CIS 4930/6930: Systems Security Instructor: Xinming “Simon” Ou TA: Xiaolong “Daniel” Wang Class time: MW 2-3:15 1.

Slides:



Advertisements
Similar presentations
Slide 01-1COMP 7370, Auburn University COMP 7370 Advanced Computer and Network Security Dr. Xiao Qin Auburn University
Advertisements

Introduction and Logistics Amir Houmansadr CS660: Advanced Information Assurance Spring 2015.
Fall 2004 WWW IS112 Prof. Dwyer Intro1: Overview and Syllabus Professor Catherine Dwyer.
General information CSE 230 : Introduction to Software Engineering
CSE 322: Software Reliability Engineering Topics covered: Course outline and schedule Introduction, Motivation and Basic Concepts.
Administrative Issues ICS 151 Fall 2007 Instructor: Eli Bozorgzadeh.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
National Institute of Standards and Technology Computer Security Division Information Technology Laboratory Threat Information Sharing; Perspectives, Strategies,
Computer Network Fundamentals CNT4007C
COMP Introduction to Programming Yi Hong May 13, 2015.
Computer Networks CEN 5501C Spring, 2008 Ye Xia (Pronounced as “Yeh Siah”)
Introduction to Information Security J. H. Wang Sep. 15, 2014.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Lecture 1 Page 1 CS 239, Fall 2010 Introduction CS 239 Advanced Topics in Computer Security Peter Reiher September 23, 2010.
1 Introduction to Operating Systems 9/16/2008 Lecture #1.
WEEK-1 PRINCIPLES OF MANAGEMENT BUSN 107, Özge Can.
Xx-341: Communication in Groups &Organizations Robert Kraut HCII/Tepper NSH 3515 Office hours – after class & send
Administrative Issues ICS 151 Winter 2010 Instructor: Eli Bozorgzadeh.
GEL 1005: Natural Disasters ► Instructor: Mike Phillips ► Contact   ► put “ GEL 1005 ” in subject line 
Understanding the Academic Structure of the US Classroom: Syllabus.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
CS355 Advanced Computer Architecture Fatima Khan Prince Sultan University, College for Women.
Fundamentals of Scientific Research Dr. Samir Tartir 2014/2015 First Semester.
CS461/ECE422 — Computer Security I — Spring 2012.
Course Overview Stephen M. Thebaut, Ph.D. University of Florida Software Engineering Foundations.
MRKT 370 – PRINCIPLES OF MARKETING FALL 2003 Dr. Ugur Yucelt Office Phone: Class Time: MW: 12:30-1:45 Office hours: MW:2:00-6:00 pm
1 CAP6133: Advanced Topics in Computer Security and Computer Forensics (spring’08) Class Overview Dr. Cliff Zou.
Welcome to EECS 395/495 Networking Problems in Cloud Computing.
SCHILLER INTERNATIONAL UNIVERSITY
11 ENGR 101 Introduction to Engineering Fall 2009 Dr. Mustafa Arafa American University in Cairo Mechanical Engineering Department
Syllabus Highlights CSE 1310 – Introduction to Computers and Programming Vassilis Athitsos University of Texas at Arlington 1.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
MIS 3320 Systems Analysis & Design Fall 2015 Mrs. Nancy Sánchez
HIPAA Security Final Rule Overview
CS151 Introduction to Digital Design Noura Alhakbani Prince Sultan University, College for Women.
Objective Advance your knowledge Practice to analyze and report open scientific literature Practice Critical Thinking Teamwork & Specialization Scientific.
Computer Networks CNT5106C
IST 210: ORGANIZATION OF DATA Introduction IST210 1.
MIS 4850 Systems Security Abdou Illia, Ph.D School of Business Eastern Illinois University (Monday 1/11/2016)
Lecture 0 Overview Hong, You Pyo, DGU 1. Y. Hong Microprocessor A semiconductor device that contains a CPU (Central Processing Unit) and peripherals In.
ICS 151 Digital Logic Design Spring 2004 Administrative Issues.
CIS 505: Programming- Language Paradigms Torben Amtoft Xinming (Simon) Ou Aug 23, 2010.
Course Overview 1 MAT 279 Data Communication and the Internet Prof. Shamik Sengupta Office 4210 N
Applied Security Breno de Medeiros Florida State University Spring 2007.
CIS 4930/6930: Systems Security
Computer Network Fundamentals CNT4007C
Welcome to CS 4390/CS5381: Introduction to Formal Methods
Course Overview CS 4501 / 6501 Software Testing
CIS 4930/6930: Systems Security
CSE 662 – Languages and Databases Class Overview
Computer Networks CNT5106C
US 130 Principles of Urban Sustainability
Introduction and Overview
Operating Systems: Principles and Practice Cpr E 308
SEC 400 Competitive Success/snaptutorial.com
SEC 400 Education for Service-- snaptutorial.com.
SEC 400 Teaching Effectively-- snaptutorial.com
Computer Networks CNT5106C
ISA 562 Information Security Theory and Practice
Administrative Issues
Exam Logistics Rationale #6
Operating Systems: Principles and Practice Cpr E 308
Course Overview CS 4640 Programming Languages for Web Applications
Administrative Issues
Computer Networks CNT5106C
Administrative Issues
Lecture 1a- Introduction
Course Introduction Data Visualization & Exploration – COMPSCI 590
SWE 632 User Interface Design and Development
Presentation transcript:

