EEC 688/788 Secure and Dependable Computing Lecture 1 Wenbing Zhao Department of Electrical Engineering and Computer Science Cleveland State University.

Slides:



Advertisements
Similar presentations
: Distributed Systems Dr. Rajkumar Buyya Senior Lecturer and Director of MEDC Course Grid Computing and Distributed Systems (GRIDS) Laboratory Dept.
Advertisements

EEC-484/584 Computer Networks Lecture 1 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 1 Wenbing Zhao Cleveland State University
EEC-484/584 Computer Networks Lecture 1 Wenbing Zhao (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall)
EEC-681/781 Distributed Computing Systems Lecture 1 Wenbing Zhao Cleveland State University
EEC-484/584 Computer Networks Lecture 1 Wenbing Zhao Cleveland State University
EEC-681/781 Distributed Computing Systems Lecture 1 Wenbing Zhao Cleveland State University
Course Syllabus  Instructor: Hsung-Pin Chang  TA: 林郁傑  Web Site:
EEC-484/584 Computer Networks Lecture 1 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
EEC-484/584 Computer Networks Lecture 1 Wenbing Zhao
EEC-584 Computer Networks Lecture 1 Wenbing Zhao (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall)
COMP 111 Programming Languages 1 First Day. Course COMP111 Dr. Abdul-Hameed Assawadi Office: Room AS15 – No. 2 Tel: Ext. ??
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Network Security CS nd Term Course Syllabus Cairo University Faculty of Computers and Information.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Introduction to Operating Systems J. H. Wang Sep. 18, 2015.
Welcome! CSI 4118: Computer Networks and Protocols (3,0,0) Professor: Dr. Robert L. Probert Office: SITE 5098 Phone: x6709
Introduction to Operating Systems J. H. Wang Sep. 15, 2010.
CS-495 Distributed Systems Fabián E. Bustamante, Winter 2004 Welcome to Distributed Systems.
Lecture 1N. Kandasamy1/14/2008 ECEC : Dependable Computing Systems N. Kandasamy 603 Bossone, ECE Department Lecture: Monday,
 Course Overview Distributed Systems IT332. Course Description  The course introduces the main principles underlying distributed systems: processes,
Introduction to Information Security J. H. Wang Sep. 18, 2012.
CS151 Introduction to Digital Design Noura Alhakbani Prince Sultan University, College for Women.
CEN 137 Computer Literature and Skills INTERNATIONAL BURCH UNIVERSITY DEPARTMENT of INFORMATION TECHNOLOGIES Dr. A. Turan Özcerit
1 NES554: Computer Networks Defense Course Overview.
Operating Systems (CS 340 D) Dr. Abeer Mahmoud Princess Nora University Faculty of Computer & Information Systems Computer science Department.
EEC 688/788 Secure and Dependable Computing Lecture 1 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Computer Network Fundamentals CNT4007C
CSE 489/589 Modern Networking Concepts
Introduction to Operating Systems
Course Overview - Database Systems
CS 450/550 Operating Systems Loc & Time: MW 1:40pm-4:20pm, 101 ENG
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
CPE741: Distributed Systems Course Introduction
Computer Networks CNT5106C
CNT 4704 Computer Communication Networking (not “analysis”)
CPE741: Distributed Systems Course Introduction
Data & Network Security
Course Information Mark Stanovich Principles of Operating Systems
CPE741: Distributed Systems Course Introduction
CIS 470 Mobile App Development
Information Systems Security Winter
Computer Networks CNT5106C
Course Overview - Database Systems
EEC 688/788 Secure and Dependable Computing
Andy Wang Operating Systems COP 4610 / CGS 5765
Introduction to the course
Lecture 1: Introduction
Organizational Issues
Andy Wang Operating Systems COP 4610 / CGS 5765
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 1 Wenbing Zhao Department of Electrical and Computer Engineering.
IS 651: Distributed Systems
EEC 688/788 Secure and Dependable Computing
Course Information EECS 2031 Fall 2016.
Organizational Issues
ECE 103 Engineering Programming Chapter 1 Introduction
EEC-492/693/793 iPhone Application Development
Analysis of Algorithms
Computer Networks CNT5106C
Sarah Diesburg Operating Systems CS 3430
Computer Engineering Department Islamic University of Gaza
CS2013 LECTURE 1 John Hurley Cal State LA.
Presentation transcript:

