Copyright © 1995-2003 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.

Slides:



Advertisements
Similar presentations
Chapter 1  Introduction 1 Chapter 1: Introduction.
Advertisements

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Dr. Jelena Mirkovic University of Southern California Information Sciences Institute.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture notes.
HIPAA Security Standards What’s happening in your office?
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci555: Advanced Operating Systems Lecture.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Dr. Jelena Mirkovic (Y-Ellen-a) University of Southern California Information Sciences Institute.
1 An Overview of Computer Security computer security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Copyright © B. C. Neuman, - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Fall Security Systems Lecture notes Drs.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authorization.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Six –
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Distributed Systems Shahab Baqai Lahore University.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
A First Course in Information Security
SEC835 Database and Web application security Information Security Architecture.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
PART THREE E-commerce in Action Norton University E-commerce in Action.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
HIPAA PRIVACY AND SECURITY AWARENESS.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Anderson School of Management University of New Mexico.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
@Yuan Xue CS 285 Network Security Fall 2008.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
Session 7 LBSC 690 Information Technology Security.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Topic 5: Basic Security.
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
Introduction to Information Security
Chap1: Is there a Security Problem in Computing?.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE September Integrating Policy with Applications.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 7 Authentication Methods and Requirements.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
Computer Security By Duncan Hall.
CSCD 303 Essential Computer Security Lecture 1 - Course Details.
1 NES554: Computer Networks Defense Course Overview.
Copyright © Clifford Neuman and Dongho Kim - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Advanced Operating Systems Lecture.
IS3220 Information Technology Infrastructure Security
Computer Security Sample security policy Dr Alexei Vernitski.
For More Tutorials ACC 210 WEEK 1 DQ 1  How does information flow between departments at your organizations? Why do some organizations.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
INF526: Secure Systems Administration Composition of Systems And Security Domains Prof. Clifford Neuman Lecture 3 3 June 2016 OHE100C.
CET4884 Dr. Nabeel Yousef.  Dr. Nabeel Yousef  Located at the ATC campus room 107Q  Phone number 
Securing Information Systems
CSCD 303 Essential Computer Security
CSCD 303 Essential Computer Security
CSCD 303 Essential Computer Security
Presentation transcript:

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture notes Fall 2007 Dr. Clifford Neuman University of Southern California Information Sciences Institute

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Security Systems Lecture 1 – August 31, 2007 The Security Problem Dr. Clifford Neuman University of Southern California Information Sciences Institute

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Administration Class home page –Preliminary Syllabus –Assigned Readings –Lecture notes –Assignments

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Who gets in There will be additional seats that open up in the class. If you do not have D Clearance yet, give me your form at break. I turn these into the department and they decide who gets in based on their prioritization

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Structure of lecture Classes from 9:00 AM – 11:50 AM –10-15 minute break halfway through –Final 15 minutes for discussion of current events in security.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Administration Lab Component (see –1 of the 4 units –Instructor is David Morgan –Instruction 3:30-4:20 Fridays in OHE 122 ▪WebCast via DEN ▪Today’s Lab instruction is only a 30 minute introduction –Hands on sections, choose from 7 sessions ▪Provides an opportunity to do hands on work in OHE 406 lab. ▪Must sign up for your preference of session. ▪Details will be provided this afternoon.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Administration Class Instructor –Dr. Clifford Neuman –Office hours Friday 12:50-1:50 SAL 212 –Contact info on class web page TAs –Arun Viswanathan (lead TA) –Office hours Mon, Wed 1:30-2:30 PM –Contact info on class web page

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Administration Grading –Reading reports: 5%,5%,5% –Exams: 25%, 30% –Research paper 30% –Lab exercises Pass(hi,lo)/Fail (adj 15%) –Class participation ▪up to 10% bonus

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Blackboard Using the DEN Blackboard system –Go to –Click “for on campus students” –Follow the instructions to obtain your Blackboard password for the DEN site. –Contact if you have difficulty gaining access to the –We are using alternate “ISI” discussion forum linked from DEN course page.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Class Participation This is a large class, but I treat is as smaller. –Class participation is important. ▪Ask and answering questions in class. ▪Ask, answer, participate on-line –Bonus for class participation ▪If I don’t remember you from class, I look in the web discussion forum to check participation. –Did you ask good questions. –Did you provide good answers. –Did you make good points in discussions.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Academic Integrity I take Academic Integrity Seriously –Every year I have too many cases of cheating –Last year I assigned multiple F’s for the class What is and is not OK –I encourage you to work with others to learn the material –Do not to turn in the work of others –Do not give others your work to use as their own –Do not plagiarize from others (published or not) –Do not try to deceive the instructors See section on web site and assignments –More guidelines on academic integrity –Links to university resources –Don’t just assume you know what is acceptable.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE The Three Aspects of Security Confidentiality –Keep data out of the wrong hand Integrity –Keep data from being modified Availability –Keep the system running and reachable

