Slide #1-1 Introductory Computer Security CS461/ECE422 Fall 2010 Susan Hinrichs.

Slides:



Advertisements
Similar presentations
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Advertisements

Introduction and Logistics Amir Houmansadr CS660: Advanced Information Assurance Spring 2015.
September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Chap 1: Overview Concepts of CIA: confidentiality, integrity, and availability Confidentiality: concealment of information –The need arises from sensitive.
Lecture 1: Overview modified from slides of Lawrie Brown.
1 Overview CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 8, 2004.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
22 November Security and Privacy  Security: the protection of data, networks and computing power  Privacy: complying with a person's desires when.
1 An Overview of Computer Security computer security.
Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational Issues Human Issues Computer.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
April 1, 2004ECS 235Slide #1 Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
“Network Security” Introduction. My Introduction Obaid Ullah Owais Khan Obaid Ullah Owais Khan B.E (I.T) – Hamdard University(2003), Karachi B.E (I.T)
COMP 14 – 02: Introduction to Programming Andrew Leaver-Fay August 31, 2005 Monday/Wednesday 3-4:15 pm Peabody 217 Friday 3-3:50pm Peabody 217.
Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides.
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
Topics in Information Security Prof. JoAnne Holliday Santa Clara University.
An Introduction to Information Assurance COEN 150 Spring 2007.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
PART THREE E-commerce in Action Norton University E-commerce in Action.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
@Yuan Xue CS 285 Network Security Fall 2008.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
1/19/2010Cyber Security Spring 2010 Introduction to Cyber Security Lab CS460 Susan Hinrichs Spring 2010.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
CS461/ECE422 — Computer Security I — Spring 2012.
Introduction 1-1 Lecture 1 University of Nevada – Reno Computer Science & Engineering Department Fall 2015 CPE 400 / 600 Computer Communication Networks.
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
12/18/20151 Computer Security Introduction. 12/18/20152 Basic Components 1.Confidentiality: Concealment of information (prevent unauthorized disclosure.
Fall 2008CS 334 Computer Security1 CS 334: Computer Security Fall 2008.
ECE 374: Computer Networks & Internet Introduction Spring 2012 Prof. Michael Zink.
Lecture 1 Page 1 CS 236 Online Introduction CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Computer Networks CNT5106C
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
@Yuan Xue CS 285 Network Security Fall 2013 Yuan Xue.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
1.1 Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Computer Security Introduction
CS457 Introduction to Information Security Systems
CS 395: Topics in Computer Security
Introductory Computer Security
Introduction to Information Assurance
Overview CSE 465 – Information Assurance Fall 2017 Adam Doupé
Chapter 1: Introduction
Computer Networks CNT5106C
Purpose of Class To prepare students for research and advanced work in security topics To familiarize students working in other networking areas with important.
Data & Network Security
Information and Network Security
Computer Networks CNT5106C
Chapter 1: Introduction
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1.#
Overview CSE 365 – Information Assurance Fall 2018 Adam Doupé
Computer Security Introduction
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
Security.
Computer Networks CNT5106C
Chapter 4: Security Policies
Overview CSE 365 – Information Assurance Fall 2019 Adam Doupé
Presentation transcript:

Slide #1-1 Introductory Computer Security CS461/ECE422 Fall 2010 Susan Hinrichs

Slide #1-2 Outline Administrative Issues Class Overview Information Assurance Overview –Components of computer security –Threats, Vulnerabilities, Attacks, and Controls –Policy –Assurance

Slide #1-3 Administrivia Staff –Susan Hinrichs, lecturer –Sonia Jahid, TA –Jurand Nogiec, TA Communications –Class web page –Newsgroup cs461 Office Hours –Susan: 12:30-1:30pm Wednesday and after class –Sonia and Jurand: TBA

Slide #1-4 More Administrivia Grades –2 midterms worth 25% each. Tentatively: October 6 and November 17. –Final worth 35%. 8am, December 16. –Roughly weekly homework worth 15%. Can drop low homework. 8 homeworks last year. –Extra project worth 20% for grad students taking for 4 credits –Submit homework via compass Class Sections –Online students: geographically distributed –ECE and CS 3 and 4 credit sections

Slide #1-5 A Few Words on Class Integrity Review department and university cheating and honor codes: – gradProg/Honor+Codehttps://agora.cs.illinois.edu/display/under gradProg/Honor+Code – le1_part4_1-402.htmlhttp://admin.illinois.edu/policy/code/artic le1_part4_1-402.html This has been an issue in the past Expectations for exams, homeworks, projects, and papers

