Introduction to Computer Security II

Slides:



Advertisements
Similar presentations
Chapter 1  Introduction 1 Chapter 1: Introduction.
Advertisements

1 Computer Engineering Department Islamic University of Gaza ECOM 5347 Network Security Undergraduate Course Fall Prof. Mohammad A. Mikki Room.
Security Systems Theory UG2 Module Introduction Themes 1. Top down design of security systems – security technologies as 'black boxes'. 2. Internal design.
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010.
Welcome to EECS 354 Network Penetration and Security.
MIS 4600 Ethical Hacking & Network Defense January 12, 2010 Abdou Illia, Ph.D
CIS700: Hardware Support for Security Professor Milo Martin
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
ECS15: Introduction to Computers Fall 2013 Patrice Koehl
EECS 354 Network Security Introduction. Why Learn To Hack Understanding how to break into computer systems allows you to better defend them Learn how.
G53SEC Computer Security Introduction to G53SEC 1.
1 CDA6938 Special Topic: Research in Computer and Network Security (spring’07) Class Overview.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Computer & Network Security
CSCE 727 Information Warfare
Network Security CS nd Term Course Syllabus Cairo University Faculty of Computers and Information.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
Introduction University of Sunderland CIT304 Harry R Erwin, PhD.
Introduction University of Sunderland CSEM02 Harry R Erwin, PhD Peter Dunne, PhD.
SKU3033 / SKF3033 NETWORK & SYSTEM ADMINISTRATOR.
CAP6135: Malware and Software Vulnerability Analysis Cliff Zou Spring 2010.
Chapter 1  Introduction 1 Chapter 1: Introduction.
1/19/2010Cyber Security Spring 2010 Introduction to Cyber Security Lab CS460 Susan Hinrichs Spring 2010.
CAP6135: Malware and Software Vulnerability Analysis Cliff Zou Spring 2013.
CIS 3360: Security in Computing Cliff Zou Spring 2012.
1 CAP6133: Advanced Topics in Computer Security and Computer Forensics (spring’08) Class Overview Dr. Cliff Zou.
King Saud UniversityCSC112 - First Semester CSC 112 Java Programming I Introduction.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
1 CDA 4527 Computer Communication Networking (not “analysis”) Prof. Cliff Zou School of Electrical Engineering and Computer Science University of Central.
King Saud University1 CSC 112 Java Programming I Introduction.
Bahasa Inggris 3 Arranged by Pikir Wisnu Wijayanto, M.Hum Aris Hermansyah, S.S. Prodi D3 Manajemen Informatika Fakultas Ilmu Terapan Universitas Telkom.
CAP6135: Malware and Software Vulnerability Analysis Cliff Zou Spring 2009.
Lecture 1 Page 1 CS 236 Online Introduction CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Network Security and Cryptography
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
@Yuan Xue CS 285 Network Security Fall 2013 Yuan Xue.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
Applied Security Breno de Medeiros Florida State University Spring 2007.
CS101 Computer Programming I
CDA6938/COT4932 Special Topic: Research in Computer and Network Security (spring’06) Class Overview.
CNT 4704 Computer Communication Networking (not “analysis”)
Purpose of Class To prepare students for research and advanced work in security topics To familiarize students working in other networking areas with important.
CNT 4704 Computer Communication Networking (not “analysis”)
CSE-C3400 Information security
CNT 4704 Computer Communication Networking (not “analysis”)
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
CIS 333Competitive Success/tutorialrank.com
SEC 420 StrCompetitive Success/tutorialrank.com
CIS 333 Education for Service-- tutorialrank.com.
CIS 333 RANK Education for Service-- cis333rank.com.
Information Systems Security Winter
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
IS4550 Security Policies and Implementation
EECE 310 Software Engineering
Introduction to Systems Security
CNT 4704 Analysis of Computer Communication Networks
CNT 4704 Analysis of Computer Communication Networks
Computer Engineering Department Islamic University of Gaza ECOM 5347
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
Welcome to Physics 5305!!.
T Information Security Technology
Welcome to Physics 5305!!.
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Introduction to Computer Security II January 2019 Introduction to Computer Security II COMP0055 Emiliano De Cristofaro

Welcome Format Assessment Office Hours 10x2h lectures per week (Thursday 10-noon, Roberts G08) Week 1-5, 7-11 (week 6 is “reading week”) 10x2h lab sessions (Wednesdays 15-17, MPEB 1.21) with TAs (Srdjan & David) Useful to both learn new skills and work on the coursework Two shifts, every other week, A-L / M-Z Assessment 70% closed-book exam (2.5 hours) 30% coursework, 3 practical assignments: Network security (8 points), Web security (10 points), Software security (12 points) Office Hours Thursdays 12.30-13.30, MPEB 6.04 Email: e.decristofaro@ucl.ac.uk Moodle enrolment key: imahacker!

Course Aim From syllabus: In other words: “Providing an advanced understanding of network and computer security vulnerabilities and countermeasures in real-world systems.” In other words: Gain a deep understanding of protocol/software vulnerabilities, and learn how to exploit/fix them Only by “getting your hands dirty” you can become a security expert

Think as an attacker One can't secure a system without being aware of ways to break it... “You can’t make something secure if you don’t know how to break it.” (Marc Weber Tobias) Schneier’s “Law”: “Any person can invent a security system so clever that he or she can't imagine a way of breaking it.” https://www.schneier.com/blog/archives/2008/03/the_security_mi_1.html Caveat emptor! The only reason we will be learning about attack techniques is to build better defenses That is, don’t use this knowledge to perform attacks!!!

The importance of exploiting vulnerabilities In class, we can only teach you how vulnerabilities work in theory Only by exploiting vulnerabilities in practice you will really understand them and learn how to prevent them For each coursework assignment, we will indicate the questions that you need to answer correctly to pass the coursework, but to become a complete security expert you should spend considerable time completing even the most difficult exercises – you will have 2-4 weeks to complete the assignments - Start early!

Ethics & Law Malicious hacking/cracking is illegal Discussing vulnerabilities/how they are exploited is useful E.g., for education, awareness, … Full disclosure policy The information about vulnerability has been already distributed to parties that may provide a solution to the problem (e.g., vendors) See: Responsible vulnerability disclosure process (IETF Internet Draft) Preventing similar mistakes from being repeated

Academic Conduct High standard expected in academic conduct: Regulations on how to avoid plagiarism Reference and credit sources appropriately High standard expected in professional conduct: Computer Misuse and Data Protection Procedures for research with human subjects Responsible research and disclosure procedures Compliance and risk based assessments

Tentative List of Topics Denial of service MiTM/Spoofing Network Security Wireless Security SQL, CSRF, XSS, Clickjacking Android security Windows security Race Conditions Malware Memory corruption Buffer overflows Intrusion/Anomaly Detection Firewalls

Textbooks Pfleeger and Pfleeger. “Analyzing Computer Security: A Threat/Vulnerability/Countermeasure Approach” Dieter Gollmann. “Computer Security” Ross Anderson. “Security Engineering” Kaufman, Perlman, Speciner. “Network Security” Koziol, et al. “The Shellcoder’s Handbook” Mitnick. “The Art of Intrusion” Stallings. “Cryptography and Network Security”