not so young.

  • @ryanchiang9587
    @ryanchiang9587 Před 2 lety +1

    國家?女人? 國事為重!

  • @amitvasistha8001
    @amitvasistha8001 Před 6 lety +1

    for heavens sake slow down sir
    you are running !!

  • @24reyeser
    @24reyeser Před 5 lety

    Professor is kind of annoying