Build your own Internet Challenge - Royal Holloway, University of
Download
Report
Transcript Build your own Internet Challenge - Royal Holloway, University of
CompSci and InfoSec
Build your own Internet
22.10.13
Pierre-Malo Deniélou, Lorenzo Cavallaro, Dave Cohen
Challenge overview
The Internet and its security: where
computational thinking affects lives
Resilient: No link is essential. The
A reliable world-wide fast network:
transforming the modern world
Secure: We can prevent unwanted
Secure and Safe: what would happen if
this Network were to collapse?
Reliable: We can be certain that every
The Internet:
A network of
communicators
Internet routes around breakages
eavesdropping
message gets through
Flexible: One protocol that can contain
any payload package
Scalable−Seamlessly add/remove
nodes
It’s the Algorithms that make it Tick
2
Curriculum links
This STEM challenge will support the
new Computing Curriculum
Aims for the newly published
Computing Curriculum
Algorithmic thinking
Can understand and apply fundamental
Exciting programming tasks
An understanding of the Internet and
networks in general
principles of computer science
Can analyse problems in computational
terms, and have experience of writing
programs
An understanding of security
vulnerabilities and attacks
Can evaluate and apply IT analytically
Each topic will be studied with a variety
of learning methods: role play, individual
research, programming and maths
challenges, competition etc.,
Are responsible, competent, confident
3
to solve problems
and creative users of ICT
We Tick the Boxes
Examples of activities
Routing past problems (the RIP
algorithm):
Self-organising networks protect the
independence of the Internet
Fix it (Error Correcting Codes):
Keeping data coherent across
unreliable channels has allowed
space exploration, CDs, cheap
memory, allowing computational
power into almost all human spheres
What’s in a name? (Domain
Name Service):
Makes the Internet available to people
and allows communication between
individuals
Public key cryptosystems (RSA):
Simple data encryption and signing
gives confidence in transactions. This
enabled online shopping!
How the Internet speaks
(TCP/IP):
4
Overcoming inherent limits of
technology with simple techniques
and algorithms
The Team
Professor Dave Cohen
• Researcher in Artificial Intelligence with 100+
published papers.
• He teaches Robotics and Software Engineering at
Royal Holloway
• He has been awarded two University Teaching
Excellence awards
• Shortlisted (this year) for the Times Higher Most
Innovative Teacher of the Year award
• Dave has 20 years of industrial experience working
as a programmer
5
The Team (cont.)
Dr Pierre-Malo Deniélou
• Lecturer in Computer Science
• He teaches Object-Oriented Programming at
Royal Holloway
• He is interested in (and very good at)
programming language-based security, formal
methods and concurrency
• He is very involved in teaching Computing at
all levels and has co-written Labby, a tool to
learn programming for all ages
6
The Team (cont.)
Dr Lorenzo Cavallaro
• Lecturer of Information Security in the
Information Security Group
• He teaches Software Security at Royal Holloway
• He has recently taught a MOOC course on Coursera
“Malicious Software and its Underground Economy:
Two-Sides to Every Story” (60,000+ enrolled students)
• He has published in top and well-known venues
• Lorenzo is also exploring Android security research
(see http://copperdroid.isg.rhul.ac.uk)
7