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Orthogonal Aspects Policy –Deciding what the first three mean Mechanism –Implementing the policy

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Important Considerations Risk analysis and Risk Management –How important to enforce a policy. –Legislation may play a role. The Role of Trust –Assumptions are necessary Human factors –The weakest link

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE In The Shoes of an Attacker Motivation –Financial –Bragging Rights –Revenge / to inflict damage –Terrorism and Extortion Risk to the attacker –Can play a defensive role.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE What is security System, Network, Data –What do we want to protect –From what perspective How to evaluate –Balance cost to protect against cost of compromise –Balance costs to compromise with risk and benefit to attacker. Security vs. Risk Management –Prevent successful attacks vs. mitigate the consequences. It’s not all technical

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Security and Society Does society set incentives for security. –OK for criminal aspects of security. –Not good in assessing responsibility for allowing attacks. –Privacy rules are a mess. –Incentives do not capture gray area ▪Spam and spyware ▪Tragedy of the commons

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Why we aren’t secure Buggy code Protocols design failures Weak crypto Social engineering Insider threats Poor configuration Incorrect policy specification Stolen keys or identities Denial of service

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE What do we want from security Confidentiality –Prevent unauthorized disclosure Integrity –Authenticity of document –That it hasn’t changed Availability –That the system continues to operate –That the system and data is reachable and readable. Enforcement of policies –Privacy –Accountability and audit –Payment

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE The role of policy in security architecture Policy – Defines what is allowed and how the system and security mechanisms should act. Enforced By Mechanism – Provides protection interprets/evaluates (firewalls, ID, access control, confidentiality, integrity) Implemented as: Software: which must be implemented correctly and according to sound software engineering principles.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Security Mechanisms Encryption Checksums Key management Authentication Authorization Accounting Firewalls Virtual Private Nets Intrusion detection Intrusion response Development tools Virus Scanners Policy managers Trusted hardware

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Today’s security deployment Most deployment of security services today handles the easy stuff, implementing security at a single point in the network, or at a single layer in the protocol stack: –Firewalls, VPN’s –IPSec –SSL –Virus scanners –Intrusion detection

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE A more difficult problem Unfortunately, security isn’t that easy. It must be better integrated with the application. –At the level at which it must ultimately be specified, security policies pertain to application level objects, and identify application level entities (users).

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Security Systems vs Systems Security SECURITY AUDIT RECORDS INTRUSION DETECTION UNDER ATTACK POLICY GAA API EACL... Authentication Integration of dynamic security services creates feedback path enabling effective response to attacks Databases Web Servers Firewalls IPSec …

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Loosely Managed Systems Security is made even more difficult to implement since today’s system lack a central point of control. –Home machines unmanaged –Networks managed by different organizations. –A single function touches machines managed by different parties. –Who is in control?

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Who is in Control The Intruder The Government Your employer The Merchant The credit card companies The credit bureaus Ultimately, it must be you who takes control, but today’s systems don’t take that view.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Current event – How does this relate to our discussion A Monster Security Breach Monster lagged in disclosing theft Boston (Reuters) Monster.com waited five days to tell its users about a security breach that resulted in the theft of confidential information from some 1.3 million job seekers. Hackers broke into the U.S. site's password-protected resume library using credentials that were stolen from its clients, in one of the biggest Internet security breaches in recent memory. They launched the attack in the Ukraine and a group of personal computers the hackers controlled after infecting them with a malicious software program known as Infostealer.Monstres, said Patrick Manzo, vice president of compliance and fraud prevention for Monster. The company first learned of the problem on August 17, when investigators with Symantec told Monster it was under attack. Based on Monster's review, the information stolen was limited to names, addresses, phone numbers and addresses, and no other details including bank account numbers were uploaded. But pretending to be sent through Monster.com from job recruiters asked recipients to provide personal financial data including bank account numbers. They also asked users to click on links that could infect their PCs with malicious software. Their ultimate goal in taking the data from Monster.com was to gain enough personal information to lower the guards of target victims when they read the s: "It gives these spam s just a little bit of credibility," Martin said. "These guys were trying to get financial information from people."