Slide #1-6 Class Readings Text Computer Security: Art and Science by Matt Bishop Additional readings provided via compass or public links Books on reserve at the library

Slide #1-7 Class Format Meet three times a week Mostly lecture format –Will attempt to have a class exercise about once a week. Will be noted on class web site. –Will attempt to make this relevant for online students too. Lectures video taped for online students –All have access to tapes. Link on class web site. A few lectures will be video only. Noted on schedule –Will still play video in class Posted slides not sufficient to master material alone

Slide #1-8 Class communication Limited physical access –Lecturer part time on campus Use technology to help –Newsgroup for timely, persistent information – and phone

Slide #1-9 Security Classes at UIUC Three introductory courses –Information Assurance (CS461/ECE422) Covers NSA 4011 security professional requirements Taught every semester –Computer Security (CS463/ECE424) Continues in greater depth on more advanced security topics Taught every semester or so –Applied Computer Security Lab Taught last spring as CS498sh Will be CS460 With CS461 covers NSA 4013 system administrator requirements Two of the three courses will satisfy the Security Specialization in the CS track for Computer Science majors.

Slide #1-10 More Security Classes at UIUC Theoretical Foundations of Cryptography –Prof Manoj Prabhakaran and Prof. Borisov Security Reading Group CS591RHC Advanced Computer Security CS563 Math 595/ECE 559 – Cryptography Local talks and-events ITI Security Roadmap –

Slide #1-11 Security in the News DNS flaws –Dan Kamisky found flaw in widely used DNS protocol requiring upgrade of network infrastructure – InfoWar –Estonia Extortion - –Threaten DDoS attack unless company pays up –DDoS protection from carriers can cost $12K per month Privacy/Identity theft –Albert Gonzalez and 130 million credit card numbers. –Facebook –ChoicePoint, Bank of America, disgruntled waiter Worms –Conflicker, twitter worms –Slammer worm crashed nuclear power plant network

Slide #1-12 Class Topics Mix of motivation, design, planning, and mechanisms See lecture page – lectures.htmlhttp:// lectures.html A few open lecture spots if there are topics of particular interest May have some industry guest lectures

Slide #1-13 Security Components Confidentiality –Keeping data and resources hidden Integrity –Data integrity (integrity) –Origin integrity (authentication) Availability –Enabling access to data and resources

Slide #1-14 CIA Examples

Slide #1-15 Threat Terms Threat – Set of circumstances that has the potential to cause loss or harm. Or a potential violation of security. Vulnerability – Weakness in the system that could be exploited to cause loss or harm Attack – When an entity exploits a vulnerability on system Control – A means to prevent a vulnerability from being exploited

Slide #1-16 Example

Slide #1-17 Classes of Threats Disclosure – Unauthorized access to information Deception – Acceptance of false data Disruption – Interruption or prevention of correct operation Usurpation – Unauthorized control of some part of a system

Slide #1-18 Some common threats Snooping –Unauthorized interception of information Modification or alteration –Unauthorized change of information Masquerading or spoofing –An impersonation of one entity by another Repudiation of origin –A false denial that an entity sent or created something. Denial of receipt – A false denial that an entity received some information.

Slide #1-19 More Common Threats Delay –A temporary inhibition of service Denial of Service –A long-term inhibition of service

Slide #1-20 More definitions Policy –A statement of what is and what is not allowed –Divides the world into secure and non-secure states –A secure system starts in a secure state. All transitions keep it in a secure state. Mechanism –A method, tool, or procedure for enforcing a security policy

Slide #1-21 Is this situation secure? Web server accepts all connections –No authentication required –Self-registration –Connected to the Internet

Slide #1-22 Trust and Assumptions Locks prevent unwanted physical access. –What are the assumptions this statement builds on?

Slide #1-23 Policy Assumptions Policy correctly divides world into secure and insecure states. Mechanisms prevent transition from secure to insecure states.

Slide #1-24 Another Policy Example Bank officers may move money between accounts. –Any flawed assumptions here?

Slide #1-25 Assurance Evidence of how much to trust a system Evidence can include –System specifications –Design –Implementation Mappings between the levels

Slide #1-26 Aspirin Assurance Example Why do you trust Aspirin from a major manufacturer? –FDA certifies the aspirin recipe –Factory follows manufacturing standards –Safety seals on bottles Analogy to software assurance

Slide #1-27 Key Points Must look at the big picture when securing a system Main components of security –Confidentiality –Integrity –Availability Differentiating Threats, Vulnerabilities, Attacks and Controls Policy vs mechanism Assurance