Friends of Switzerland1 The Changing Landscape of Programming Technology Karl Lieberherr Northeastern University.

Slides:



Advertisements
Similar presentations
P ASSWORD S ECURITY. I F SOMEONE HAS YOUR PASSWORD, EITHER FROM YOU GIVING IT OUT OR THEM FIGURING OUT, THEY COULD : 1.Send abusive or threatening .
Advertisements

User Interface Design Yonsei University 2 nd Semester, 2013 Sanghyun Park.
Users Are Not Dependable How to make security indicators that protect them better Min Wu, Simson Garfinkel, Robert Miller MIT Computer Science and Artificial.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Social Phishing Tom N. Jagatic Nathaniel A. Johnson Markus Jakobsson Filippo Menczer Presenter: Ieng-Fat Lam Date: 2007/4/1.
Agile Requirements Methods CSSE 371 Software Requirements and Specification Mark Ardis, Rose-Hulman Institute October 26, 2004.
The 2001 Faculty Survey Results by question. The 2001 Faculty survey Distributed in February faculty, stratified random sample 783 responses.
Miscreant of Social Networks Paper1: Social Honeypots, Making Friends With A Spammer Near You Paper2: Social phishing Kai and Isaac.
Extreme Programming Team Members Gowri Devi Yalamanchi Sandhya Ravi.
Lecture 1 Page 1 CS 236, Spring 2008 What Are Our Security Goals? Confidentiality –If it’s supposed to be a secret, be careful who hears it Integrity –Don’t.
Computer Engineering 203 R Smith Agile Development 1/ Agile Methods What are Agile Methods? – Extreme Programming is the best known example – SCRUM.
March Intensive: XSS Exploits
Software engineering and outsourcing Dragan Jankovic Tatjana Stankovic Faculty of Electronic Engineering University of Nis, Serbia 8th Workshop "Software.
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
 Communicating with friends is now easier than ever, for example on Facebook you can connect with all your friends and chat to them very easily and instantly.
AEW studios Who We Are We run a small IT-based business. We've been in business for 3½ years. Essentially the business is husband/wife.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
PART THREE E-commerce in Action Norton University E-commerce in Action.
P HI SH I NG !. WHAT IS PHISHING ? In computer security phishing is trying to acquire important information such as; passwords, usernames and credit card.
Software Engineering Modern Approaches
What is Social Engineering. Pretexting Pretexting is the act of creating and using an invented scenario called the Pretext to persuade a target to release.
Reliability & Desirability of Data
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
College of Computer Science Karl Lieberherr. Projects Focus on two Projects: –Karl Lieberherr: Demeter and Aspect-Oriented Programming Java tools XML.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
SCIENCE FAIR Survival Techniques Presenter: Mrs. D. Brown November 22, 2008.
Fundamental Programming: Fundamental Programming K.Chinnasarn, Ph.D.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
TCP Sockets Reliable Communication. TCP As mentioned before, TCP sits on top of other layers (IP, hardware) and implements Reliability In-order delivery.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 5: Basic Security.
AP-1 4. Agile Processes. AP-2 Agile Processes Focus on creating a working system Different attitude on measuring progress XP Scrum.
CSE 102 Introduction to Computer Engineering What is Computer Engineering?
Lecture 1 Page 1 CS 236 Online What Are Our Security Goals? CIA Confidentiality –If it’s supposed to be a secret, be careful who hears it Integrity –Don’t.
Virtually Agile Astro Sabre (Matt Ganis) IBM, Senior Technical Staff Member Hawthorne, NY - September 20, 2007.
My audience will be excited to learn the basics of what a network systems & data communications analyst does.
Agile Methods Presentation By: Jason Abbett. Definition A process to rapidly develop software Many kinds of agile methods but few are practiced.
PHISHING PRESENTED BY: ARQAM PASHA. AGENDA What is Phishing? Phishing Statistics Phishing Techniques Recent Examples Damages Caused by Phishing How to.
By Ramesh Mannava.  Overview  Introduction  10 secure software engineering topics  Agile development with security development activities  Conclusion.
IT has had a big impact social in many different ways. Facebook is a social networking site that allows people to communicate and stay in touch with friends.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
Mohssen Mohammed Sakib Pathan Building Customer Trust in Cloud Computing with an ICT-Enabled Global Regulatory Body Mohssen Mohammed Sakib Pathan.
Best ways to Hack Facebook Account Now a days Facebook becomes the number 1 social networking portal that touches every one’s life. People are now a days.
Kentico Learning Management System The Academy.
Analysing s Michael Jones. Overview How works Types of crimes associated with Mitigations Countermeasures Michael Jones2Analsysing s.
Software Development Life Cycle. The Software Life Cycle  Encompasses all activities from initial analysis until end of work  Formal process for software.
Fall Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity.
CS457 Introduction to Information Security Systems
SQL Injection.
An Introduction to Phishing and Viruses
Chapter 1- Introduction
Outline Basic concepts in computer security
presented by: Lingzi Hong
Social Engineering Charniece Craven COSC 316.
Extreme Programming.
BIS 320 NERD Lessons in Excellence-- bis320nerd.com.
Information Technology Services Education and Awareness Team
The Art of Deception.
Home Internet Vulnerabilities
Our Wireless Enterprise Help Desk (WEHD) is here to assist you 24 hours a day, 7 days a week, 365 days a year. We also have our own private number.
Chapter 3: Agile Software Processes
Information Technology Services Education and Awareness Team
What Are Our Security Goals?
Security in mobile technologies
Aspect Oriented Software Design
Marcial Quinones-Cardona
EDI Systems What They Are and Why They Matter
Presentation transcript:

