ITIS 6200/8200: HCIP 6200 Principles of Information Security and Privacy Dr. Weichao Wang.

Slides:



Advertisements
Similar presentations
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Advertisements

ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Social Networking Services and User Data Protection
Security+ Guide to Network Security Fundamentals
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
ITIS 6167/8167: Network and Information Security Weichao Wang.
ITIS 6200/8200: Principles of Information Security and Privacy Dr. Weichao Wang.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
INFORMATION SECURITY UPDATE Al Arboleda Chief Information Security Officer.
Network security policy: best practices
CAP6135: Malware and Software Vulnerability Analysis Examples of Term Projects Cliff Zou Spring 2012.
Securing Information Systems
Staying Safe Online Keep your Information Secure.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Session 7 LBSC 690 Information Technology Security.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Topic 5: Basic Security.
Cybersecurity Test Review Introduction to Digital Technology.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
UNIT V Security Management of Information Technology.
Proactive Incident Response
Security Issues in Information Technology
Securing Information Systems
Key management issues in PGP
Creating your online identity
CSCE 548 Student Presentation By Manasa Suthram
Malware and Computer Maintenance
Working at a Small-to-Medium Business or ISP – Chapter 8
Design for Security Pepper.
VANET.
Network Security Fundamentals
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Network Security Analysis Name : Waleed Al-Rumaih ID :
Information Security.
EN Lecture Notes Spring 2016
Wireless Network Security
Network security threats
Virtual Private Networks
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Information and Network Security
Security of a Local Area Network
Securing Information Systems
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Today’s Risk. Today’s Solutions. Cyber security and
COMPUTER PRIVACY.
Cloud Testing Shilpi Chugh.
Risk of the Internet At Home
CS4622 Team 4 Worms, DoS, and Smurf Attacks
Cyber Security Experts
امنیت اطلاعات و ضرورت آن
Faculty of Science IT Department By Raz Dara MA.
Cyber Security Challenges
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Network Security Mark Creighton GBA 576 6/4/2019.
Protection Mechanisms in Security Management
Introduction to Internet Worm
6. Application Software Security
Week 7 - Wednesday CS363.
Cloud Computing for Wireless Networks
Presentation transcript:

ITIS 6200/8200: HCIP 6200 Principles of Information Security and Privacy Dr. Weichao Wang

Syllabus See handout Homework will usually have 4-5 questions and due in one week. It is due at the time that the class begins. Late homework, term paper, and project Within 24 hours: 50% of full score After that: 0% Project/term paper Individual effort Conduct some hands-on experiments Choose a security problem and write a survey paper A reference question list will be provided For PhD students Figure out a project that will help your thesis Midterm and final exam Misc: eating, drinking, and cell phone

What will be covered

Before class Are you really surprised when you learn the government is collecting our communication records? Several interesting questions Two companies each has some private data. They need to jointly calculate some result without disclosing their information. Secure multiparty computation Is this solution useful? Zero knowledge proof: Can I prove to you that I know a secret without telling you anything? (practically) Car key remote jammer

Compromise of user privacy Key logger through your typing sounds Copy of your physical key Recovery of voices through a bag of snack

Perfect Storm of Social Networks By March 2014, Facebook has 1.28 Billion active users each month. Twitter has 500 Million tweets per day. Human activities explain only 40% of the Internet traffic, the other 60%: Bots Bingbots and Googlebots explain a big portion of the traffic

Examples in real life Attack on Twitter Hack into the victim’s email account DDoS to paralyze Twitter, facebook, etc Data mining attacks on public database MyEdu.com Groupon, Google Offer, and Amazon Local Worm attack on smart grid Use social network to detect disease breakout Remotely control insulin pump of a patient

Security overview Risks Why there are risks Adversaries Smart and dedicated Many of them, considering the high unemployment rate Hiding in the dark From fun to profit (worm self-changing  botnet  target at specific systems)

Security overview Physical security is not enough (can you be sure that your physical security methods are sound and enough? Example in Las Vegas, supply chain attacks, ATM machine, hotel doors)

Security overview What can go wrong Trojan horse: USB keys Corrupted internal worker Vulnerabilities of protocols or security mechanisms (security patch has problems too) By-passing protection walls Backdoors for systems (Linux password) Known attacks ignored (push and poll)

Information security Encryption Authentication Authorization You can read the information only when you know the key Authentication You are who you claim you are Authorization The role and the right

Information security Information integrity Non-repudiation Privacy The data has never been changed or changed in an inappropriate way Non-repudiation Cannot deny your words (digital cash example) Privacy Who should know, how much, how to use the information Your cell phone or medical records RFID Traffic cameras in Minnesota

Security overview Defending methods Prevention Detection Prevent (password, salt, private salt, searching) Deter: raising the bar (password guessing, login slow) Deflect: making other target more attractive Diversify Detection Monitoring (who, what, and how) Intrusion detection (signature based, anomaly based) IP telephony track Authenticity of the evidence (digital media)

Security Overview Recovery Tolerance Recover data (check point) Identify the damage Forensics Confinement Tolerance Maintain a decent service quality Automatically degrade video quality while reserving bandwidth for voice