CS461/ECE422 — Computer Security I — Spring 2012.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Introduction and Logistics Amir Houmansadr CS660: Advanced Information Assurance Spring 2015.
September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Chap 1: Overview Concepts of CIA: confidentiality, integrity, and availability Confidentiality: concealment of information –The need arises from sensitive.
1 Network Security Ola Flygt Växjö University
Lecture 1: Overview modified from slides of Lawrie Brown.
1 Overview CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 8, 2004.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
1 An Overview of Computer Security computer security.
Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational Issues Human Issues Computer.
6/19/2015 Prof. Ehud Gudes Security Ch 1 1 Chapter 0 - Overview.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
April 1, 2004ECS 235Slide #1 Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
“Network Security” Introduction. My Introduction Obaid Ullah Owais Khan Obaid Ullah Owais Khan B.E (I.T) – Hamdard University(2003), Karachi B.E (I.T)
Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides.
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
Topics in Information Security Prof. JoAnne Holliday Santa Clara University.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Storage Security and Management: Security Framework
Cryptography and Network Security
Lecture 1: Overview modified from slides of Lawrie Brown.
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
CIS 4930/6930: Systems Security Instructor: Xinming “Simon” Ou TA: Xiaolong “Daniel” Wang Class time: MW 2-3:15 1.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Slide #1-1 Introductory Computer Security CS461/ECE422 Fall 2010 Susan Hinrichs.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
12/18/20151 Computer Security Introduction. 12/18/20152 Basic Components 1.Confidentiality: Concealment of information (prevent unauthorized disclosure.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Fall 2008CS 334 Computer Security1 CS 334: Computer Security Fall 2008.
Lecture 1 Page 1 CS 236 Online Introduction CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Computer Security Introduction
CS457 Introduction to Information Security Systems
CS 395: Topics in Computer Security
Introductory Computer Security
Introduction to Information Assurance
Overview CSE 465 – Information Assurance Fall 2017 Adam Doupé
Information Security, Theory and Practice.
CIS 4930/6930: Systems Security
Chapter 1: Introduction
Purpose of Class To prepare students for research and advanced work in security topics To familiarize students working in other networking areas with important.
Information System and Network Security
Data & Network Security
CNET334 - Network Security
Information and Network Security
Computer and Network Security
Chapter 1: Introduction
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
امنیت شبکه علی فانیان
Cryptography and Network Security
Overview CSE 365 – Information Assurance Fall 2018 Adam Doupé
Network Security Ola Flygt Växjö University
Computer Security Introduction
Computer Networks CNT5106C
Introduction to Cryptography
Cryptography and Network Security
Overview CSE 365 – Information Assurance Fall 2019 Adam Doupé
ONAP Risk Assessment – Preparation Material - Overview of the Process - Terminology - Assumptions
Presentation transcript:

CS461/ECE422 — Computer Security I — Spring 2012

 Computing in the presence of an adversary  Adversary (threat agent) An entity that attacks, or is a threat to, a system.  Attack An assault on system security that derives from an intelligent threat; that is, an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system. [source: RFC 2828] Nikita Borisov — UIUC2

 Security Services  Prevent “bad” things from happening  Mechanism  Security Policies  Define what is “bad” and what is “good”  Policy Nikita Borisov — UIUC3

AreaUsual perspectiveSecurity perspective ReliabilityRandom failuresDeliberate failures UsabilityUser confusionUser deception Programming languages (memory safety) CrashesEntrance vector Software engineering (bugs) Software qualityAttack vectors Nikita Borisov — UIUC4

 Security only as good as weakest link  Must understand all parts of the system  O/S  Networking  Devices  Physical security  People  We will cover some of these topics Nikita Borisov — UIUC5

 Task: log into online bank account to transfer funds  What are the vulnerabilities? Nikita Borisov — UIUC6

 Confidentiality  Keeping data and resources hidden  Privacy  Integrity  Data integrity (integrity)  Origin integrity (authentication)  Availability  Enabling access to data and resources Nikita Borisov — UIUC Slide #1-7

Authenticity Property of being genuine. Can be verified and trusted Accountability Actions of an entity can be traced uniquely to that entity Nonrepudiation or “you can’t escape your past” Nikita Borisov — UIUC8

 Threat – Set of circumstances that has the potential to cause loss or harm. Or a potential violation of security.  Vulnerability – Weakness in the system that could be exploited to cause loss or harm  Attack – When an entity exploits a vulnerability on system  Control or Countermeasure – A means to prevent a vulnerability from being exploited Slide # Nikita Borisov — UIUC

Security entails:  Identifying assets  Identifying vulnerabilities  Designing countermeasures  Assessing risk [Figure 1.2 from Stallings & Brown] Nikita Borisov — UIUC10

