CMSC 414 Computer and Network Security Jonathan Katz.

Slides:



Advertisements
Similar presentations
Welcome to the seminar course
Advertisements

Chapter 1  Introduction 1 Introduction Chapter 1  Introduction 2 The Cast of Characters  Alice and Bob are the good guys  Trudy is the bad guy 
Chapter 1  Introduction 1 Chapter 1: Introduction.
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Course Introduction.
Slide 01-1COMP 7370, Auburn University COMP 7370 Advanced Computer and Network Security Dr. Xiao Qin Auburn University
September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Class 1 Background, Tools, and Trust CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman
1 Overview CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 8, 2004.
CMSC 414 Computer and Network Security Jonathan Katz.
Security Systems Theory UG2 Module Introduction Themes 1. Top down design of security systems – security technologies as 'black boxes'. 2. Internal design.
1 An Overview of Computer Security computer security.
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010.
CS/CMPE 535 – Machine Learning Outline. CS Machine Learning (Wi ) - Asim LUMS2 Description A course on the fundamentals of machine.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
June 13, Introduction to CS II Data Structures Hongwei Xi Comp. Sci. Dept. Boston University.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
CMSC 414 Computer and Network Security Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
CMSC 414 Computer (and Network) Security Jonathan Katz.
Pertemuan 02 Aspek dasar keamanan Jaringan dan ketentuan baku OSI
July 16, Introduction to CS II Data Structures Hongwei Xi Comp. Sci. Dept. Boston University.
University of South Carolina Preparing for the Course Jamil A. Khan, Ph.D., P.E. Associate Professor Mechanical Engineering.
CS211: Course Overview George Mason University. Today’s topics Go over the syllabus Go over resources – Marmoset – Piazza – Textbook Highlight important.
Computer Network Fundamentals CNT4007C
G53SEC Computer Security Introduction to G53SEC 1.
EECE 310 Software Engineering Lecture 0: Course Orientation.
Computer Networks CEN 5501C Spring, 2008 Ye Xia (Pronounced as “Yeh Siah”)
Introduction to Information Security J. H. Wang Sep. 15, 2014.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Lecture 1 Page 1 CS 239, Fall 2010 Introduction CS 239 Advanced Topics in Computer Security Peter Reiher September 23, 2010.
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Working Connection Computer and Network Security - Introduction - Dr. Hwajung Lee Radford University.
Chapter 1  Introduction 1 Chapter 1: Introduction.
Introduction to Information Security J. H. Wang Sep. 10, 2013.
CIS 4930/6930: Systems Security Instructor: Xinming “Simon” Ou TA: Xiaolong “Daniel” Wang Class time: MW 2-3:15 1.
CMSC104 Problem Solving and Computer Programming Spring 2009 Sections 0201 & 0301 Ms. Dawn Block.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
ICOM 5995 (crypto) - Noack Crypto - Administrivia Prontuario - Please time-share and ask questions Info is in my homepage amadeus.uprm.edu/~noack/ Make.
1 CS 101 Today’s class will begin about 5 minutes late We will discuss the lab scheduling problems once class starts.
CS112: Course Overview George Mason University. Today’s topics Go over the syllabus Go over resources – Marmoset – Blackboard – Piazza – Textbook Highlight.
Computer Networks CNT5106C
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
@Yuan Xue CS 285 Network Security Fall 2013 Yuan Xue.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
CIS 4930/6930: Systems Security
Information Security, Theory and Practice.
CMSC104 Problem Solving and Computer Programming Spring 2008
Computer Networks CNT5106C
CMSC104 Problem Solving and Computer Programming Fall 2010 Section 01
CMSC104 Problem Solving and Computer Programming Fall 2010
Welcome to CS 410 – Introduction to Software Engineering Spring 2019
Introduction Security Intro 1.
CMSC104 Problem Solving and Computer Programming Spring 2010
Presentation transcript:

CMSC 414 Computer and Network Security Jonathan Katz

Introduction and overview  What is computer/network security?  Course philosophy and goals  High-level overview of topics  Course organization and information

“Security”  Most of computer science is concerned with achieving desired behavior  In some sense, security is concerned with preventing undesired behavior –Different way of thinking! –An enemy/opponent/hacker/adversary may be actively and maliciously trying to circumvent any protective measures you put in place

