Dr. Jelena Mirkovic (Y-Ellen-a) University of Southern California Information Sciences Institute.

Slides:



Advertisements
Similar presentations
Let’s Talk About Cyber Security
Advertisements

ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Dr. Jelena Mirkovic University of Southern California Information Sciences Institute.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
USC CSci499 Security Systems Lecture notes – Spring 2013 Dr. Jelena Mirkovic University of Southern California Information Sciences Institute.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture notes.
Computers and Society Lecture 1: administrative details and an introduction to the class Professor: Evan Korth New York University.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Introduction to Security Computer Networks Computer Networks Term B10.
Some things to think about. Assignment 1 is at the end, but read the whole thing. Please!
Threats To A Computer Network
Copyright © B. C. Neuman, - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Fall Security Systems Lecture notes Drs.
Need your MyMathLab card with your access code Need a Valid Address Need to know Purdue’s zip code is and your course ID for your Class You.
Need your MyMathLab card with your access code Need a Valid Address Need to know Purdue’s zip code is and your course ID for your Class You.
Need your MyMathLab card with your access code Need a Valid Address Need to know Purdue’s zip code is and your course ID for your Class You.
Need your MyMathLab card with your access code Need a Valid Address Need to know Purdue’s zip code is and your course ID for your Class You.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Web server security Dr Jim Briggs WEBP security1.
COMP 14 – 02: Introduction to Programming Andrew Leaver-Fay August 31, 2005 Monday/Wednesday 3-4:15 pm Peabody 217 Friday 3-3:50pm Peabody 217.
CSCD 330 Network Programming Winter 2012 Lecture 1 - Course Details.
By Hassan Abu daqen & montaser elsabe3 & Nidal Abu saif.
Computer Science 102 Data Structures and Algorithms V Fall 2009 Lecture 1: administrative details Professor: Evan Korth New York University 1.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Log into your account Go to Locate MAT 2401 and the First Day PPT.
Viruses.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
IT Security for Users By Matthew Moody.
COMP Introduction to Programming Yi Hong May 13, 2015.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
Computer & Network Security
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
CSCD 330 Network Programming Fall/Winter/Spring 2014 Lecture 1 - Course Details.
Types of Electronic Infection
COP3502: Introduction to Computer Science Yashas Shankar.
CSE 1340 Introduction to Computing Concepts Class 1 ~ Intro.
Network Security Introduction Light stuff – examples with Alice, Bob and Trudy Serious stuff - Security attacks, mechanisms and services.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Jongwook Woo CIS 520 Software Engineering (Syllabus) Jongwook Woo, PhD California State University, LA Computer and Information System.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 28 Omar Meqdadi Department of Computer Science and Software Engineering.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
IST 210: Organization of Data
USC CSCI430 Security Systems Lecture notes – Spring 2015 Dr. Jelena Mirkovic University of Southern California Information Sciences Institute.
CSCD 330 Network Programming Winter 2015 Lecture 1 - Course Details.
1 Day 2 Logging in, Passwords, Man, talk, write. 2 Logging in Unix is a multi user system –Many people can be using it at the same time. –Connections.
Computer Security By Duncan Hall.
Data Structures and Algorithms in Java AlaaEddin 2012.
CSCD 303 Essential Computer Security Lecture 1 - Course Details.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
CSE 1340 Introduction to Computing Concepts Class 1 ~ Intro.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Systems Design and Development Security Risks Computing Science.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
CET4884 Dr. Nabeel Yousef.  Dr. Nabeel Yousef  Located at the ATC campus room 107Q  Phone number 
Unit 3 Section 6.4: Internet Security
Chapter 40 Internet Security.
Instructor Materials Chapter 7 Network Security
Information and Network Security
Computer Science 102 Data Structures CSCI-UA
What is it? Why do I keep getting from Barracuda? SPAM.
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Presentation transcript:

Dr. Jelena Mirkovic (Y-Ellen-a) University of Southern California Information Sciences Institute

 If you wish to enroll and do not have D clearance yet, send an to with: o Your name o Which prerequisites you have completed o A phone number o Request to receive a D clearance  I will contact and assess if space becomes available

 o Syllabus o Assignments o News o Lecture notes (also on Blackboard)

 o 1 of the 4 units o Instructor is David Morgan o Instruction 4 – 4:50 Fridays in RTH105  WebCast via DEN  Hands on work in the lab – exercising the theoretical knowledge from class  Some labs will be done remotely using DETER testbed

 Four reports, due as noted online  Each discusses a paper of your choice from a few top security conferences/journals o Summary of the paper and its critique o Your ideas on the topic o 2-4 pages, submitted via Blackboard o You can submit reports early if you like  One report from each student will be chosen for presentation in class  Total 20% of your grade, 4% each  Late policy: 48 h grace period divided over all 4 assignments – must ahead of deadline

