Computer Security DD2395
http://www.csc.kth.se/utbildning/kth/kurser/DD2395/dasakh11/
Fall 2011 Sonja Buchegger buc@kth.se Lecture 1, Oct. 25, 2011 Introduction
- Oct. 25, 2011
1 Computer Security, Sonja Buchegger
Computer Security DD2395 - - PowerPoint PPT Presentation
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/DD2395/dasakh11/ Fall 2011 Sonja Buchegger buc@kth.se Lecture 1, Oct. 25, 2011 Introduction Oct. 25, 2011 Computer Security, Sonja Buchegger 1 Outline for Today ! About
1 Computer Security, Sonja Buchegger
Computer Security, Sonja Buchegger 2
! About the course ! About computer security
Computer Security, Sonja Buchegger 3
! About the course ! About computer security
Computer Security, Sonja Buchegger 4
! Course moves from Master’s to Bachelor’s ! 2011: joint lectures in period 2 ! Master’s students: labs in period 2 ! Bachelor’s student: labs in period 3
Computer Security, Sonja Buchegger 5
! Learn about security concepts ! Have tools and methods to reason about
! Spot threats, vulnerabilities ! Know and propose counter-measures ! Present concepts to others
Computer Security, Sonja Buchegger 6
threats
Computer Security, Sonja Buchegger 7
! Course leader: Sonja Buchegger,
! Extra lectures given by Torbjörn Granlund,
! Lab assistants: Oleksandr Bodriagov, Benjamin
Computer Security, Sonja Buchegger 8
Computer Security, Sonja Buchegger 9
look at schema, course code DD2395
Computer Security, Sonja Buchegger 10
! Oct. 25, Course administration
! Oct. 26, Cryptography [2,20] ! Oct. 31, Authentication [3] ! Nov. 01, Access Control [4] ! Nov. 07, Firewalls [6,9] ! Nov. 10, Web Attacks, OWASP
! Nov. 14, Malware, Denial of
! Nov. 17, Intrusion Detection [6] ! Nov. 21, Buffer Overflows [11] ! Nov. 24, Social Engineering ! Nov. 29, Models, Multi-Level
! Dec. 01, Audits [15], guest
! Dec. 05, Programming/Software
! Dec. 07, Recap, buffer
Computer Security, Sonja Buchegger 11
! Computer architectures: Torbjörn
! Operating systems: Alexander Baltatzis,
! Computer networking: Olof Hagsand, Tue
Computer Security, Sonja Buchegger 12
! ONLY CONCERNS MASTER’S STUDENTS ! See schema for times and rooms ! 4 different exercises
Computer Security, Sonja Buchegger 13
! Presentation and demo on computer security
! Groups of 2-3 students ! Topic distribution on web site ! Group seminars, schedule in schema, signup
Computer Security, Sonja Buchegger 14
! January 10, 2012 ! Re-exam in June 2012
Computer Security, Sonja Buchegger 15
! 6 ECTS in total, that’s about 160 hours of work ! 3 ECTS Exam: A-F ! 3 ECTS Labs:
Computer Security, Sonja Buchegger 16
Computer Security, Sonja Buchegger 17
! Course given in English ! Some extra lectures in Swedish ! Questions in Swedish OK
Computer Security, Sonja Buchegger 18
! Needed for lab exercises ! Who doesn't have an account and access card? ! Go to the systems group counter, entry floor of
Computer Security, Sonja Buchegger 19
! Register for DD2395, if not already ! https://rapp.csc.kth.se/rapp/
Computer Security, Sonja Buchegger 20
! Networking Security with Johan Karlander ! Foundations of Cryptography with Douglas
! Software Security with Dilian Gurov
Computer Security, Sonja Buchegger 21
! 2010 spring and fall course analyses are
! Some changes: less presentation practice,
Computer Security, Sonja Buchegger 22
Computer Security, Sonja Buchegger 23
My most important question about the course: My most important question about computer security:
Computer Security, Sonja Buchegger 24
Computer Security, Sonja Buchegger 25
! About the course ! About computer security
Computer Security, Sonja Buchegger 26
Computer Security, Sonja Buchegger 27
28 Computer Security, Sonja Buchegger
29 Computer Security, Sonja Buchegger
! Is security hard to achieve? Why? ! Think about it for 2 min. ! Turn to your neighbor and discuss for 3 min.
30 Computer Security, Sonja Buchegger
31 Computer Security, Sonja Buchegger
32 Computer Security, Sonja Buchegger
! system resource vulnerabilities may
! attacks are threats carried out and may be
33 Computer Security, Sonja Buchegger
! means used to deal with security attacks
! may result in new vulnerabilities ! will have residual vulnerability ! goal is to minimize risk given constraints
34 Computer Security, Sonja Buchegger
! unauthorized disclosure
! deception
! disruption
! usurpation
35 Computer Security, Sonja Buchegger
Computer Security, Sonja Buchegger 36
Computer Security, Sonja Buchegger 37
! classify as passive or active ! passive attacks are eavesdropping
! active attacks modify/fake data
! Networking Security class next term
Computer Security, Sonja Buchegger 38
! technical measures:
! management controls and procedures
! overlapping technical and management:
Computer Security, Sonja Buchegger 39
! X.800, Security Architecture for OSI ! systematic way of defining requirements for
! defines:
Computer Security, Sonja Buchegger 40
Computer Security, Sonja Buchegger 41
Computer Security, Sonja Buchegger 42
Computer Security, Sonja Buchegger 43
Computer Security, Sonja Buchegger 44
! specification/policy
! implementation/mechanisms
! correctness/assurance
Computer Security, Sonja Buchegger 45
! security concepts ! terminology ! functional requirements ! security trends ! security strategy