ไม่สามารถเล่นวิดีโอนี้
ขออภัยในความไม่สะดวก

12. Network Security

แชร์
ฝัง
  • เผยแพร่เมื่อ 29 มี.ค. 2017
  • MIT 6.858 Computer Systems Security, Fall 2014
    View the complete course: ocw.mit.edu/6-8...
    Instructor: Nickolai Zeldovich
    In this lecture, Professor Zeldovich discusses network security, and how TCP/IP has evolved.
    License: Creative Commons BY-NC-SA
    More information at ocw.mit.edu/terms
    More courses at ocw.mit.edu

ความคิดเห็น • 34

  • @dooboodot
    @dooboodot 2 ปีที่แล้ว +7

    He seems to be so glad on students asking questions! Great teacher.

  • @twitter47
    @twitter47 หลายเดือนก่อน

    very informative .Thanks to MIT OpenCourse.

  • @Zap12348
    @Zap12348 4 ปีที่แล้ว +4

    14:46, 52:20 , 52:34

  • @TheLollisoft
    @TheLollisoft 7 ปีที่แล้ว +8

    Interesting stuff. The audio quality is neglectable given the in-depth content's information :-) I was able to follow the complete video.

    • @beuman0
      @beuman0 5 ปีที่แล้ว

      It may be harder for non native English speaker to understand. But it's our role to provide donation so they can buy better camera/microphone as the courses are free :p

  • @AmitSingh-gv6rt
    @AmitSingh-gv6rt 5 ปีที่แล้ว +3

    I had done bachelor in electrical engineering can I opt the course of network and Internet security analysis for further studies because I am too much interested?

  • @bpgpw
    @bpgpw 5 ปีที่แล้ว +3

    After he said that port is kind of below sequence number, it all makes sense for me.
    btw, i love the explanation, so depth and clear.

  • @frankorbis7474
    @frankorbis7474 6 ปีที่แล้ว +1

    So if A: C->S ACK(SNs) would be changed with an insert to A: C->S NACK(SNs)
    Would A: C->S NACK(SNs) what should be A: C->S ACK(SNs) not produce a loop?
    Then why not use a total length and total CRC32 to prevent that a packet gets in-
    serted like B = 1 Byte indicate Start [Filename what comes first + Pkt number] +
    Total CRC32] so [B][FName][PKT Number][CRC32] in case you have a B to
    start, we know followed by the File name how many packet numbers there will be
    for Filename based on the file length, protected by an total CRC32 over the complete
    File and send packets like [PKT][PKT number][CRC32] - next then it will hard to insert
    another PKT is that not correct?

  • @ronytesler
    @ronytesler 2 ปีที่แล้ว

    If the timestamp is part of the message, then why does it matter if "you connect on the minute boundary"? (1:08:32)

  • @SyedAli-qz1cp
    @SyedAli-qz1cp 4 ปีที่แล้ว

    How could Newton considered that gravity is actually nothing but the curvature of the space when he “discover” gravity? How Graham Bell could possibly know that wireless communication is possible as well? How could Edison consider the possibility of energy saving light bulbs? How could the engineers of ENIAC possibly know smart phones? How could Wright brothers come up with the design of 787? In the same way how can we predict and design future technology now unless we go through years of research.

  • @kaja9917
    @kaja9917 6 ปีที่แล้ว +39

    14.46 me in high school

    • @hashim_iraq
      @hashim_iraq 3 ปีที่แล้ว

      😂😂😂😂😂😂😂

  • @elinelindazagovawintersong708
    @elinelindazagovawintersong708 5 ปีที่แล้ว +2

    Thank you)

  • @ronytesler
    @ronytesler 2 ปีที่แล้ว

    When he talks about packets get confused between connections, he only talks about packets from the server to the client, right?

  • @SinghGlobeTrotting
    @SinghGlobeTrotting 6 ปีที่แล้ว +1

    Great explanation!!!

  • @swapnilshingote8773
    @swapnilshingote8773 4 ปีที่แล้ว +1

    14:51 Me in High School...Raised the Hand but thank god Sir didnt saw and I just pretend it never happened in first place.........and rest is history ..........

  • @bcoda
    @bcoda 6 ปีที่แล้ว +1

    "TCP protocol"
    Like an ATM machine?

  • @angel2703504
    @angel2703504 4 ปีที่แล้ว

    what paper is he talking about?

  • @hormarinaftaada539
    @hormarinaftaada539 6 ปีที่แล้ว +2

    i subscrabed you because you deserve it . thanks

  • @AmitSingh-gv6rt
    @AmitSingh-gv6rt 5 ปีที่แล้ว

    I had done my bachelor in electrical engineering stream can I choose the network and Internet security analysis course for further studies because I am too much interested it is possible or not?

    • @gangipellisrikanth5410
      @gangipellisrikanth5410 4 ปีที่แล้ว

      i have same doubt too, what is the progress?

    • @waqasmahmood_uk
      @waqasmahmood_uk 4 ปีที่แล้ว

      Computer systems were invented by Electrical engineers. In fact, earlier universities used to offer Computer science only to Electrical engineers. Anyone should be able to take up Networks and Security who has an interest in it.

  • @Rookiemi
    @Rookiemi 7 ปีที่แล้ว +2

    please either ask the management to fix the squeaky noise on the door when used or use a different lecture room.

    • @stoicc6510
      @stoicc6510 7 ปีที่แล้ว +2

      This was from 3 years ago. I hope it's fixed by now!

  • @MrTigerstyle80
    @MrTigerstyle80 5 ปีที่แล้ว +2

    Sucks that none of the students will let the prof finish his thought. They’re college kids so I can’t be too upset. Also they’re subsidizing my free education on TCP/IP. It’s still annoying though.

    • @philippederome2434
      @philippederome2434 5 ปีที่แล้ว

      The prof can instruct the class to be more patient and hold their thoughts; if he is ok with that it is because he is fine with it in all likelihood.

    • @philippederome2434
      @philippederome2434 5 ปีที่แล้ว

      it is a graduate course btw. So the students are not so young.

  • @monishanazare1269
    @monishanazare1269 4 ปีที่แล้ว

    For Notes on Network Security, please visit the link below :
    monishanazare.wixsite.com/lastminutenotes/post/network-security-key-concepts

  • @ryanchiang9587
    @ryanchiang9587 3 ปีที่แล้ว +1

    國家?女人? 國事為重!

  • @amitvasistha8001
    @amitvasistha8001 6 ปีที่แล้ว +1

    for heavens sake slow down sir
    you are running !!

  • @24reyeser
    @24reyeser 5 ปีที่แล้ว

    Professor is kind of annoying