Class 1 Background, Tools, and Trust CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman

Slides:



Advertisements
Similar presentations
Chapter 1  Introduction 1 Chapter 1: Introduction.
Advertisements

Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
1 Computer Engineering Department Islamic University of Gaza ECOM 5347 Network Security Undergraduate Course Fall Prof. Mohammad A. Mikki Room.
John Hurley Cal State LA
Class 9 Physical Security and DRM CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Slide 01-1COMP 7370, Auburn University COMP 7370 Advanced Computer and Network Security Dr. Xiao Qin Auburn University
Introduction and Logistics Amir Houmansadr CS660: Advanced Information Assurance Spring 2015.
Class 12 Anonymous Digital Currency CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
National Archives and Records Administration, 2003 Federal Records Management for Managers What’s in it for me?
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Computers in Principle & Practice I - V Deena Engel Computers in Principle and Practice I V , Sections 1 & 2 Fall, 2009 Deena Engel .
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
BNAD 301 Global and Financial Economics & Strategies.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Wenyuan Xu Department of Computer Science and Engineering University of South.
Class 13 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
SEC835 Database and Web application security Information Security Architecture.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
CIS150AB: Object-Oriented Programming Fundamentals Instructor: Gary R. Smith, MS.
Class 20 Usability CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Web Applications Security Seminar David Evans University of Virginia 28 August 2007.
Computer Networks CEN 5501C Spring, 2008 Ye Xia (Pronounced as “Yeh Siah”)
Object Oriented Programming (OOP) Design Lecture 1 : Course Overview Bong-Soo Sohn Assistant Professor School of Computer Science and Engineering Chung-Ang.
Computer Networks Lecture 1: Logistics Based on slides from D. Choffnes Northeastern U. and P. Gill from StonyBrook University Revised Autumn 2015 by S.
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
WEEK-1 PRINCIPLES OF MANAGEMENT BUSN 107, Özge Can.
Class 19 Wrap-up and Review CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Class 2 Cryptography Refresher CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman
@Yuan Xue CS 285 Network Security Fall 2008.
Class 5 Practical Considerations and Physical Security CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman
Class 7 Practical Considerations CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Class 13 Review CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman
Course Overview Prepared by L. Nouf Almujally 1. Course Objectives Fundamental concepts of database systems, in particular, relational database systems.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
Class 5 Channels and Preview CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
+ Introduction to Class IST210 Class Lecture. + Course Objectives Understand the importance of data, databases, and database management Design and implement.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
CSE Senior Design II Day 1: Getting Organized Spring 2015 Instructor: Manfred Huber.
Class 2 Cryptography Refresher CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Class 4 Asymmetric Cryptography and Trusting Internal Components CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Class 6 Distributed Systems CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman
Class 3 Cryptography Refresher II CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
CIS 842: Specification and Verification of Reactive Systems Lecture ADM: Course Administration Copyright , Matt Dwyer, John Hatcliff, Robby. The.
Graciela Saunders.  Introduction / Review  Challenges to Embedded Security  Approaches to Embedded Security  Security Analysis & Attack Taxonomy 
From Information Assurance to Trusted Systems – A Strategic Shift Patricia A. Muoio Chief, NSA Trusted Systems Research (formerly known as National Information.
CSCE 201 Secure Software Development Best Practices.
Introduction to Software Engineering Lab Instructor: Jacob.
Research Experience Program (REP) Spring 2008 Psychology 100 Ψ.
ECE 374: Computer Networks & Internet Introduction Spring 2015 Prof. Michael Zink.
ECE 374: Computer Networks & Internet Introduction Spring 2012 Prof. Michael Zink.
Administrative: “Create New Game” Project Apply the principles of Iterative Design –First run of games in class: March 28 th in class Short document describing:
Research Experience Program (REP) Fall 2007 Psychology 100 Ψ.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
@Yuan Xue CS 285 Network Security Fall 2013 Yuan Xue.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Modeling security 1. Models - encryption r Alice and Bob have the same key k r Alice and Bob exchange encrypted messages r Eve wants to get the plaintext.
CET4884 Dr. Nabeel Yousef.  Dr. Nabeel Yousef  Located at the ATC campus room 107Q  Phone number 
Day 1: Getting Organized Spring 2014
Outline Basic concepts in computer security
Algebra II Fundamentals
Welcome to the a Department of Engineering Education !
Day 1: Getting Organized Fall 2013
Day 1: Getting Organized Spring 2013
Day 1: Getting Organized Spring 2011
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Presentation transcript:

Class 1 Background, Tools, and Trust CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman

This class Will discuss historical and modern work in security focusing on advanced concepts Coursework consists of: 1.Reading from “Cryptography Engineering,” “Security Engineering,” and papers 2.Class discussions 3.Quizzes, mid-terms, and a final exam

Administrative stuff Me: – Office: 316A Nichols Readings, quizzes, etc. on schedule page Watch for quiz announcements Periodically check main page for news and schedule page for changes and slides

Administrative stuff II Office hours: – Monday 3 – 4:30 PM – Thursday 2:30 – 4 PM – Or by appointment – In 316A Nichols or by teleconference Be sure to do the reading!! How was the reading?

Things to remember I can be wrong; papers can be wrong; anyone can be wrong! This class is experimental – if the workload is too heavy, if you’re not learning, if you are bored, let me know! Please contact me for any reason – , stop by my office, or make an appointment If you don’t understand something, ask!

More things to remember Secure hardware: FAIL! Mobile software agents: FAIL! Loss of security is a one-way trip* * Some exceptions apply – e.g. confidentiality, integrity (sometimes) Attacks only get better Security should be considered in design There is such a thing as too much security

Reading papers Read critically – Pretend you know it’s broken and let the writer convince you otherwise (or not!) Think like an adversary Are there implicit assumptions? Are the explicit assumptions reasonable? Some resources are online – (website external resources )external resources

Me being selfish Any questions about my research? (Just what is it that I do around here? :)

Security basics “What is being secured?” – And security goal/property “Secure against what?” – Threat/attacker model, players and resources Kerckhoffs’ principle – Roughly, the only thing secret about a security system should be the secret key Shannon’s maxim – “The enemy knows the system”

Safety vs. security Think like an adversary! Random → malicious faults Engineering for security: “What’s the worst that can happen?” Assume it will… Always, always, ALWAYS state your assumptions!

Security: fundamental differences Real world: physical, intuitive – Risk assessment People are not even good at this in the real world! – Trusted vs. trustworthy – Forensics, physical evidence Forgery – Fail “evident,” e.g. theft – Scale of failures

Building secure systems Players – Incentives and resources Adversary model – Logical or illogical: cost vs. payoff Levels of assurance Proactive vs. reactive enforcement – Fail-closed/secure or fail-open/insecure? – Method of returning to secure states

What does “secure” mean? Secrecy/Confidentiality Authenticity Integrity Privacy/Anonymity – Pseudonymity – Unlinkability – Deniability Accountability

Always state your assumptions!

More basics Trusted vs. trustworthy – e.g. the recent SSL Certificate Authority fiasco Risk, hazard, vulnerability – Adversary, ROI, scale Assurance levels – “Rainbow” book series, Common Criteria Method of returning to secure states Fail-closed/secure or fail-open/insecure?

Attack success variants Derive/recover secret key – Total break Forge signature/tag on any message – Universal break Forge for some chosen messages – Selective break Forge for some (garbled?) message – Existential break xkcd.com

Security mechanisms (incomplete list) Access control Authentication Separation of roles Logging Trusted components in the hands of trustworthy parties

Questions?