 Class (TA and  Instructor o Dr. Jelena Mirkovic o Office hours Wed 3-4pm or by appt in SAL 234 o Contact via (on class web page)  TA o Leslie Cheung o Office hours Tu/Th 11am-noon, PHE 316 o Contact via (on class web page)

 Grading: o Paper reports/presentations: 20% o Lab: 20% o Quizzes: 5% o Participation: 5% o Midterm Exam: 20% o Final Exam: 30%  Grades assigned using an absolute curve: AA-B+BB-C+CC-D+DD

 DEN Blackboard system will host the class discussion board o To gain access and log in o Contact if you have difficulty gaining access to the o I will check the discussion board once daily but if you want a reliable response from me me directly

 Class participation is important o Ask and answer questions in class o Ask, answer, participate on-line  Class participation carries 5% of your grade o If I don’t remember you from class, I look in the web discussion forum to check participation  Did you ask good questions  Did you provide good answers  Did you make good points in discussions

 What is and is not OK o I encourage you to work with others to learn the material but everyone must DO their work ALONE o Do not to turn in the work of others o Do not give others your work to use as their own o Do not plagiarize from others (published or not) o Do not try to deceive the instructors  See section on web site and assignments o More guidelines on academic integrity o Links to university resources o Don’t just assume you know what is acceptable.

 No one should be able to: o Break into my house o Attack me o Steal my TV o Use my house to throw water balloons on people o Damage my furniture o Pretend to be my friend Bob and fool me o Waste my time with irrelevant things o Prevent me from going to my favorite restaurant

 No one should be able to: o Break into my computer o Attack my computer o Steal my information o Use my computer to attack others o Damage my computer or data o Use my resources without my permission  I want to talk to Alice o Pretend to be Alice or myself or our computers o Prevent me from communicating with Alice

 An isolated computer has a security risk? o Computer security aims to protect a single, connected, machine  Networking = communication at all times and in all scenarios!!! o Network security aims to protect the communication and all its participants  Security = robustness or fault tolerance? Computer security Network security

 Breaking into my computer o Hackers  Break a password or sniff it off the network  Exploit a vulnerability  Use social engineering  Impersonate someone I trust o Viruses and worms A vulnerability is a bug in the software that creates unexpected computer behavior when exploited, such as enabling access without login, running unauthorized code or crashing the computer. An exploit is an input to the buggy program that makes use of the existing vulnerability.

 Attacking my computer o Denial-of-service attacks o Viruses and some worms A virus is a self-replicating program that requires user action to activate such as clicking on , downloading an infected file or inserting an infected floppy, CD, etc.. A worm is a self-replicating program that does not require user action to activate. It propagates itself over the network, infects any vulnerable machine it finds and then spreads from it further. A DOS attack aims to disrupt a service by either exploiting a vulnerability or by sending a lot of bogus messages to a computer offering a service

 Stealing my information o From my computer or from communication o I will use cryptography!  There are many ways to break ciphers  There are many ways to divulge partial information (e.g. who do you talk to) o I would also like to hide who I talk to and when  I will use anonymization techniques  Anonymization hinders other security approaches that build models of normal traffic patterns

 Using my machine to attack others o viruses o Worms o Denial-of-service attacks (including reflector attacks) o Spam, phishing

 Damaging my computer or data o I have to prevent break-ins o I will also use cryptography to detect tampering o I must replicate data to recover from tampering o Denial-of-service attacks and worms can sometimes damage computers

 Taking up my resources with irrelevant messages o Denial-of-service attacks o Spam mail (takes time to read and fills space) o Malicious mail (may contain a virus) o Viruses and worms

 Pretending to be Alice or myself or our computers o I want to be sure who I am talking to (authentication and digital signatures) o It is hard to impersonate a computer in two- way communication, such as TCP  But it has been done o Plain IP spoofing seems an extremely hard problem to solve IP spoofing means putting a fake IP address in the sender field of IP packets.

 Preventing me from communicating with Alice o Alice could be attacked o Routers could be overloaded or tampered with o DNS servers could be attacked

 Confidentiality (C) o Keep data secret from non-participants  Integrity (I) o Aka “authenticity” o Keep data from being modified  Availability (A) o Keep the system running and reachable o Keep it functioning properly

 No one should be able to: o Break into my computer – A, C, I o Attack my computer – A, C, I o Steal my information - C o Use my computer to attack others – I? o Damage my computer or data - I o Use my resources without my permission - A  I want to talk to Alice o Pretend to be Alice or myself or our computers – C, I o Prevent me from communicating with Alice - A

 Policy o Deciding what confidentiality, integrity and availability mean  Mechanism o Implementing the policy