ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.

Slides:



Advertisements
Similar presentations
© Ravi Sandhu Introduction to Information Security Ravi Sandhu.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
SECURITY AND INFORMATION SYSTEMS THE EVOLUTION OF SECURITY SYSTEMS Created By: Jamere Hill Instructor: Kyhia Bostic Section University of Houston.
POSSIBLE THREATS TO DATA
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Course Introduction.
7 Effective Habits when using the Internet Philip O’Kane 1.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Chapter 9: Privacy, Crime, and Security
Chapter 8 Chapter 8 Digital Defense: Securing Your Data and Privacy
Security+ Guide to Network Security Fundamentals
Threats To A Computer Network
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
ITIS 6167/8167: Network and Information Security Weichao Wang.
ITIS 6200/8200: Principles of Information Security and Privacy Dr. Weichao Wang.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
INFORMATION SECURITY UPDATE Al Arboleda Chief Information Security Officer.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
CYBER CRIME AND SECURITY TRENDS
CAP6135: Malware and Software Vulnerability Analysis Examples of Term Projects Cliff Zou Spring 2012.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Discovering Computers 2010
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Securing Information Systems
Protecting Yourself Online (Information Assurance)
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
BotNet Detection Techniques By Shreyas Sali
CS 325: Software Engineering April 14, 2015 Software Security Security Requirements Software Security in the Life Cycle.
Staying Safe Online Keep your Information Secure.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Protecting Your Information Assets
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
ECE Lecture 1 Security Services.
Session 7 LBSC 690 Information Technology Security.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Types of Electronic Infection
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
Host and Application Security Lesson 17: Botnets.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
What is Spam? d min.
The Security Circus MPICT Summer Conference, June, 2011.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Information Management System Ali Saeed Khan 29 th April, 2016.
Securing Information Systems
Unit 3 Section 6.4: Internet Security
ITIS 6200/8200: HCIP 6200 Principles of Information Security and Privacy Dr. Weichao Wang.
Securing Information Systems
Risk of the Internet At Home
Staying safe on the internet
Introduction to Internet Worm
Presentation transcript:

ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang

Syllabus See handout –Homework will usually have 4-5 questions and due in one week. It is due at the time that the class begins. –Late homework and term paper Within 24 hours: 50% of full score After that: 0% –Project Individual project –Conduct some hands-on experiments –Or choose a security problem and write a survey paper –A reference question list will be provided –Midterm and final exam –Misc: eating, drinking, and cell phone (text & twitter)

Before class An interesting question –Two companies each has some private data. They need to jointly calculate some result without disclosing their information. Secure multiparty computation Is this solution useful? –Zero knowledge proof: Can I prove to you that I know a secret without telling you anything? (practically) –Anonymously publishing data or information

Perfect Storm of Social Networks In 2011, Facebook announced they had surpassed 750M users. Twitter claims 175M registered users Almost 68% of all Internet traffic is social media or search Facebook is the 4 th largest website in the world having grown 157% between 2008 and 2009 – 1,928% in the US alone Social media marketing will grow from $714M in 2009 to $3.1B by 2014 Attacks on social media sites is up 240% from phishing attacks alone 4

Attacks Are On The Rise Spam, phishing and malware attacks through social media are growing: 70% rise in firms encountering spam and malware attacks via social networks in 2009 ‒ Over 50% received spam via social networks ‒ Over 33% received malware via social networks Organizations that have been victims of attack through social networking sites 5

Examples in real life Attack on Twitter –Hack into the victim’s account –DDoS to paralyze Twitter, facebook, etc Data mining attacks on public database –In Tenn, a newspaper generates a database about all residents that have CCW permits. –In CA, there is a webpage listing all people that donate to Proposition 8 ballot measure

Examples in real life Worm attack on smart grid Use social network to detect disease breakout Remotely control insulin pump of a patient Code during the war –Navajo Code in WWII – 266R.jpghttp:// 266R.jpg

–Computers have controlled our lives Medical, ATM, banking, business Air traffic control

Security overview Risks –Why there are risks Adversaries –Smart and dedicated –Many of them, considering the high employment rate –Hiding in the dark –From fun to profit (worm  self-changing  botnet  target at specific systems)

Security overview Physical security is not enough (can you be sure that your physical security methods are sound and enough? Example in Las Vegas, supply chain attacks, internal attacks) Networked computers can be accessed remotely

Security overview What can go wrong –Trojan war story (trojan horse): USB keys –Corrupted internal worker –Vulnerabilities of protocols or security mechanisms (security patch has problems too) –By-passing protection walls –Backdoors for systems (Linux password) –Known attacks ignored (push and poll)

Information security Encryption –You can read the information only when you know the key Authentication –You are who you claim you are Authorization –The role and the right

Information security Information integrity –The data has never be changed or changed in an inappropriate way Non-repudiation –Cannot deny your words (digital cash example) Privacy –Who should know, how much, how to use the information Your cell phone or medical records RFID Your smart meter

Security overview Defending methods –Prevention Prevent (password, salt, private salt, searching) Deter: raising the bar (password guessing, login slow) Deflect: making other target more attractive Diversify –Detection Monitoring (who, what, and how) Intrusion detection (signature based, anomaly based) IP telephony track Authenticity of the evidence (digital media)

Security Overview Recovery –Recover data (check point) –Identify the damage –Forensics –Confinement Tolerance –Maintain a decent service quality –Automatically degrade video quality while reserving bandwidth for voice