EEC 688/788 Secure and Dependable Computing Lecture 1 Wenbing Zhao Department of Electrical Engineering and Computer Science Cleveland State University

11/21/2016 Wenbing Zhao Outline Motivation Syllabus EEC688/788 Secure and Dependable Computing

11/21/2016 Wenbing Zhao Motivation Why secure and dependable computing is important?*  Increased reliance on software to optimize everything from business processes to engine fuel economy  Relentlessly growing scale and complexity of systems and systems-of-systems  Near-universal reliance on a commodity technology base that is not specifically designed for dependability  Growing stress on legacy architectures (both hardware and software) due to ever-increasing performance demands  Worldwide interconnectivity of systems  Continual threats of malicious attacks on critical systems *Taken from “A high dependability computing consortium”, James H. Morris, CMU, EEC688/788 Secure and Dependable Computing

11/21/2016 Wenbing Zhao More Motivation The cost of poor software is very high  Annual cost to US economy of poor quality software: $60B  source: US NIST Report , May Industry needs greater dependability and security  Improved quality of products  Improved quality of development processes  Better system and network security, to avoid: viruses, trojans, denial of service,... network penetration, loss of confidential data,... Improved customer satisfaction EEC688/788 Secure and Dependable Computing

11/21/2016 Wenbing Zhao Industry is Embracing Secure and Dependable Computing The hardware platforms are changing:  Smartcards  Pervasive computing / embedded systems IBM, Sun “autonomic computing” Major PC dependability and security initiatives under way:  Trusted Computing Group Promoters: Intel, HP, Compaq, IBM, Microsoft  Microsoft’s trustworthy computing push  Intel’s LaGrande dependable hardware EEC688/788 Secure and Dependable Computing

11/21/2016 Wenbing Zhao The Cost of Downtime From “Assessing the Financial Impact of Downtime” by Vision Solutions, Inc ( 20Impact%20of%20Downtime.pdf ) 20Impact%20of%20Downtime.pdf Typical hourly cost of downtime by Industry  Brokerage Service: $6,480,000  Energy: $2,800,000  Telecom: $2,000,000  Manufacturing: $1,600,000  Retail: $1,100,000  Healthcare: $636,000  Media: $90,000

11/21/2016 Wenbing Zhao Course Objectives Have solid understanding of the basic concepts and theory of secure and dependable computing Getting familiar with some basic building blocks (tools and APIs) needed to build secure and dependable systems No attempt to be comprehensive: topics covered are what I am interested in and what I think important EEC688/788 Secure and Dependable Computing

11/21/2016 Wenbing Zhao Prerequisite Operating system principles  Processes, scheduling, file systems, etc. Java programming language  At least you should know how to write a Hello World program  You don’t have to be a Java expert Computer networks  TCP, UDP, IP, Ethernet, etc. EEC688/788 Secure and Dependable Computing

11/21/2016 Wenbing Zhao Outline of Lectures Dependability concepts Introduction to computer and network security  Cryptography, Secure communication, Intrusion detection and prevention Dependability techniques  Logging & checkpointing  Recovery-oriented computing  Replication  Group communication systems  Consensus and Paxos  Byzantine fault tolerance EEC688/788 Secure and Dependable Computing

11/21/2016 Wenbing Zhao Outline of Labs Lab 0 – Getting familiar with Linux Lab 1 – Secure shell Lab 2 – Secure computing in Java Lab 3 – Traffic analysis and intrusion detection Lab 4 – Group communication with Spread toolkit EEC688/788 Secure and Dependable Computing