Friends of Switzerland1 The Changing Landscape of Programming Technology Karl Lieberherr Northeastern University

Friends of Switzerland2 Swiss connection PhD from ETH Zurich: Pascal, Modula, Oberon (Wirth) Sabbatical 2000 with UBS Zurich Sabbatical 2006 with Novartis Collaborations with ABB and Mettler- Toledo One Swiss PhD Yearly summer vacation in Switzerland

Friends of Switzerland3 How I came to Boston 1983: GTE in Waltham, now Verizon 1985: tenured full professor at Northeastern I like it here!

Friends of Switzerland4 Goal We want reliable and secure software. No technical vulnerabilities. Not enough: social vulnerabilities are also very important in the age of the web.

Friends of Switzerland5 Outline Program Organization –Crosscutting Concerns –Law of Demeter Programming Team Organization –Extreme Programming Security: –Social Phishing –SAT solvers

Friends of Switzerland6 Software bugs Excel 2007 multiplication bug: September 2007 –850 * 77.1 should be but displays as

Friends of Switzerland7 Program Organization cross-cutting concerns the tyranny of the primary decomposition –organize software into modules group functionality that lives in several modules

Friends of Switzerland8 Law of Demeter Organization principle for objects –“talk only to your friends” –“each object talks only to a limited number of other objects” –avoids information overload for the programmer –from Northeastern Leads to objects that are easier to change

Friends of Switzerland9 Extreme Programming Planning around User Stories Small Releases of Functionality Simple Design –build what is asked for, no design for the future Continuous testing

Friends of Switzerland10 Extreme Programming Pair Programming Collective Product (Code) Ownership –Design, Coding Standards Continuous integration On-site Customer Representative

Friends of Switzerland11 SAT Solvers a fundamental topic in computer science express your “wishes” computer satisfies as many as possible used for software and hardware verification based on learning from mistakes (non- chronological backtracking) can solve systems with over parameters (variables)

Friends of Switzerland12 Social Phishing friendly message tempts recipients to reveal more online than they otherwise would. impersonating a trustworthy entity

Friends of Switzerland13 class project at Johns Hopkins find publicly available information from social networks: MySpace, Facebook, LinkedIn. how can a phisher exploit social network data? very easily and effectively over four times as likely to become a victim if they are solicited by someone appearing to be a known acquaintance

Friends of Switzerland14 Observations 77% females, 65% males But trick males by sending them a spoofed message appearing to come from a female (68% if message from female versus 53% if from another male) somewhat reassuringly: computer science students were the least vulnerable

Friends of Switzerland15 Observations: observed reactions after debriefing message Anger –significant social cost to victims Denial –we find it difficult to admit our own vulnerability: many successful phishing attacks go unreported

Friends of Switzerland16 Conclusions Still a very exciting time in computer and information science. Computer science students have excellent job prospects, despite outsourcing.