Computer Security 1 [COMPGA01] Nicolas T. Courtois - University College London.

Slides:



Advertisements
Similar presentations
T T Some Fancy Technology (3 ECTS) Introduction See notes for comments.
Advertisements

Chapter 1  Introduction 1 Introduction Chapter 1  Introduction 2 The Cast of Characters  Alice and Bob are the good guys  Trudy is the bad guy 
Chapter 1  Introduction 1 Chapter 1: Introduction.
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
Chapter 1 We’ve Got Problems…. Four Horsemen  … of the electronic apocalypse  Spam --- unsolicited bulk o Over 70% of traffic  Bugs ---
1 Copyright © 2010 AQA and its licensors. All rights reserved. Introduction to the new specification GCSE Computer Science Paul Varey.
Slide 01-1COMP 7370, Auburn University COMP 7370 Advanced Computer and Network Security Dr. Xiao Qin Auburn University
Class 1 Background, Tools, and Trust CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman
G53SEC 1 Revision & Exam Tips G53SEC. 2 Today’s Lecture: Revision Summary + Tips Exam Tips Preliminary Coursework Feedback.
Security Systems Theory UG2 Module Introduction Themes 1. Top down design of security systems – security technologies as 'black boxes'. 2. Internal design.
Part 4  Software 1 Conclusion Part 4  Software 2 Course Summary  Crypto o Basics, symmetric key, public key, hash functions and other topics, cryptanalysis.
6/19/2015 Prof. Ehud Gudes Security Ch 1 1 Chapter 0 - Overview.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
CMSC 414 Computer (and Network) Security Jonathan Katz.
CMSC 414 Computer and Network Security Jonathan Katz.
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
T: RIS604 – I NFORMATION S ECURITY W Nel 18 July 2012.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
SEC835 Database and Web application security Information Security Architecture.
G53SEC Computer Security Introduction to G53SEC 1.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering 1.
Computer & Network Security
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Michael McDonnell GIAC Certified Intrusion Analyst Creative Commons License: You are free to share and remix but you must provide.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
Introduction University of Sunderland CSEM02 Harry R Erwin, PhD Peter Dunne, PhD.
Chapter 1  Introduction 1 Chapter 1: Introduction.
This course will help you understand the latest technologies & how they work. You will lean how to develop computer programs to solve problems.
Final Exam Review CS461/ECE422 Fall Exam guidelines A single page of supplementary notes is allowed Closed book No calculator Students should show.
Decidability or Impossibility? 02b = a bit of boring theory Nicolas T. Courtois - University College of London.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Introduction & Overview Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific Institute of Information.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
SEC835 Security in Databases and Web applications Presentation.
1 CDA 4527 Computer Communication Networking (not “analysis”) Prof. Cliff Zou School of Electrical Engineering and Computer Science University of Central.
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
SECURITY REQUIREMENTS AND MANAGEMENT: Presentation By: Guillermo Dijk.
Information Security tools for records managers Frank Rankin.
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
@Yuan Xue CS 285 Network Security Fall 2013 Yuan Xue.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Access Control. Assignment Review  Current  Next 6/23/2016 Access Control 2.
Introduction to Web Technologies Module Introduction to Web Technologies – CS th January 2005 Dr Bogdan L. Vrusias
CEN 621 Cryptography and Network Security Spring Term CEN 621 Cryptography and Network Security Spring Term INTERNATIONAL BURCH UNIVERSITY.
SST UG2 Exam Revision The exam will be ● closed book ● 2 hours plus 5 minutes reading time ● 2 sections A and B each with 3 questions ● Answer 2 questions.
GCSE COMPUTER SCIENCE Edexcel GCSE Computer Science 0.0 Introduction.
CS457 Introduction to Information Security Systems
CNT 4704 Computer Communication Networking (not “analysis”)
CSE-C3400 Information security
Exam Review.
Download Latest CompTIA CAS-002 Exam Dumps PDF Questions - CAS-002 Best Study Material - Realexamdumps.com
CIS 333 RANK Education for Service-- cis333rank.com.
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
Understanding Security Layers
CNT 4704 Analysis of Computer Communication Networks
Introduction to Computer Security II
Introduction Security Intro 1.
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
T Information Security Technology
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Computer Security 1 [COMPGA01] Nicolas T. Courtois - University College London

