Computer Security DD2395 - - PowerPoint PPT Presentation

computer security dd2395
SMART_READER_LITE
LIVE PREVIEW

Computer Security DD2395 - - PowerPoint PPT Presentation

Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/DD2395/dasakh10/ Fall 2010 Sonja Buchegger buc@kth.se Lecture 1, Oct. 25, 2010 Introduction Oct. 25, 2010 Computer Security, Sonja Buchegger 1 Outline for Today About


slide-1
SLIDE 1

Computer Security DD2395

http://www.csc.kth.se/utbildning/kth/kurser/DD2395/dasakh10/

Fall 2010 Sonja Buchegger buc@kth.se Lecture 1, Oct. 25, 2010 Introduction

  • Oct. 25, 2010

1 Computer Security, Sonja Buchegger

slide-2
SLIDE 2
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 2

Outline for Today

 About the course  About computer security

slide-3
SLIDE 3
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 3

Outline for Today

 About the course  About computer security

slide-4
SLIDE 4
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 4

General Goals

 Learn about security concepts  Have tools and methods to reason about

security

 Spot threats, vulnerabilities  Know and propose counter-measures  Present concepts to others

slide-5
SLIDE 5
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 5

Learning Outcomes

The students should be able to:

  • recognize threats to confidentiality, integrity, and availability of systems
  • explain the basic computer security terminology and concepts and use them correctly
  • find and apply documentation of security-related problems and tools
  • analyze small pieces of code or system descriptions in terms of their security
  • identify vulnerabilities of such code or descriptions and predict their corresponding

threats

  • select counter-measures to identified threats and argue their effectiveness
  • compare counter-measures and evaluate their side-effects
  • present and explain their reasoning to others
slide-6
SLIDE 6
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 6

People

 Course leader: Sonja Buchegger,

buc@csc.kth.se, Osquars Backe 2, 4th floor, room 1437

 Extra lectures given by Stefan Nilsson,

Alexander Baltatzis

 Lab assistants: Musard Baliu, Eric Druid,

Christopher Engelbrektsson, Dan Hyyrynen

slide-7
SLIDE 7
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 7

Current Info

Check course website regularly for updates! DD2395 dasakh10

http://www.csc.kth.se/utbildning/kth/kurser/DD2395/dasakh10/

slide-8
SLIDE 8
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 8

Syllabus: Times and Places

look at schema, course code DD2395

slide-9
SLIDE 9
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 9

Syllabus: Lectures Content (preliminary)

 L1: intro, admin [ch1]  L2: cryptography [2,20]  L3: authentication [3]  L4: access control [4]  L5:intrusion detection [6]  L6: firewalls [9]  L7: malware, DoS [7,8]  L8: web attacks  L9: buffer overflow [11]  L10: programming  L11: models, MLS [10]  L12:social engineering  L13: audits  L14: recap, buffer

slide-10
SLIDE 10
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 10

Syllabus: Extra Lectures

 Operating systems: Alexander Baltatzis, Friday,

October 29, Q31, 15-17h

 Computer architectures: Stefan Nilsson,

Thursday, November 4, Q36, 13-15h

slide-11
SLIDE 11
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 11

Syllabus: Lab Exercises

 See schema for times and rooms  4 different exercises

  • 1st: on GnuPG, remote or at CSC, report
  • 2nd: on iptables/firewalls, at CSC
  • 3rd: on web attacks, remote or at CSC
  • 4th: presentation at CSC, report, assess
slide-12
SLIDE 12
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 12

Exercise 4

 Presentation on computer security topic  Pairs of students  Topic distribution on web site  Group sessions, scheduled on web site

slide-13
SLIDE 13
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 13

Exam

 December 14, 2010, 14h, Room D1  Next exam in March

slide-14
SLIDE 14
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 14

Assessment, Grades

 6 ECTS in total, that’s about 160 hours of work  3 ECTS Exam: A-F  3 ECTS Labs:

  • pass/fail, no grades
  • bonus points for exam when handed in early, see

lab descriptions

slide-15
SLIDE 15
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 15

Books

slide-16
SLIDE 16
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 16

Language

 Course given in English  Some extra lectures in Swedish  Questions in Swedish OK

slide-17
SLIDE 17
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 17

Accounts

 Needed for lab exercises  Who doesn't have an account and access card?  Send me an e-mail buc@csc.kth.se

slide-18
SLIDE 18
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 18

RAPP

 Register for DD2395 dasakh10, if not already  http://rapp.nada.kth.se

slide-19
SLIDE 19
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 19

Next Courses

 Networking Security with Johan Karlander  Foundations of Cryptography with Douglas

Wikström

slide-20
SLIDE 20

CSC honor code, plus:

Defense Against the Dark Arts: Do not attack a running system without the consent of the owner and the users!

