Prolog to Lecture 2 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.

Slides:



Advertisements
Similar presentations
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Advertisements

Basic Computer Vocabulary
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Computer Systems.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Computers They're Not Magic! (for the most part)‏ Adapted from Ryan Moore.
Lecture 19 Page 1 CS 111 Online Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources CS 111 On-Line MS Program Operating.
Lecture 4 Page 1 CS 236 Online Prolog to Lecture 4 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 10 Page 1 CS 236 Online Prolog to Lecture 10 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 15 Page 1 CS 236 Online Evaluating System Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 15 Page 1 Advanced Network Security Perimeter Defense in Networks: Firewalls Configuration and Management Advanced Network Security Peter Reiher.
CSCD 303 Essential Computer Security Spring 2013 Lecture 8 - Desktop Security OS Security Compared Reading: See References.
Lecture 13 Page 1 CS 236 Online Secure Programming CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Operating Systems Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
By: Victoria Cain CPU- the component of a computer system that PROCESSES basic operations of the system. Monitor- a cathode-ray tube used for display.
Chapter 1: Applying Computer Basics – Lesson 1 © 2010, 2006 South-Western, Cengage Learning.
Lecture 15 Page 1 CS 236 Online Prolog to Lecture 15 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 19 Page 1 CS 236 Online Securing Your System CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CS101 Computer Software. Software Software is... Two main types of software are…
Lecture 2 Page 1 CS 236 Online Prolog to Lecture 2 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Today: Student will be able to describe the basics of their class and computing Tell me about you and how you use computers. Lesson 1 Slide 1.
Lecture 4 Page 1 CS 111 Online Modularity and Virtualization CS 111 On-Line MS Program Operating Systems Peter Reiher.
Lecture 17 Page 1 CS 236 Online Prolog to Lecture 17 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 8 Page 1 CS 236, Spring 2008 Operating System Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
Lecture 18 Page 1 CS 236 Online Prolog to Lecture 18 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
SCADA NETWORK SECURITY BY LICET 4-AUG-12.
Lecture 9 Page 1 CS 236 Online Firewalls What is a firewall? A machine to protect a network from malicious external attacks Typically a machine that sits.
Thinking Outside the Box Linux. Question: What form of transportation racks up the most passenger miles per year? Not cars Not bicycles Not buses Not.
Chapter 4. CONCEPT OF THE OPERATING SYSTEM MANAGING ESSENTIAL FILE OPERATIONS.
Snapshots, checkpoints, rollback, and restart
Outline Basic concepts in computer security
Protecting Memory What is there to protect in memory?
DDoS In the Real World Do DDoS attacks really happen?
Android Access Control
Outline Properties of keys Key management Key servers Certificates.
Protecting Memory What is there to protect in memory?
Protecting Memory What is there to protect in memory?
Firewall Configuration and Administration
Chapter 5: Using System Software
Secure Software and the Law
Putting It All Together
Putting It All Together
DDoS In the Real World Do DDoS attacks really happen?
Where Malware Lives Most people expect malware in only one place –
TYPES AND COMPONENTS OF COMPUTER SYSTEM
How We Think Of Computers
Introduction to Computers
TYPES OFF OPERATING SYSTEM
Chapter 1: Applying Computer Basics – Lesson 1
Shell & Kernel Concepts in Operating System
McGraw-Hill Technology Education
Print Services.
Intro. To Operating Systems
CS101 Computer Software.
Ainsley Smith Tel: Ex
Standards Chapter 7.
Outline Introduction Memory protection Buffer overflows
McGraw-Hill Technology Education
Outline Introduction Memory protection Buffer overflows
McGraw-Hill Technology Education
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Network Security: Firewalls, VPNs, and Honeypots CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Mandatory Access Control and the Real World
Outline Introduction Memory protection Buffer overflows
Android Access Control
Outline The concept of perimeter defense and networks Firewalls.
CS101 Computer Software.
What is an operating system An operating system is the most important software that runs on a computer. It manages the computer's memory and processes,
Windows 10 An Operating System
Presentation transcript:

Prolog to Lecture 2 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008

What’s This Prolog Stuff? When I can, I will add a short presentation to each lecture Discussing application of material from the previous or recent lectures Generally stuff that’s pretty timely

Do We Really Care About Security? Security gets a lot of lip-service But is the community out there really behind it? Particularly the industrial community that builds our software? Three recent stories suggest maybe not

1. Fun With Firewire Many computers have firewire interfaces Especially laptops These interfaces allow direct access to memory No access control No nuthin’

What’s That Mean? Anyone who hooks up a firewire device to your laptop doesn’t need to log in He can just read and alter the memory Proof-of-concept tool1 allows you to own Windows machine in seconds 1http://www.darkreading.com/document.asp?doc_id=147713&f_src=drweekly

What’s the Response? “Well, duh, that’s what Firewire is supposed to do” In other words, we designed your computer to let anyone take it over If they have physical access All this login stuff is just window dressing to impress the rubes

2. Backdoor Processors Many devices come with complete processors “hidden” inside Printers, routers, storage devices, etc. They’re installed with complete OSes Which are often very badly configured Allowing anyone access

The Implications If attacker knows about these, And you don’t, He’s got a hidden backdoor into your system Often these processors have network capabilities And can access the CPU you already knew you had

What’s That Mean? The people who put these processors in neither knew nor cared about security System management (the purpose of them) was more important They didn’t care enough to even mention they were there

3. Apple Patching Everyone knows Macs are “more secure” than Windows machines Well, they’re not Recent study1 shows Apple: Has more vulnerabilities Takes longer to patch them Suffers more attacks on unpatched flaws 1http://www.techzoom.net/papers/blackhat_0day_patch_2008.pdf

What’s That Mean? Apple wasn’t entirely honest about really caring about security They aren’t spending the money to patch flaws And they have plenty to patch They’re talking the talk, not walking the walk

The General Lesson Just because people say they care about security doesn’t mean they do Many decisions seem to be made without even considering security implications