computer security dd2395
play

Computer Security DD2395 - PowerPoint PPT Presentation

Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/DD2395/dasakh10/ Fall 2010 Sonja Buchegger buc@kth.se Lecture 1, Oct. 25, 2010 Introduction Oct. 25, 2010 Computer Security, Sonja Buchegger 1 Outline for Today About


  1. Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/DD2395/dasakh10/ Fall 2010 Sonja Buchegger buc@kth.se Lecture 1, Oct. 25, 2010 Introduction Oct. 25, 2010 Computer Security, Sonja Buchegger 1

  2. Outline for Today  About the course  About computer security Oct. 25, 2010 Computer Security, Sonja Buchegger 2

  3. Outline for Today  About the course  About computer security Oct. 25, 2010 Computer Security, Sonja Buchegger 3

  4. General Goals  Learn about security concepts  Have tools and methods to reason about security  Spot threats, vulnerabilities  Know and propose counter-measures  Present concepts to others Oct. 25, 2010 Computer Security, Sonja Buchegger 4

  5. Learning Outcomes The students should be able to: • recognize threats to confidentiality, integrity, and availability of systems • explain the basic computer security terminology and concepts and use them correctly • find and apply documentation of security-related problems and tools • analyze small pieces of code or system descriptions in terms of their security • identify vulnerabilities of such code or descriptions and predict their corresponding threats • select counter-measures to identified threats and argue their effectiveness • compare counter-measures and evaluate their side-effects • present and explain their reasoning to others Oct. 25, 2010 Computer Security, Sonja Buchegger 5

  6. People  Course leader: Sonja Buchegger, buc@csc.kth.se, Osquars Backe 2, 4 th floor, room 1437  Extra lectures given by Stefan Nilsson, Alexander Baltatzis  Lab assistants: Musard Baliu, Eric Druid, Christopher Engelbrektsson, Dan Hyyrynen Oct. 25, 2010 Computer Security, Sonja Buchegger 6

  7. Current Info Check course website regularly for updates! DD2395 dasakh10 http://www.csc.kth.se/utbildning/kth/kurser/DD2395/dasakh10/ Oct. 25, 2010 Computer Security, Sonja Buchegger 7

  8. Syllabus: Times and Places look at schema, course code DD2395 Oct. 25, 2010 Computer Security, Sonja Buchegger 8

  9. Syllabus: Lectures Content (preliminary)  L1: intro, admin [ch1]  L8: web attacks  L2: cryptography [2,20]  L9: buffer overflow [11]  L3: authentication [3]  L10: programming  L4: access control [4]  L11: models, MLS [10]  L5:intrusion detection [6]  L12:social engineering  L6: firewalls [9]  L13: audits  L7: malware, DoS [7,8]  L14: recap, buffer Oct. 25, 2010 Computer Security, Sonja Buchegger 9

  10. Syllabus: Extra Lectures  Operating systems: Alexander Baltatzis, Friday, October 29, Q31, 15-17h  Computer architectures: Stefan Nilsson, Thursday, November 4, Q36, 13-15h Oct. 25, 2010 Computer Security, Sonja Buchegger 10

  11. Syllabus: Lab Exercises  See schema for times and rooms  4 different exercises 1st: on GnuPG, remote or at CSC, report - 2nd: on iptables/firewalls, at CSC - 3rd: on web attacks, remote or at CSC - 4th: presentation at CSC, report, assess - Oct. 25, 2010 Computer Security, Sonja Buchegger 11

  12. Exercise 4  Presentation on computer security topic  Pairs of students  Topic distribution on web site  Group sessions, scheduled on web site Oct. 25, 2010 Computer Security, Sonja Buchegger 12

  13. Exam  December 14, 2010, 14h, Room D1  Next exam in March Oct. 25, 2010 Computer Security, Sonja Buchegger 13

  14. Assessment, Grades  6 ECTS in total, that’s about 160 hours of work  3 ECTS Exam: A-F  3 ECTS Labs: - pass/fail, no grades - bonus points for exam when handed in early, see lab descriptions Oct. 25, 2010 Computer Security, Sonja Buchegger 14

  15. Books Oct. 25, 2010 Computer Security, Sonja Buchegger 15

  16. Language  Course given in English  Some extra lectures in Swedish  Questions in Swedish OK Oct. 25, 2010 Computer Security, Sonja Buchegger 16

  17. Accounts  Needed for lab exercises  Who doesn't have an account and access card?  Send me an e-mail buc@csc.kth.se Oct. 25, 2010 Computer Security, Sonja Buchegger 17