CIS 4930/6930: Systems Security Instructor: Xinming “Simon” Ou TA: Xiaolong “Daniel” Wang Class time: MW 2-3:15 1

Logistics Course website: ??? where you can find –Lecture slides –Programming assignments and homework –Reading materials 2

Logistics - continued Communications –A facebook group will be created and you will be invited to join. Feel free to post your questions/comments/ideas attendant to the course. –Course announcements will be made through s. Questions to instructor and TA must be sent through s to guarantee a response. 3

What is this course about? Provide a comprehensive treatment of computer system security –Attackers do not play by any rules –How protection mechanisms in OS can help mitigate attacks –Different types of OS protections –Utilizing special hardware for security Cover both defense and offense aspects Cover both theory and practice 4

Topics Common attack techniques OS protection mechanisms Mandatory access control Capability systems Trusted computing Device security Cloud security 5

Tasks Lectures Readings Assignments (about one per week) –Homework –Programming projects Exams –Midterm and Final 6

Grades 7 Homework and projects: 50% Exams: 40% Class participation: 10% CIS4930 and CIS6930 graded separately

Collaboration Policy Exams: no collaboration Homework and programming assignments: discussion with other students OK, but must indicate who you discussed with in your submission 8

Class Participation (CIS 6930) Everyone must present one reading assignment (5 pts). –Order will be sent through –One week to finish reading and prepare for a 20-min presentation in class Students not presenting participate in the discussion (e.g., asking questions) (5 pts). –We will also ask you questions during the presentation 9

Class Participation (CIS 4930) Participate in the class discussion (e.g., asking questions during lectures and paper presentations) (10 pts). –We will also ask you questions 10

What is Security? Classical definition: –Confidentiality –Integrity –Availability Security is the prevention of threats from causing undesired effects –Threat model is important: who are your adversaries? What is at stake? 11

Can we have absolute security? Security is always a trade off between cost and risks Threat model: –Who are the adversaries? –What are their motivations? –How capable are they? –How much risk can they afford? Effectiveness of countermeasures: –How much risk is reduced for users? –How much inconvenience is incurred on users? –How much risk is increased for adversaries? 12

Example1: Spam s Which one of C,I,A does this problem fall into? What is the threat model? What are possible counter measures? 13

Example 2 14

It is a Human Problem Security is as much a social, organizational, and economic problem as it is a technical problem –Incentives for good behaviors vs. bad behaviors –Technologies contribute to/help address the problem 15

What do you mean by “System Security” “System” is a platform on which various applications function. –In most cases you can think of it as OS A system provides various protection mechanisms for the applications within it. –Protection is closely related to security, although not the same. 16