Slide # Nikita Borisov — UIUC

 Disclosure – Unauthorized access to information  Deception – Acceptance of false data  Disruption – Interruption or prevention of correct operation  Usurpation – Unauthorized control of some part of a system Slide # Nikita Borisov — UIUC

 Snooping or interception  Unauthorized interception of information  Falsification  Unauthorized change of information  Masquerading or spoofing  An impersonation of one entity by another  Repudiation  A false denial that an entity received some information. Slide # Nikita Borisov — UIUC

 Policy  A statement of what is and what is not allowed  Divides the world into secure and non-secure states  A secure system starts in a secure state. All transitions keep it in a secure state.  Mechanism or Implementation  A method, tool, or procedure for enforcing a security policy  Prevent, detect, response, or recovery Slide # Nikita Borisov — UIUC

 Web server accepts all connections  No authentication required  Self-registration  Connected to the Internet Slide # Nikita Borisov — UIUC

 Locks prevent unwanted physical access.  What are the assumptions this statement builds on? Slide # Nikita Borisov — UIUC

 Policy correctly divides world into secure and insecure states.  Mechanisms prevent transition from secure to insecure states. Slide # Nikita Borisov — UIUC

 Bank officers may move money between accounts.  Any flawed assumptions here? Slide # Nikita Borisov — UIUC

 Evidence of how much to trust a system  Evidence can include  System specifications  Design  Implementation Slide # Nikita Borisov — UIUC

 Why do you trust Aspirin from a major manufacturer?  FDA certifies the aspirin recipe  Factory follows manufacturing standards  Safety seals on bottles  Analogy to software assurance Slide # Nikita Borisov — UIUC

 Must look at the big picture when securing a system  Main components of security  Confidentiality  Integrity  Availability  Differentiating Threats, Vulnerabilities, Attacks and Controls  Policy vs mechanism  Assurance Slide # Nikita Borisov — UIUC

 Staff  Nikita Borisov, instructor  Qiyan Wang, TA  Communications  Class web page  Newsgroup class.sp12.cs461  More to come next class Slide # Nikita Borisov — UIUC

 Two lectures / week  Each lecture:  Starts 8am sharp  i-Clicker review questions  5-minute break halfway through  Active learning exercises  ~1 per week  Help keep you awake!  Bring pen, paper Nikita Borisov — UIUC23

 Midterm: 20%  Final: 40%  Homework: 15%  Every 1-2 weeks  Security analysis: 15%  See next slide  Participation: 10%  Extra project worth 20% for grad students taking for 4 credits Slide # Nikita Borisov — UIUC

 Last few days of Slashdot Nikita Borisov — UIUC25

 Analyze a current event  Report what happened  Describe threats, vulnerabilities, assets, and risks involved  Identify lessons  Analyze an existing system  Perhaps one you encounter in daily life ▪ Pictures are great  Describe threats, vulnerabilities, assets, and risks involved Nikita Borisov — UIUC26

 Total requirements: 3 in a semester  At least one current event and one existing system  Due Feb 14, Mar 13, Apr 17  May be done in groups  1-3 students per group  Posted in forum  TBA Nikita Borisov — UIUC27

 i-Clicker participation  Comments / questions in class, on newsgroup  Discussion of security analyses  100% participation not required for 100% of grade Nikita Borisov — UIUC28

 Review department and university cheating and honor codes:  g/Honor+Code g/Honor+Code  4_1-402.html 4_1-402.html  This has been an issue in the past  Expectations for exams, homeworks, projects, and papers Slide # Nikita Borisov — UIUC

 Main text:  Computer Security: Principles and Practice by William Stallings and Lawrie Brown  Additional readings provided via compass or public links  Books on reserve at the library Slide # Nikita Borisov — UIUC

 Three introductory courses  Computer Security I (CS461/ECE422) ▪ Covers NSA 4011 security professional requirements ▪ Taught every semester (mostly)  Computer Security II (CS463/ECE424) ▪ Continues in greater depth on more advanced security topics ▪ Taught every 1-2 semesters  Applied Computer Security Lab (CS460/ECE419) ▪ With CS461 covers NSA 4013 system administrator requirements  Two of the three courses will satisfy the Security Specialization in the CS track for Computer Science majors. Slide # Nikita Borisov — UIUC

 Cryptography  Theoretical foundations (Prabhakaran)  Applied cryptography (Prabahkaran & Borisov)  Number theory (Blahut)  Security Reading Group CS591RHC  Advanced Computer Security CS563  Local talks  events events  ITI Security Roadmap  Slide # Nikita Borisov — UIUC