CS426Fall 2010/Lecture11 Computer Security CS 426 Lecture 1 Overview of the Course.

Slides:



Advertisements
Similar presentations
© Ravi Sandhu Introduction to Information Security Ravi Sandhu.
Advertisements

Chapter 1  Introduction 1 Chapter 1: Introduction.
Chapter 1 We’ve Got Problems…. Four Horsemen  … of the electronic apocalypse  Spam --- unsolicited bulk o Over 70% of traffic  Bugs ---
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
CS5261 Information Security CS 526 Topic 1 Overview of the Course Topic 1.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
Welcome to EECS 354 Network Penetration and Security.
1 Securing the Net: Where the Holes Are Steven M. Bellovin AT&T Labs – Research
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
CYBER CRIME AND SECURITY TRENDS
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Chapter Nine Maintaining a Computer Part III: Malware.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Speaker : YUN–KUAN,CHANG Date : 2009/10/13 Working the botnet: how dynamic DNS is revitalising the zombie army.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Computer Security Fundamentals Chuck Easttom Chapter 1 Introduction to to Computer Security.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
CS5261 Information Security CS 526 Topic 1 Overview of the Course Topic 1.
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
IT security By Tilly Gerlack.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
 The purpose of this report is to inform people that the spyware and virus threat is growing and what people can do to stop the spread of spyware and.
C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
CMSC 414 Computer (and Network) Security Lecture 14 Jonathan Katz.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Security in Computer System 491 CS-G(172) By Manesh T
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
CS 510 : Malicious Code and Forensics. About the course Syllabus at
Application of Machine Learning and Crowdsourcing to Detection of Cyber Threats Jaime G. Carbonell Eugene Fink Mehrbod Sharifi.
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
CS5261 Information Security CS 526 Topic 1 Overview of the Course Topic 1.
Computer Skills and Applications Computer Security.
By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.
Introduction to Security CS432 – Security in Computing Copyright © 2005, 2009 by Scott Orr and the Trustees of Indiana University.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
CS426Fall 2010/Lecture 171 Computer Security CS 426 Lecture 17 Market Failure of Secure Software.
Cybersecurity Test Review Introduction to Digital Technology.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Week-14 (Lecture-1) Malicious software and antivirus: 1. Malware A user can be tricked or forced into downloading malware comes in many forms, Ex. viruses,
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Computer Security Keeping you and your computer safe in the digital world.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Social Impacts of IT: P6 By André Sammut. Social Impacts IT impacts our life both in good ways and bad ways. Multiplayer Games Social Networks Anti-social.
MALWARE Autumn Mattis.
IT Security  .
Challenges We Face On the Internet
CHAPTER 4 Information Security.
Risk of the Internet At Home
System Programming CS 252 Topic 20
Presentation transcript:

CS426Fall 2010/Lecture11 Computer Security CS 426 Lecture 1 Overview of the Course

In Recent (Last Week)’s News Intel buys McAfee for $7.7B in push beyond PCs Intel buys McAfee for $7.7B in push beyond PCs HP to Buy Vulnerability Specialist Fortify Software HP to Buy Vulnerability Specialist Fortify Software CS426Fall 2010/Lecture12 The market for computer security knowledge will grow.

More In the News Malware Call to Arms: Threat at All-Time High and Rising Malware Call to Arms: Threat at All-Time High and Rising Beware the Facebook "Dislike" Button Scam Facebook Warns of Clickjacking Scam Android Game Is a Spy App in Disguise Cameron Diaz hot bait for online traps Virus Fools People Into Uninstalling Their Antivirus Software Virus Fools People Into Uninstalling Their Antivirus Software CS426Fall 2010/Lecture13 What are some common themes of the attacks?

CS426Fall 2010/Lecture14 Why Do Computer Attacks Occur? Who are the attackers? –bored teenagers, criminals, organized crime organizations, rogue states, industrial espionage, angry employees, … Why they do it? –fun, –fame, –profit, … computer systems are where the moneys are

CS426Fall 2010/Lecture15 Computer Security Issues Computer viruses Trojan horses Computer worms –E.g., Morris worm (1988), Melissa worm (1999), etc. Distributed denial of service attacks Computer break-ins spams –E.g., Nigerian scam, stock recommendations

More Computer Security Issues Identity theft Zero-day attacks Botnets Serious security flaws in many important systems –electronic voting machines, ATM systems Spywares Driveby downloads Social engineering attacks CS426Fall 2010/Lecture16

CS426Fall 2010/Lecture17 Why do these attacks happen? Software/computer systems are buggy Users make mistakes Technological factors –Von Neumann architecture: stored programs –Unsafe program languages –Software are complex, dynamic, and increasingly so –Making things secure are hard –Security may make things harder to use

CS426Fall 2010/Lecture18 Why does this happen? Economical factors –Lack of incentives for secure software –Security is difficult, expensive and takes time Human factors –Lack of security training for software engineers –Largely uneducated population

CS526Spring 2009/Lecture 39 Security is Secondary What protection/security mechanisms one has in the physical world? Why the need for security mechanisms arises? Security is secondary to the interactions that make security necessary.

CS526Spring 2009/Lecture 310 Security is not Absolute Is your car secure? What does “secure” mean? Are you secure when you drive your car? Security is relative –to the kinds of loss one consider security objectives/properties need to be stated –to the threats/adversaries under consideration. security is always under certain assumptions

CS526Spring 2009/Lecture 311 Information Security is Interesting The most interesting/challenging threats to security are posed by human adversaries –security is harder than reliability Information security is a self-sustained field Security is about benefit/cost tradeoff –thought often the tradeoff analysis is not explicit Security is not all technological –humans are often the weakest link

CS526Spring 2009/Lecture 312 Information Security is Challenging Defense is almost always harder than attack. In which ways information security is more difficult than physical security? –adversaries can come from anywhere –computers enable large-scale automation –adversaries can be difficult to identify –adversaries can be difficult to punish –potential payoff can be much higher In which ways information security is easier than physical security?

CS426Fall 2010/Lecture113 What is This Course About? Learn how to prevent attacks and/or limit their consequences. –No silver bullet; man-made complex systems will have errors; errors may be exploited –Large number of ways to attack –Large collection of specific methods for specific purposes Learn to think about security when doing things Learn to understand and apply security principles

CS426Fall 2010/Lecture114 See the Course Homepage 426_Fall10/index.html 426_Fall10/index.html

Course Outline Introduction/review of cryptography Operating system security Software security Access control models Network security Web security CS426Fall 2010/Lecture115

CS426Fall 2010/Lecture116 Ethical use of security information We discuss vulnerabilities and attacks –Most vulnerabilities have been fixed –Some attacks may still cause harm –Do not try these at home

CS426Fall 2010/Lecture117 Readings for This Lecture Required readings: –Information Security on WikipediaInformation Security on Wikipedia Optional Readings: –Counter Hack Reloaded Chapter 1: Introduction –Security in Computing Chapter 1: Is There a Security Problem in Computing

CS426Fall 2010/Lecture118 Coming Attractions … Cryptography: terminology and classic ciphers. Readings for next lecture: –Cryptography on wikipediaCryptography on wikipedia –Interesting reading The Code Book by Simon SinghThe Code Book