11/26/2015 9:14 AM Midterm Grading Comments James Hook CS 591: Introduction to Computer Security.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
6/20/2015 7:37 PM Lecture 5: Integrity Models James Hook CS 591: Introduction to Computer Security.
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
Cryptography and Network Security
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Integrating Diffie-Hellman Key Exchange into the Digital Signature Algorithm IEEE Communications Letters, March 2004 Lein Harn, Manish Metha and Wen- Jung.
Information Security. Information Security Requirements Confidentiality: Protection from disclosure to unauthorised persons Access control: Unauthorised.
7/16/2015 3:58 AM Lecture 4: Bell LaPadula James Hook CS 591: Introduction to Computer Security.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
CSCE 715: Network Systems Security
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Network Security Lecture 23 Presented by: Dr. Munam Ali Shah.
Lattice-Based Access Control Models Ravi S. Sandhu Colorado State University CS 681 Spring 2005 John Tesch.
Karlstad University IP security Ge Zhang
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
Cryptography and Network Security (CS435) Part One (Introduction)
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Access Control MAC. CSCE Farkas 2 Lecture 17 Reading assignments Required for access control classes:  Ravi Sandhu and P. Samarati, Access Control:
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Chapter 8 IP Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Lecture 5.1: Message Authentication Codes, and Key Distribution
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
Integrating A Key Distribution Procedure Into The Digital Signature Standard B. Arazi Electronics Letters Vol. 29, No. 11, Pg May 1993 Adviser:
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Secure Key Exchange: Diffie-Hellman Exchange Dr. Rocky K. C. Chang 19 February, 2002.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
Fall 2006CS 395: Computer Security1 Key Management.
Network Layer Security Network Systems Security Mort Anvari.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
Cryptography and Network Security
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Cryptography and Network Security
Security Mechanisms Network Security.
Presentation transcript:

11/26/2015 9:14 AM Midterm Grading Comments James Hook CS 591: Introduction to Computer Security

11/26/2015 9:14 AM Grading Guide: Q1: Availability, Integrity, Confidentiality –2 points each definition –1 point each illustration of violation –1 point for attempting problem Q2: Policy and Mechanism –3 points each definition –2 points each example

11/26/2015 9:14 AM Grading Guide: Q3: Chinese Wall –3 points for motivating scenario –3 points for mechanisms (COI, simple security rule, *-rule) –2 points how to model with Bell LaPadula –2 points shortcomings of using Bell LaPadula Q4: Digital signature –3 points: agreement adjudicated by trusted third party –2 points: property: non-repudiation –2 points: property compromised by bogus (non-repudiation) –3 points: justification of forgery attack

11/26/2015 9:14 AM Grading Guide: Q5: Access controls –2 points each AC control mode –3 points which plays with which (1 per pair) –1 point for attempting problem Q6: DG/UX confidentiality & integrity –4 points: range of levels (MAC tuples) –3 points: why confidentiality; what protected –3 points: why integrity; what protected

11/26/2015 9:14 AM Grading Guide: Q7: Denning Information Flow –5 points: a flow exploiting exceptions –5 points: discussion of how to control Looked for evidence of how to control within the model of Denning and Denning, e.g. assigning labels and constraints to exception handlers Q8: Nonces –5 points: Nonces prevent replay –5 points: Give a replay attack of simplified protocol

11/26/2015 9:14 AM Grading Guide: Q9: Block/Stream –2 points each definition (block/stream) –2 points each classification Q10: Crypto facts –2 points each Diffie-Hellman allowed either DH algorithm for key negotiation (intended answer) or general contribution of public key encryption framework [consulted text; this was stressed DH contribution]

11/26/2015 9:14 AM Distribution: Average = 70.4 Exam will be graded on a curve.