Broader impacts of security  Explosive growth of interest in security –Most often following notable security failures…  Impact on/interest from all (?) areas of CS –Theory (especially cryptography) –Databases –Operating systems –AI/learning theory –Networking –Computer architecture/hardware –Programming languages/compilers –HCI

Philosophy  We are not going to be able to cover everything  Main goals –Exposure to different aspects of security; meant mainly to “pique” your interest –The “mindset” of security: a new way of thinking… –Become familiar with basic crypto, acronyms (RSA, SSL, PGP, etc.), and “buzzwords”

Student participation (I hope!)  Papers listed on course webpage –Read these before class and come prepared to discuss  Monitor the media – me relevant/interesting stories  Class participation counts!

High-level overview  Introduction… –What do we mean by security? –Is security achievable…?  Cryptography –Cryptography is not the (whole) solution… –…but is is an important part of the solution –Along the way, we will see why cryptography can’t solve all security problems

High-level overview II  System security –General principles –Security policies –Access control; confidentiality/integrity –OS security –“Trusted computing”

High-level overview III  Network security –Identity –Authentication and key exchange protocols –Anonymity and pseudonymity –Some real-world protocols

High-level overview IV  Application-level security –Web-based security –Buffer overflows; secure programming and sandboxing –Viruses, worms, and malicious code

Course Organization

Staff  Me  TAs  Contact information, office hours, listed on course webpage

Course webpage  Contains course organization, updated syllabus, various links, etc. –Also links to papers! –Slides posted for convenience, but no substitute for attending lecture  Homeworks distributed from the course webpage  Check often for announcements

Textbooks  I will primarily use two texts: –“Security in Computing” by Pfleeger and Pfleeger –“Network Security…” by Kaufman, Perlman, and Speciner  Neither is officially required, but both will make it easier to follow the course  Both are on reserve in the library

Other readings  Will be linked from the course webpage  Material from these readings is fair game for the exams, even if not covered in class (unless stated otherwise)  Please suggest other readings or relevant news articles!

Course requirements  Homeworks and project –About 4-5 HWs throughout the semester –Programming portion will be done with a partner –Will require implementation using JCE –TAs will help with using JCE and Java… –Details about project to come…

Computer accounts  Each student will receive a computer account for homeworks and the project  Accounts will be assigned in the next class

Security is Harder than it Seems * * And it already seems quite hard!

Some terminology  Confidentiality  Integrity  Availability  Often, these are conflicting goals…

“We are all Security Customers”  Security is always a trade-off  The goal should never be “to make the system as secure as possible”…  …but instead, “to make the system as secure as possible within certain constraints” (cost, usability, convenience)

Cost-benefit analysis  Important to evaluate what level of security is necessary/appropriate –Cost of mounting a particular attack vs. value of attack to an adversary –Cost of damages from an attack vs. cost of defending against the attack –Likelihood of a particular attack

“More” security not always better  “No point in putting a higher post in the ground when the enemy can go around it”  Need to identify the weakest link  Security of a system is only as good as the security at its weakest point…  Security is not a “magic bullet”  Security is a process, not a product

Human factors  E.g., passwords…  Outsider vs. insider attacks  Software misconfiguration  Not applying security patches  Social engineering  Physical security

Importance of precise specification  Security policy –Statement of what is and is not allowed  Security mechanism –Method for enforcing a security policy  One is meaningless without the other…

Prevention not the only concern  Detection and response –How do you know when you are being attacked? –How quickly can you stop the attack? –Can you prevent the attack from recurring?  Recovery –Can be much more important than prevention  Legal issues?

“Managed security monitoring”  Is the state of network security this bad?  Network monitoring; risk management –Attacks are going to occur; impossible to have complete protection  Security as a process, not a product…

“Trusting trust”  Whom do you trust?  Does one really need to be this paranoid?? –Probably not –Sometimes, yes  Shows that security is complex…and essentially impossible  Comes back to risk/benefit trade-off

Nevertheless…  In this course, we will focus on security in isolation  But important to keep in the back of your mind the previous discussion… –…and if you decide to enter the security field, learn more about it!