CompSec COMPGA01 Nicolas T. Courtois, January CompSec at UCL COMPGA01 Computer Security 1 Dr. Nicolas Courtois optional modules *COMPGA02 Computer Security 2 *COMPGZ03 Distributed Systems *COMPM028 Language Based Security *COMPGA14 InfoSec Management not covered: database sec critical infrastructures hiding, covert channels, flow control distributed systems

CompSec COMPGA01 Nicolas T. Courtois, January About GA01 30 hours.

CompSec COMPGA01 Nicolas T. Courtois, January CompSec1 [COMPGA01] Summary page:

CompSec COMPGA01 Nicolas T. Courtois, January Slides

CompSec COMPGA01 Nicolas T. Courtois, January Assessment 85 % = written exam (May exam session) –2.5 hours. –“ closed book ”, –NO calculators allowed, no mobile phones 15 % = Coursework =

CompSec COMPGA01 Nicolas T. Courtois, January Written Exam Content multiple choice questions + possibly also problems to solve, –either rather questions of understanding.. –or small “ theory ” exercises your key weapons are: –common sense –real world connection, practice vs. theory, things in perspective –basic knowledge: vocabulary, definitions, key concepts The exam CAN contain things about which YOU never heard. YES there will be things you did a lot of revisions on and not on the exam … Too bad.

CompSec COMPGA01 Nicolas T. Courtois, January Remark Part01 - all the “ PRINCIPLES ” we learn … Exam is not a philosophy essay. –Part 01 is NOT the most important part of this course. –Abstract notions and principles should appear in reference to the clear real world context. –Focus on fundamental technical knowledge and understanding of it.

CompSec COMPGA01 Nicolas T. Courtois, January References 1) *M. Bishop, Computer Security. –out of date, yet everything is there! 2)Computer Security: by Dieter Gollmann +Unix&Wndows alike +read in any order, +compact explanations -timid on recommendations 2)Ross Anderson Security Engineering [Cambridge] only some parts

CompSec COMPGA01 Nicolas T. Courtois, January Major Themes in CompSec 1 Engineering principles, vocabulary, fancy acronyms like C.I.A % Access control, theory and practice - 30 % Security helped by hardware - 10 % Malware attacks and defences - 25% Protocols and applied cryptography - 30 % Security given the social and industrial context - 10 % The sum is much more than 100%? Yes, because these major points have lots of intersection.

CompSec COMPGA01 Nicolas T. Courtois, January CompSec 1 – Learning Outcomes What’s There? Industrial Standards Life Facts What’s Wrong? Threats Vulnerabilities Fix It? Defensive Techniques Attack Methods Hacking Techniques..“ALL MAJOR AREAS”…

CompSec COMPGA01 Nicolas T. Courtois, January Content Intro 20s, Principles, part01 70s Sets, relations, Security policies, Ref. Monitor, part02a 60s DAC, OS Access Control, Unix part04(a) 60 s Unix/Windows in part04(b) +60 s, Decidability: part02b 20s, revisions on Lattices, 02a/c MAC, Confidentiality, BLP[Biba] part02c 70s, Hardware and Low Level CompSec part03 100s Integrity, business-oriented policies part02d 90s

CompSec COMPGA01 Nicolas T. Courtois, January Content Exploits against software and defenses part10, 60 s Software - Malware, Attacks – Defences, part s Basic Network Security and Firewalls 80s Crypto, Authentication, Passwords, part05, Crypto Protocols, Key Est. Kerberos, SSL, PGP part06