  • Oct. 25, 2010

Computer Security, Sonja Buchegger 20

slide-21
SLIDE 21
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 21

Questions for you:

my experience, knowledge my expectations

My most important question about the course: My most important question about computer security:

LOW HIGH HIGH

slide-22
SLIDE 22
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 22

Questions?

slide-23
SLIDE 23
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 23

Outline for Today

 About the course  About computer security

slide-24
SLIDE 24
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 24

Computer Security

Slides adapted from Lawrie Brown's set of slides for the course book “Computer Security: Principles and Practice” by William Stallings and Lawrie Brown

slide-25
SLIDE 25
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 25

Computer Security

slide-26
SLIDE 26

Overview

Computer Security: protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications).

  • Oct. 25, 2010

26 Computer Security, Sonja Buchegger

slide-27
SLIDE 27

Key Security Concepts

  • Oct. 25, 2010

27 Computer Security, Sonja Buchegger

slide-28
SLIDE 28

Challenges

 Why is security hard to achieve?  Think about it for 2 min.  Turn to your neighbor and discuss for 3 min.

  • Oct. 25, 2010

28 Computer Security, Sonja Buchegger

slide-29
SLIDE 29

Computer Security Challenges

1.

not simple

2.

must consider potential attacks

3.

procedures used counter-intuitive

4.

involve algorithms and secret info

5.

must decide where to deploy mechanisms

6.

battle of wits between attacker / admin

7.

not perceived on benefit until fails

8.

requires regular monitoring

9.

too often an after-thought

  • 10. regarded as impediment to using system
  • Oct. 25, 2010

29 Computer Security, Sonja Buchegger

slide-30
SLIDE 30

Security Terminology

  • Oct. 25, 2010

30 Computer Security, Sonja Buchegger

slide-31
SLIDE 31

Vulnerabilities and Attacks

 system resource vulnerabilities may

  • be corrupted (loss of integrity)
  • become leaky (loss of confidentiality)
  • become unavailable (loss of availability)

 attacks are threats carried out and may be

  • passive
  • active
  • insider
  • outsider
  • Oct. 25, 2010

31 Computer Security, Sonja Buchegger

slide-32
SLIDE 32

Countermeasures

 means used to deal with security attacks

  • prevent
  • detect
  • recover

 may result in new vulnerabilities  will have residual vulnerability  goal is to minimize risk given constraints

  • Oct. 25, 2010

32 Computer Security, Sonja Buchegger

slide-33
SLIDE 33

Threat Consequences

 unauthorized disclosure

  • exposure, interception, inference, intrusion

 deception

  • masquerade, falsification, repudiation

 disruption

  • incapacitation, corruption, obstruction

 usurpation

  • misappropriation, misuse
  • Oct. 25, 2010

33 Computer Security, Sonja Buchegger

slide-34
SLIDE 34
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 34

Scope of Computer Security

slide-35
SLIDE 35
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 35

Network Security Attacks

 classify as passive or active  passive attacks are eavesdropping

  • release of message contents
  • traffic analysis
  • are hard to detect so aim to prevent

 active attacks modify/fake data

  • masquerade
  • replay
  • modification
  • denial of service
  • hard to prevent so aim to detect

 Networking Security class next term

slide-36
SLIDE 36
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 36

Security Functional Requirements

 technical measures:

  • access control; identification & authentication; system &

communication protection; system & information integrity

 management controls and procedures

  • awareness & training; audit & accountability; certification,

accreditation, & security assessments; contingency planning; maintenance; physical & environmental protection; planning; personnel security; risk assessment; systems & services acquisition

 overlapping technical and management:

  • configuration management; incident response; media protection
slide-37
SLIDE 37
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 37

X.800 Security Architecture

 X.800, Security Architecture for OSI  systematic way of defining requirements for

security and characterizing approaches to satisfying them

 defines:

  • security attacks - compromise security
  • security mechanism - act to detect, prevent,

recover from attack

  • security service - counter security attacks
slide-38
SLIDE 38
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 38

Security Taxonomy

slide-39
SLIDE 39
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 39

Security Trends

Still true?

slide-40
SLIDE 40
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 40

Computer Security Losses

slide-41
SLIDE 41
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 41

Security Technologies Used

slide-42
SLIDE 42
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 42

Computer Security Strategy

 specification/policy

  • what is the security scheme supposed to do?
  • codify in policy and procedures

 implementation/mechanisms

  • how does it do it?
  • prevention, detection, response, recovery

 correctness/assurance

  • does it really work?
  • assurance, evaluation
slide-43
SLIDE 43
  • Oct. 25, 2010

Computer Security, Sonja Buchegger 43

Summary

 security concepts  terminology  functional requirements  security trends  security strategy