12. Network Security

preview_player
Показать описание
MIT 6.858 Computer Systems Security, Fall 2014
Instructor: Nickolai Zeldovich

In this lecture, Professor Zeldovich discusses network security, and how TCP/IP has evolved.

License: Creative Commons BY-NC-SA
Рекомендации по теме
Комментарии
Автор

He seems to be so glad on students asking questions! Great teacher.

dooboodot
Автор

If the timestamp is part of the message, then why does it matter if "you connect on the minute boundary"? (1:08:32)

ronytesler
Автор

After he said that port is kind of below sequence number, it all makes sense for me.
btw, i love the explanation, so depth and clear.

bpgpw
Автор

How could Newton considered that gravity is actually nothing but the curvature of the space when he “discover” gravity? How Graham Bell could possibly know that wireless communication is possible as well? How could Edison consider the possibility of energy saving light bulbs? How could the engineers of ENIAC possibly know smart phones? How could Wright brothers come up with the design of 787? In the same way how can we predict and design future technology now unless we go through years of research.

SyedAli-qzcp
Автор

I had done bachelor in electrical engineering can I opt the course of network and Internet security analysis for further studies because I am too much interested?

AmitSingh-gvrt
Автор

Interesting stuff. The audio quality is neglectable given the in-depth content's information :-) I was able to follow the complete video.

TheLollisoft
Автор

So if A: C->S ACK(SNs) would be changed with an insert to A: C->S NACK(SNs)
Would A: C->S NACK(SNs) what should be A: C->S ACK(SNs) not produce a loop?
Then why not use a total length and total CRC32 to prevent that a packet gets in-
serted like B = 1 Byte indicate Start [Filename what comes first + Pkt number] +
Total CRC32] so [B][FName][PKT Number][CRC32] in case you have a B to
start, we know followed by the File name how many packet numbers there will be
for Filename based on the file length, protected by an total CRC32 over the complete
File and send packets like [PKT][PKT number][CRC32] - next then it will hard to insert
another PKT is that not correct?

frankorbis
Автор

When he talks about packets get confused between connections, he only talks about packets from the server to the client, right?

ronytesler
Автор

14:51 Me in High School...Raised the Hand but thank god Sir didnt saw and I just pretend it never happened in first rest is history

swapnilshingote
Автор

"TCP protocol"
Like an ATM machine?

bcoda
Автор

please either ask the management to fix the squeaky noise on the door when used or use a different lecture room.

Rookiemi
Автор

I had done my bachelor in electrical engineering stream can I choose the network and Internet security analysis course for further studies because I am too much interested it is possible or not?

AmitSingh-gvrt
Автор

Sucks that none of the students will let the prof finish his thought. They’re college kids so I can’t be too upset. Also they’re subsidizing my free education on TCP/IP. It’s still annoying though.

MrTigerstyle
Автор

For Notes on Network Security, please visit the link below :

monishanazare
Автор

i subscrabed you because you deserve it . thanks

hormarinaftaada
Автор

for heavens sake slow down sir
you are running !!

amitvasistha