Computer Security DD2395
http://www.csc.kth.se/utbildning/kth/kurser/DD2395/dasakh10/
Fall 2010 Sonja Buchegger buc@kth.se Lecture 1, Oct. 25, 2010 Introduction
- Oct. 25, 2010
1 Computer Security, Sonja Buchegger
Computer Security DD2395 - - PowerPoint PPT Presentation
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/DD2395/dasakh10/ Fall 2010 Sonja Buchegger buc@kth.se Lecture 1, Oct. 25, 2010 Introduction Oct. 25, 2010 Computer Security, Sonja Buchegger 1 Outline for Today About
1 Computer Security, Sonja Buchegger
Computer Security, Sonja Buchegger 2
About the course About computer security
Computer Security, Sonja Buchegger 3
About the course About computer security
Computer Security, Sonja Buchegger 4
Learn about security concepts Have tools and methods to reason about
Spot threats, vulnerabilities Know and propose counter-measures Present concepts to others
Computer Security, Sonja Buchegger 5
threats
Computer Security, Sonja Buchegger 6
Course leader: Sonja Buchegger,
Extra lectures given by Stefan Nilsson,
Lab assistants: Musard Baliu, Eric Druid,
Computer Security, Sonja Buchegger 7
Computer Security, Sonja Buchegger 8
look at schema, course code DD2395
Computer Security, Sonja Buchegger 9
L1: intro, admin [ch1] L2: cryptography [2,20] L3: authentication [3] L4: access control [4] L5:intrusion detection [6] L6: firewalls [9] L7: malware, DoS [7,8] L8: web attacks L9: buffer overflow [11] L10: programming L11: models, MLS [10] L12:social engineering L13: audits L14: recap, buffer
Computer Security, Sonja Buchegger 10
Operating systems: Alexander Baltatzis, Friday,
Computer architectures: Stefan Nilsson,
Computer Security, Sonja Buchegger 11
See schema for times and rooms 4 different exercises
Computer Security, Sonja Buchegger 12
Presentation on computer security topic Pairs of students Topic distribution on web site Group sessions, scheduled on web site
Computer Security, Sonja Buchegger 13
December 14, 2010, 14h, Room D1 Next exam in March
Computer Security, Sonja Buchegger 14
6 ECTS in total, that’s about 160 hours of work 3 ECTS Exam: A-F 3 ECTS Labs:
Computer Security, Sonja Buchegger 15
Computer Security, Sonja Buchegger 16
Course given in English Some extra lectures in Swedish Questions in Swedish OK
Computer Security, Sonja Buchegger 17
Needed for lab exercises Who doesn't have an account and access card? Send me an e-mail buc@csc.kth.se
Computer Security, Sonja Buchegger 18
Register for DD2395 dasakh10, if not already http://rapp.nada.kth.se
Computer Security, Sonja Buchegger 19
Networking Security with Johan Karlander Foundations of Cryptography with Douglas
Computer Security, Sonja Buchegger 20
Computer Security, Sonja Buchegger 21
My most important question about the course: My most important question about computer security:
Computer Security, Sonja Buchegger 22
Computer Security, Sonja Buchegger 23
About the course About computer security
Computer Security, Sonja Buchegger 24
Computer Security, Sonja Buchegger 25
26 Computer Security, Sonja Buchegger
27 Computer Security, Sonja Buchegger
Why is security hard to achieve? Think about it for 2 min. Turn to your neighbor and discuss for 3 min.
28 Computer Security, Sonja Buchegger
29 Computer Security, Sonja Buchegger
30 Computer Security, Sonja Buchegger
system resource vulnerabilities may
attacks are threats carried out and may be
31 Computer Security, Sonja Buchegger
means used to deal with security attacks
may result in new vulnerabilities will have residual vulnerability goal is to minimize risk given constraints
32 Computer Security, Sonja Buchegger
unauthorized disclosure
deception
disruption
usurpation
33 Computer Security, Sonja Buchegger
Computer Security, Sonja Buchegger 34
Computer Security, Sonja Buchegger 35
classify as passive or active passive attacks are eavesdropping
active attacks modify/fake data
Networking Security class next term
Computer Security, Sonja Buchegger 36
technical measures:
management controls and procedures
overlapping technical and management:
Computer Security, Sonja Buchegger 37
X.800, Security Architecture for OSI systematic way of defining requirements for
defines:
Computer Security, Sonja Buchegger 38
Computer Security, Sonja Buchegger 39
Computer Security, Sonja Buchegger 40
Computer Security, Sonja Buchegger 41
Computer Security, Sonja Buchegger 42
specification/policy
implementation/mechanisms
correctness/assurance
Computer Security, Sonja Buchegger 43
security concepts terminology functional requirements security trends security strategy