Build your own Internet Challenge - Royal Holloway, University of

Download Report

Transcript Build your own Internet Challenge - Royal Holloway, University of

CompSci and InfoSec
Build your own Internet
22.10.13
Pierre-Malo Deniélou, Lorenzo Cavallaro, Dave Cohen
Challenge overview
The Internet and its security: where
computational thinking affects lives
 Resilient: No link is essential. The
A reliable world-wide fast network:
transforming the modern world
 Secure: We can prevent unwanted
Secure and Safe: what would happen if
this Network were to collapse?
 Reliable: We can be certain that every
The Internet:
A network of
communicators
Internet routes around breakages
eavesdropping
message gets through
 Flexible: One protocol that can contain
any payload package
 Scalable−Seamlessly add/remove
nodes
It’s the Algorithms that make it Tick
2
Curriculum links
This STEM challenge will support the
new Computing Curriculum
Aims for the newly published
Computing Curriculum
 Algorithmic thinking
 Can understand and apply fundamental
 Exciting programming tasks
 An understanding of the Internet and
networks in general
principles of computer science
 Can analyse problems in computational
terms, and have experience of writing
programs
 An understanding of security
vulnerabilities and attacks
 Can evaluate and apply IT analytically
Each topic will be studied with a variety
of learning methods: role play, individual
research, programming and maths
challenges, competition etc.,
 Are responsible, competent, confident
3
to solve problems
and creative users of ICT
We Tick the Boxes
Examples of activities
 Routing past problems (the RIP
algorithm):
Self-organising networks protect the
independence of the Internet
 Fix it (Error Correcting Codes):
Keeping data coherent across
unreliable channels has allowed
space exploration, CDs, cheap
memory, allowing computational
power into almost all human spheres
 What’s in a name? (Domain
Name Service):
Makes the Internet available to people
and allows communication between
individuals
 Public key cryptosystems (RSA):
Simple data encryption and signing
gives confidence in transactions. This
enabled online shopping!
 How the Internet speaks
(TCP/IP):
4
Overcoming inherent limits of
technology with simple techniques
and algorithms
The Team
Professor Dave Cohen
• Researcher in Artificial Intelligence with 100+
published papers.
• He teaches Robotics and Software Engineering at
Royal Holloway
• He has been awarded two University Teaching
Excellence awards
• Shortlisted (this year) for the Times Higher Most
Innovative Teacher of the Year award
• Dave has 20 years of industrial experience working
as a programmer
5
The Team (cont.)
Dr Pierre-Malo Deniélou
• Lecturer in Computer Science
• He teaches Object-Oriented Programming at
Royal Holloway
• He is interested in (and very good at)
programming language-based security, formal
methods and concurrency
• He is very involved in teaching Computing at
all levels and has co-written Labby, a tool to
learn programming for all ages
6
The Team (cont.)
Dr Lorenzo Cavallaro
• Lecturer of Information Security in the
Information Security Group
• He teaches Software Security at Royal Holloway
• He has recently taught a MOOC course on Coursera
“Malicious Software and its Underground Economy:
Two-Sides to Every Story” (60,000+ enrolled students)
• He has published in top and well-known venues
• Lorenzo is also exploring Android security research
(see http://copperdroid.isg.rhul.ac.uk)
7