cs 161 computer security
play

CS 161: Computer Security Prof. Vern Paxson TAs: Jethro Beekman, - PowerPoint PPT Presentation

CS 161: Computer Security Prof. Vern Paxson TAs: Jethro Beekman, Mobin Javed, Antonio Lupher, Paul Pearce & Matthias Vallentin http://inst.eecs.berkeley.edu/~cs161/ January 22, 2013 Course Size The course has a capacity (= room, TAs)


  1. CS 161: Computer Security Prof. Vern Paxson TAs: Jethro Beekman, Mobin Javed, Antonio Lupher, Paul Pearce & Matthias Vallentin http://inst.eecs.berkeley.edu/~cs161/ January 22, 2013

  2. Course Size • The course has a capacity (= room, TAs) of 300 students … • … with many more on the waiting list – (preference to graduating CS/EECS majors) • We do not have sufficient resources available to expand further – If you’re enrolled & decide not to take it, please drop ASAP – FYI, CS 161 scheduled for teaching in Fall 2013

  3. How Expensive is the Learning? • Absorb material presented in lectures and section • 2 or 3 course projects (30% total) – Done individually or in small groups • ~4 homeworks (20% total) – Done individually • One midterm (20%) – 80 minutes long: Thu Mar 7, location TBD • A comprehensive final exam (30%) – Fri May 17, 7-10PM

  4. What’s Required? • Prerequisites: – Math 55 or CS 70, CS 61B and 61C (= Java + C) – Familiarity with Unix • Engage! – In lectures, in section • Note: I’m hearing-impaired, so be prepared to repeat questions! – Feedback to us is highly valuable; anonymous is fine • Class accounts - pick up in section tomorrow • Participate in Piazza – Send course-related questions/comments there, or ask in Prof/TA office hours • For private matters, contact Prof or TA via email

  5. What’s Not Required? • Optional But Recommended : Introduction to Computer Security , Goodrich & Tamassia (new) • Optional : Security Engineering , Anderson, 1st or 2nd ed. http://www.cl.cam.ac.uk/~rja14/book.html Note: emphasis different in parts

  6. Class Policies • Late homework: no credit • Late project: -10% if < 24 hrs, -20% < 48 hrs, -40% < 72 hrs, no credit >= 72 hrs • Original work, citing sources: mandatory • Working in teams: only as assignment states • If lecture materials available prior to lecture, don’t use to answer questions during class • Recording? – For personal use is fine – (Also: any volunteer for a remote CS 161 student?)

  7. 5 Minute Break Questions Before We Proceed?

  8. Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty - and powerful eavesdropping technology • None of this is in any way an invitation to undertake these in any fashion other than with informed consent of all involved parties – The existence of a security hole is no excuse • These concerns regard not only ethics but UCB policy and California/United States law • If in some context there’s any question in your mind, talk with instructors first

  9. Some Broad Perspectives • A vital, easily overlooked facet of security is policy (and accompanying it: operating within constraints ) • High-level goal is risk management, not bulletproof protection. – Much of the effort concerns raising the bar and trading off resources • How to prudently spend your time & money? • Key notion of threat model: what you are defending against – This can differ from what you’d expect – Consider the Department of Energy …

  10. Modern Threats • An energetic arms race between attackers and defenders fuels rapid innovation in “malcode” … • … including powerful automated tools … • … and defenders likewise devise novel tactics …

  11. Modern Threats • An energetic arms race between attackers and defenders fuels rapid innovation in “malcode” … (not just MS) • … including powerful automated tools … • … and defenders likewise devise novel tactics …

  12. Modern Threats • An energetic arms race between attackers and defenders fuels rapid innovation in “malcode” … • … including powerful automated tools … • … and defenders likewise devise novel tactics …

  13. Botnet Population: 2009 - 2010

  14. Modern Threats • An energetic arms race between attackers and defenders fuels rapid innovation in “malcode” … • … including powerful automated tools … • … and defenders likewise devise novel tactics …

  15. Modern Threats, con’t • Most cyber attacks aim for profit and are facilitated by a well-developed “underground economy … • … but recent times have seen the rise of nation-state issues, including: – Censorship / network control – Espionage – … and war

  16. Modern Threats, con’t • Most cyber attacks aim for profit and are facilitated by a well-developed “underground economy … • … there are also extensive threats to privacy including identity theft • … but recent times have seen the rise of nation-state issues, including: – Censorship / network control – Espionage – … and war

  17. Modern Threats, con’t • Most cyber attacks aim for profit and are facilitated by a well-developed “underground economy … • … there are also extensive threats to privacy including identity theft • … and recent times have seen the rise of nation-state issues, including: – Censorship / network control – Espionage – … and war

  18. Modern Threats, con’t • Most cyber attacks aim for profit and are facilitated by a well-developed “underground economy … • … there are also extensive threats to privacy including identity theft • … and recent times have seen the rise of nation-state issues, including: – Censorship / network control – Espionage – … and war

  19. Modern Threats, con’t • Most cyber attacks aim for profit and are facilitated by a well-developed “underground economy … • … there are also extensive threats to privacy including identity theft • … but recent times have seen the rise of nation-state issues, including: – Censorship / network control – Espionage – … and war

  20. Questions?

  21. Coming Up … • Section meets tomorrow • Thursday’s lecture: Overflows, Injection, and Memory Safety • Join Piazzza • Due next week: – Get your class account set up – Use it to submit a writeup (Homework 0) that you’ve read the class web page, including (especially) policies on collaboration, Academic Dishonesty, and ethics/legality

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend