Presentation is loading. Please wait.

Presentation is loading. Please wait.

ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.

Similar presentations


Presentation on theme: "ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang."— Presentation transcript:

1 ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang

2 Syllabus See handout –Homework will usually have 4-5 questions and due in one week. It is due at the time that the class begins. –A copy of the textbook is reserved at the library –Late homework and term paper Within 24 hours: 50% of full score After that: 0% –Project/term paper Individual effort –Conduct some hands-on experiments –Or choose a security problem and write a survey paper –A reference question list will be provided –Midterm and final exam –Misc: eating, drinking, and cell phone (text & twitter)

3 Before class How many of you are really surprised when you learn the government is collecting our communication history? An interesting question –Two companies each has some private data. They need to jointly calculate some result without disclosing their information. Secure multiparty computation Is this solution useful? –Zero knowledge proof: Can I prove to you that I know a secret without telling you anything? (practically) –Car key remote jammer

4 Perfect Storm of Social Networks By March 2013, Facebook has 1.11 Billion active users each month. Twitter claims 554M registered users (1 year ago, only 175M). Almost 68% of all Internet traffic is social media or search Facebook is the 4 th largest website in the world. Having grown 157% between 2008 and 2009 – 1,928% in the US alone Social media marketing will grow from $714M in 2009 to $3.1B by 2014 Attacks on social media sites is up 240% from phishing attacks alone

5 Attacks Are On The Rise Spam, phishing and malware attacks through social media are growing: 70% rise in firms encountering spam and malware attacks via social networks in 2009 ‒ Over 50% received spam via social networks ‒ Over 33% received malware via social networks Organizations that have been victims of attack through social networking sites 5

6 Examples in real life Attack on Twitter –Hack into the victim’s email account –DDoS to paralyze Twitter, facebook, etc Data mining attacks on public database –In NJ, a newspaper generates a database about all residents that have CCW permits. –MyEdu.com –Groupon, Google Offer, and Amazon Local

7 Examples in real life Worm attack on smart grid Use social network to detect disease breakout Remotely control insulin pump of a patient Code during the war –Navajo Code in WWII –http://www.imdb.com/gallery/ss/0245562/W-266R.jpghttp://www.imdb.com/gallery/ss/0245562/W-266R.jpg Node impersonation attack: easier than you think

8 –Computers have controlled our lives Medical, ATM, banking, business Air traffic control

9 Security overview Risks –Why there are risks Adversaries –Smart and dedicated –Many of them, considering the high unemployment rate –Hiding in the dark –From fun to profit (worm  self-changing  botnet  target at specific systems)

10 Security overview Physical security is not enough (can you be sure that your physical security methods are sound and enough? Example in Las Vegas, supply chain attacks, ATM machine, hotel doors) Networked computers can be accessed remotely

11 Security overview What can go wrong –Trojan war story (trojan horse): USB keys –Corrupted internal worker –Vulnerabilities of protocols or security mechanisms (security patch has problems too) –By-passing protection walls –Backdoors for systems (Linux password) –Known attacks ignored (push and poll)

12 Information security Encryption –You can read the information only when you know the key Authentication –You are who you claim you are Authorization –The role and the right

13 Information security Information integrity –The data has never been changed or changed in an inappropriate way Non-repudiation –Cannot deny your words (digital cash example) Privacy –Who should know, how much, how to use the information Your cell phone or medical records RFID Traffic cameras in Minnesota

14 Security overview Defending methods –Prevention Prevent (password, salt, private salt, searching) Deter: raising the bar (password guessing, login slow) Deflect: making other target more attractive Diversify –Detection Monitoring (who, what, and how) Intrusion detection (signature based, anomaly based) IP telephony track Authenticity of the evidence (digital media)

15 Security Overview Recovery –Recover data (check point) –Identify the damage –Forensics –Confinement Tolerance –Maintain a decent service quality –Automatically degrade video quality while reserving bandwidth for voice


Download ppt "ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang."

Similar presentations


Ads by Google