  18. RAPP  Register for DD2395 dasakh10, if not already  http://rapp.nada.kth.se Oct. 25, 2010 Computer Security, Sonja Buchegger 18

  19. Next Courses  Networking Security with Johan Karlander  Foundations of Cryptography with Douglas Wikström Oct. 25, 2010 Computer Security, Sonja Buchegger 19

  20. CSC honor code, plus: Defense Against the Dark Arts: Do not attack a running system without the consent of the owner and the users! Oct. 25, 2010 Computer Security, Sonja Buchegger 20

  21. Questions for you: My most important question about the course: my experience, knowledge HIGH My most important question about computer security: LOW HIGH my expectations Oct. 25, 2010 Computer Security, Sonja Buchegger 21

  22. Questions? Oct. 25, 2010 Computer Security, Sonja Buchegger 22

  23. Outline for Today  About the course  About computer security Oct. 25, 2010 Computer Security, Sonja Buchegger 23

  24. Computer Security Slides adapted from Lawrie Brown's set of slides for the course book “Computer Security: Principles and Practice” by William Stallings and Lawrie Brown Oct. 25, 2010 Computer Security, Sonja Buchegger 24

  25. Computer Security Oct. 25, 2010 Computer Security, Sonja Buchegger 25

  26. Overview Computer Security: protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications). Oct. 25, 2010 Computer Security, Sonja Buchegger 26

  27. Key Security Concepts Oct. 25, 2010 Computer Security, Sonja Buchegger 27

  28. Challenges  Why is security hard to achieve?  Think about it for 2 min.  Turn to your neighbor and discuss for 3 min. Oct. 25, 2010 Computer Security, Sonja Buchegger 28

  29. Computer Security Challenges not simple 1. must consider potential attacks 2. procedures used counter-intuitive 3. involve algorithms and secret info 4. must decide where to deploy mechanisms 5. battle of wits between attacker / admin 6. not perceived on benefit until fails 7. requires regular monitoring 8. too often an after-thought 9. 10. regarded as impediment to using system Oct. 25, 2010 Computer Security, Sonja Buchegger 29

  30. Security Terminology Oct. 25, 2010 Computer Security, Sonja Buchegger 30

  31. Vulnerabilities and Attacks  system resource vulnerabilities may - be corrupted (loss of integrity) - become leaky (loss of confidentiality) - become unavailable (loss of availability)  attacks are threats carried out and may be - passive - active - insider - outsider Oct. 25, 2010 Computer Security, Sonja Buchegger 31

  32. Countermeasures  means used to deal with security attacks - prevent - detect - recover  may result in new vulnerabilities  will have residual vulnerability  goal is to minimize risk given constraints Oct. 25, 2010 Computer Security, Sonja Buchegger 32

  33. Threat Consequences  unauthorized disclosure - exposure, interception, inference, intrusion  deception - masquerade, falsification, repudiation  disruption - incapacitation, corruption, obstruction  usurpation - misappropriation, misuse Oct. 25, 2010 Computer Security, Sonja Buchegger 33

  34. Scope of Computer Security Oct. 25, 2010 Computer Security, Sonja Buchegger 34

  35. Network Security Attacks  classify as passive or active  passive attacks are eavesdropping - release of message contents - traffic analysis - are hard to detect so aim to prevent  active attacks modify/fake data - masquerade - replay - modification - denial of service - hard to prevent so aim to detect  Networking Security class next term Oct. 25, 2010 Computer Security, Sonja Buchegger 35

  36. Security Functional Requirements  technical measures: - access control; identification & authentication; system & communication protection; system & information integrity  management controls and procedures - awareness & training; audit & accountability; certification, accreditation, & security assessments; contingency planning; maintenance; physical & environmental protection; planning; personnel security; risk assessment; systems & services acquisition  overlapping technical and management: - configuration management; incident response; media protection Oct. 25, 2010 Computer Security, Sonja Buchegger 36

  37. X.800 Security Architecture  X.800, Security Architecture for OSI  systematic way of defining requirements for security and characterizing approaches to satisfying them  defines: - security attacks - compromise security - security mechanism - act to detect, prevent, recover from attack - security service - counter security attacks Oct. 25, 2010 Computer Security, Sonja Buchegger 37

  38. Security Taxonomy Oct. 25, 2010 Computer Security, Sonja Buchegger 38

  39. Still true? Security Trends Oct. 25, 2010 Computer Security, Sonja Buchegger 39

  40. Computer Security Losses Oct. 25, 2010 Computer Security, Sonja Buchegger 40

  41. Security Technologies Used Oct. 25, 2010 Computer Security, Sonja Buchegger 41

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend