Security Systems Theory UG2 Module Introduction Themes 1. Top down design of security systems – security technologies as 'black boxes'. 2. Internal design.

Slides:



Advertisements
Similar presentations
CICT Course Introduction The aim of this course is to provide you with practical ICT skills to help with your studies.
Advertisements

Chapter 1  Introduction 1 Introduction Chapter 1  Introduction 2 The Cast of Characters  Alice and Bob are the good guys  Trudy is the bad guy 
Chapter 1  Introduction 1 Chapter 1: Introduction.
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Financial Management 2BUS0197 Introduction to Module.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Bruce Schneier Lanette Dowell November 25, Introduction  “It is insufficient to protect ourselves with laws; we need to protect ourselves with.
Thirty Years Later: Lessons from the Multics Security Evaluation Paul A. Karger & Roger R. Schell Presented by: Sulaiman Alkhezi.
Database Design Concepts Info 1408 Lecture 1 Introduction to the module.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
CIS700: Hardware Support for Security Professor Milo Martin
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
Lecture 11 Reliability and Security in IT infrastructure.
CMSC 414 Computer and Network Security Jonathan Katz.
Module Code CT1H01NI: Study Skills For Communication Technology Lecture for Week Autumn.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
Thomas Levy. Agenda 1.Aims: CIAN 2.Common Business Attacks 3.Information Security & Risk Management 4.Access Control 5.Cryptography 6.Physical Security.
Using cryptography to protect data in networks. Summary National Taras Shevchenko University of Kiev Ukraine Vsevolod Ievgiienko.
G53SEC Computer Security Introduction to G53SEC 1.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
IMAT1906 Systems Development Lecture 1: Introduction.
{ Active Directory Security Why bother?.   Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if.
HNDComputing – DeMontfort University  DeMontfort University 2011 Introduction to Module IMAT1408 wk1 Database Design ConceptsDatabase Design Concepts.
CPSC203 Introduction to Computers Lab 33 By Jie Gao.
Welcome During the module you will learn how to create applications for the Web We will be using Active Server Pages (ASP.NET) the language is VB.NET.
SKU3033 / SKF3033 NETWORK & SYSTEM ADMINISTRATOR.
Course - DT249/1, DT249/1P Module (Subject) - Information Systems in Organisations COURSE SUBJECT OVERVIEW Semester 1, Week 1 1.
Chapter 1  Introduction 1 Chapter 1: Introduction.
ENGR Welcome to ENGR Excellence – Impact - Innovation.
Technical Orientation Summer Technical Orientation Session starts at 2:00 pm – We’ll be online shortly – Speaker test starts about 1:45 pm To ask.
Welcome During the module you will learn how to create applications for the Web We will be using Active Server Pages (ASP.NET) the language is C#.NET.
Teaching Business Information Systems in UK Courses in BIS Structure and Content Teaching and Assessment Questions… … but no answers TempusJan03_1.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Case Based Learning (CBL) Training Slides
Intro to Computer Security For COP3502, Intro to Computer Science Lecture 1 1.
Cryptography issues – elliptic curves Presented by Tom Nykiel.
Cryptography and PKI February 12, 2001 February 12, 2001 ABN AMRO.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
COM519 Information Systems Strategic Planning and Asset Management Introduction.
CSCD 303 Essential Computer Security Lecture 1 - Course Details.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
We don’t know who discovered the water, but we know it wasn’t the fish - McLuhan 182MC Critical Media Methods Ady Evans
CRYPTOVIROLOGY by Ramu Muthuraman Cpsc 620. Overview  Introduction  Justification of Cryptovirology?  Key Terms  Cryptoviral Extortion Attack  Gpcode.ag.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Unit 8 NT1330 Client-Server Networking II Date: 2?10/2016
About me… Matthew Dean
SST UG2 Exam Revision The exam will be ● closed book ● 2 hours plus 5 minutes reading time ● 2 sections A and B each with 3 questions ● Answer 2 questions.
1D0-570 CIW CIW v5 Security Professional
Computer Security Revision Week
CSE-C3400 Information security
Unit 8 NT1330 Client-Server Networking II Date: 8/2/2016
Social Engineering No class today! Dr. X.
IS4550 Security Policies and Implementation Unit 5 User Policies
Introduction to Computer Security II
Operating System Security
Oracle Database Management System
T Information Security Technology
Introduction to Course
Case Based Learning (CBL) Training Slides Dr Nana Sartania
Presentation transcript:

Security Systems Theory UG2 Module Introduction Themes 1. Top down design of security systems – security technologies as 'black boxes'. 2. Internal design of security systems – what's inside the box 3. Security administration and technologies

Security systems as black boxes Until you start to explore security practice you probably won't be able to understand much of the theory. So we are going to start by learning to use some cryptographic programs and we'll be doing some systems administration. By using crypto programs, the intention is to prepare you for the mathematics, which will come later.

Coursework deliverable 1 Over the next several weeks lab work will involve using some cryptography programs and some user account administration on Linux. Some of the content previously part of this module is now within the Open Systems module. 10% of the module mark will involve coursework due later this term requiring you to carry out some user account and password management and use some command line crypto.

Deliverable 1: topics covered Symmetric cryptography Asymmetric public key cryptography Linux file ownership and permissions The Linux password and login system

Coursework deliverable 2: Student selected security investigation mini-project Every student will select and undertake an individual security mini-project starting week 12. The topic will be investigated through experimentation and background reading. This is an important piece of work, worth 40% of the module mark. Tutorial as "surgery" teaching support will be provided. Tutors don't have complete knowledge but will help you discover answers when we don't know these directly.

Examination: Security theory The closed book examination will be worth 50% of the module mark. Teaching support will be provided through lectures throughout the module and tutorials before and after the mini-project. Passing this module requires you attend these classes as well as carrying out your own background reading and experiments. Skimming through lecture notes won't be enough to enable you to adopt a critical and questioning approach.

Examination topics Part A – Cryptography mathematics and theory, RSA, Diffie Hellman, PKI, modular exponentiation, prime number theory. Part B – Security legislation, security threats, security technologies and models e.g. Kerberos, Clark Wilson, Mandatory Access Control.

Examination topics slide 2 * Laws influencing network and computing security * Various technical attacks: viruses, trojans, buffer overflows, XSS etc. * Issues affecting specific applications e.g. copyright protection, , nuclear weapons, financial transactions.

Assignment Summary Assignment 1 part 1: 10%. Practical use of crypto and linux user account management and security. Assignment 1 part 2: 40%. Student's individual security investigation and report Assignment 2: 50%. Closed book 2 hour written examination.

Bases for teaching and learning security systems theory slide 1 * Security can never be absolute, but risk can be managed. * Security is a costly overhead so people will resist it - up to a point. * Fear uncertainty and doubt (FUD) drives the security market - also up to a point. * Users who need it often don't really know what they want and will pay for the appearance of security if not the reality of it. Caveat emptor. So we need a more critical approach.

Bases for teaching and learning security systems theory slide 2 * Security is only as strong as the weakest link. Are you installing a bank-vault lock in a cardboard door ? * Security requires accountability and continuous learning - making the person who fails to do it right become the one who pays the cost. * Establishing trust objectively can avoid costs. * Complexity is the enemy of security and simplicity its friend. Today's systems are getting more complex.