Presentation is loading. Please wait.

Presentation is loading. Please wait.

@Yuan Xue CS 285 Network Security Fall 2013 Yuan Xue.

Similar presentations


Presentation on theme: "@Yuan Xue CS 285 Network Security Fall 2013 Yuan Xue."— Presentation transcript:

1 @Yuan Xue (yuan.xue@vanderbilt.edu) CS 285 Network Security Fall 2013 Yuan Xue

2 @Yuan Xue (yuan.xue@vanderbilt.edu) Course Information When and Where Tuesday/Thursday 1:10pm-2:25pm 298 Featheringill HallFeatheringill Hall Instructor: Yuan Xue (yuan.xue@vanderbilt.edu) Office: 383 Jacobs Hall, Phone: 615-322-2926 Office hours: Tuesday/Thursday 3:00pm-4:00pm or by appointment. TA: Li Li (li.li@vanderbilt.edu) Office: 385 Jacobs Hall, Office hours: Monday/Wednesday 1:00pm-2:30pm or by appointment. Web: http://vanets.vuse.vanderbilt.edu/dokuwiki/doku.php?id=teaching:cs285- fall2013 http://vanets.vuse.vanderbilt.edu/dokuwiki/doku.php?id=teaching:cs285- fall201

3 @Yuan Xue (yuan.xue@vanderbilt.edu) Books and References Textbook [WS] Cryptography and Network Security: Principles and Practice (4 th /5th Edition) by William Stallings Reference books [DM] The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws, by Dafydd Stuttard and Marcus Pinto [MZ] The Tangled Web: A Guide to Securing Modern Web Applications by by Michal Zalewski [KPS] Network Security: Private Communication in a Public World (2nd Edition), by Charlie Kaufman, Radia Perlman, Mike Speciner [AND] Security Engineering: A Guide to Building Dependable Distributed Systems, by Ross J. Anderson [CSP] Security in Computing (3rd Edition), by Charles P. Pfleeger, Shari Lawrence Pfleeger [BIS] Computer Security: Art and Science, by Matthew A. Bishop

4 @Yuan Xue (yuan.xue@vanderbilt.edu) Course Component Lecture Slides + white board Take note Online digest/slides Participation Discussion Presentation Homework 5 assignments Pencil/paper + programming Midterm Project Important component Start early Potential topics Grading Policy  Participation: 10%  Homework: 35%  Midterm: 25%  Project: 30%

5 @Yuan Xue (yuan.xue@vanderbilt.edu) What you will learn from this course What is “ Security ” ? Where the security problems come from?  Potential threats to a system or an application What are the solutions? Apply an appropriate mix of security measures Knowing what has worked, what has failed Both theory, design, principle as well as hands-on experience Security involves many aspects -Operating system, programming language, administration and policy Our Focus: Network Security (Algorithm, protocol, mechanism) We will also discuss OS, programming related security issues.

6 @Yuan Xue (yuan.xue@vanderbilt.edu) Course Topics Security Basics and Principles Symmetric/ Asymmetric Cryptography Basic concept, algorithm, mechanism, Design principles Security Practices Secure protocols, systems and applications (SSL, IPSec, PGP) Hand-on experiences (system/network exploits, defenses) Hot Topics and Recent Development Web security, Wireless Network security, Smartphone, Cloud computing, Worm, DoS attack, etc.

7 @Yuan Xue (yuan.xue@vanderbilt.edu) Survey and Feedback Your input is important Online Survey  http://www.surveymonkey.com/s/5RGGY7K http://www.surveymonkey.com/s/5RGGY7K Feedback

8 @Yuan Xue (yuan.xue@vanderbilt.edu) What is security? In general, security is the condition of being protected against danger or loss. (Wikipedia) In computer security and network security What are the subjects that need to be protected? Let’s start with some terms System  computer, network, application, data, resource Principal: an entity that participate in a system  user, person

9 @Yuan Xue (yuan.xue@vanderbilt.edu) What is security? Computer Security Confidentiality means that only authorized people or system can access the data or resource.  it’s about the receiver Integrity refers to the trustworthiness of data or resources.  about the source  Data integrity means that data can only be modified by authorized people or system in authorized ways  Origin integrity (also called source authentication) means that the source of the data is trustworthy.  Message authentication (= data integrity + origin integrity) means messages received are exactly as sent (i.e. no modification, insertion, deletion, or replay), and the ID of the sender is valid.  Note: timing information (timestamp) is also considered as part of the message. Availability means that people has the ability to use the information or resource desired. Refer to [MB]1.1

10 @Yuan Xue (yuan.xue@vanderbilt.edu) Where the security problem comes from? Let’s look at some example systems Bank Bookkeeping  Core operations customer account, journals recording the transactions  Who has the access to the information? Bank’s own staff – what if they cheat? ATM  Authenticate users based on card and ID number Let’s go Internet  The user – how do we know they are the “real” (authenticate) user?  Protect web servers and bookkeeping database

11 @Yuan Xue (yuan.xue@vanderbilt.edu) Where the security problem comes from? Hospital Patient record system  Who can access the record? – Many parties – insurance company, care giver, researcher, Complicated -- role can change Privacy issue – HIPPA Anonymize the record for research  Is it sufficient? Show me all records of 59-year-old males who were treated for a broken collarbone on September 15, 1966 Drug management Let’s go to Internet/Web  Patient Portal, Electronic Medical Record

12 @Yuan Xue (yuan.xue@vanderbilt.edu) Where the security problem comes from? In real world where systems interact with each other… imagine physical systems controlled by computers, communicated via networks (cyber-physical system) Let’s watch a video clip..


Download ppt "@Yuan Xue CS 285 Network Security Fall 2013 Yuan Xue."

Similar presentations


Ads by Google