11/21/2016 Wenbing Zhao Course Projects Write a short survey paper on a particular topic and make a presentation. The topic must be approved by the instructor. Must be done individually. The project is expected to survey 5-10 research papers, among them at least 2 must be published within 5 years. EEC688/788 Secure and Dependable Computing

11/21/2016 Wenbing Zhao Exam One midterm on security One final exam on fault tolerance Exams are closed book and closed notes, except that you are allowed to bring with you a one-page cheat sheet no larger than the US letter size (double-sided allowed) There is no makeup exam! EEC688/788 Secure and Dependable Computing

11/21/2016 Wenbing Zhao Grading Policy Class participation (10%) Lab reports (10%) Project (20%) Exams (60%) EEC688/788 Secure and Dependable Computing

11/21/2016 Wenbing Zhao Grading Policy A: % A-: 85-89% B+: 80-84% B: 75-79% B-: 70-74% C+: 65-69% C: 60-64% F: <60% EEC688/788 Secure and Dependable Computing

11/21/2016 Wenbing Zhao Class Participation 10% of the course credit In general, there is a mock quiz in the beginning of each lecture, so that  I know who is here & I get feedback for my teaching To obtain the full credit for class participation, you must satisfy ALL of the following conditions:  You do not miss more than 2 lectures  You do not miss any exam and lab sessions You will lose all 10% credit if you miss more than 6 lectures/labs/presentations EEC688/788 Secure and Dependable Computing

11/21/2016 Wenbing Zhao Do not cheat! Do not copy other student ’ s lab report, exams or projects Do not copy someone else ’ s work found on the Internet  Including project implementation and report  You can quote a sentence or two, but put those in quote and give reference  You can build your projects on top of open source libraries, but again, you should explicitly give acknowledgement and state clearly which parts are implemented by you EEC688/788 Secure and Dependable Computing

11/21/2016 Wenbing Zhao Consequences for Cheating You get 0 credit for the project/lab/exam that you have cheated If the task is worth 25% or more of the course, it is considered a major infraction Otherwise, it is considered a minor infraction For major infraction and repeated minor infractions  You will get an F grade, and  You may be suspended or repulsed from CSU CSU Code of Conduct  EEC688/788 Secure and Dependable Computing

11/21/2016 Wenbing Zhao Reference Texts Building Dependable Distributed Systems, by Wenbing Zhao, Wiley-Scrivener, March 2014 Security in Computing (4th Edition), by Charles P. Pfleeger, Shari Lawrence Pfleeger, Prentice Hall, 2006 Replication: Theory and Practice, Editted by by Bernadette Charron-Bost, Fernando Pedone, Andre Schiper, Springer, 2010 Computer Networks (4th Edition), by Andrew S. Tanenbaum, Prentice Hall, 2003 Cryptography and Network Security: Principles and Practices (3rd Edition), by William Stallings, Prentice Hall, 2003 SSH, the Secure Shell (2nd Edition), by Daniel J. Barrett, Robert G. Byrnes, Richard E. Silverman, O'Reilly, 2005 EEC688/788 Secure and Dependable Computing

11/21/2016 Wenbing Zhao Reference Texts Reliable Computer Systems: Design and Evaluation (3rd Edition), by Daniel P. Siewiorek and Robert S. Swarz, A K Peters, 1998 Distributed Systems: Principles and Paradigms, by Andrew S. Tanenbaum, and Maarten van Steen, Prentice Hall, 2002 Reliable Distributed Systems: Technologies, Web Services, and Applications, by Kenneth P. Birman, Springer, 2005 Network Intrusion Detection (3rd Edition), by Stephen Northcutt, Judy Novak, New Riders Publishing, 2002 EEC688/788 Secure and Dependable Computing

11/21/2016 Wenbing Zhao Instructor Information Instructor: Dr. Wenbing Zhao   Lecture hours: TTh 2:00-4:00  Office hours: TTh noon-2pm & by appointment Course Web site:  EEC688/788 Secure and Dependable Computing