description of class introduction
play

Description of Class Introduction Topics to be covered CS 239 - PDF document

Description of Class Introduction Topics to be covered CS 239 Prerequisites Computer Security Grading Peter Reiher Reading materials January 9, 2006 Projects Office hours Web page Lecture 1 Lecture 1 Page 1


  1. Description of Class Introduction • Topics to be covered CS 239 • Prerequisites Computer Security • Grading Peter Reiher • Reading materials January 9, 2006 • Projects • Office hours • Web page Lecture 1 Lecture 1 Page 1 Page 2 CS 239, Winter 2006 CS 239, Winter 2006 Topics to Be Covered Prerequisites • Cryptography and authentication • Must have taken CS111 and CS118, or • Design of secure protocols equivalents • Network security – threats and • Desirable to have taken an advanced countermeasures OS course and advanced networking • Secure operating systems design course • Practical application of security principles • If time permits, other neat stuff Lecture 1 Lecture 1 Page 3 Page 4 CS 239, Winter 2006 CS 239, Winter 2006 Grading Class Format • Midterm – 25% • Typically we’ll start each session with a discussion of material from last • Project – 50% session • Final – 25% • Followed by lecture on new material • Always feel free to stop me for questions or interesting discussions Lecture 1 Lecture 1 Page 5 Page 6 CS 239, Winter 2006 CS 239, Winter 2006 1

  2. Reading Materials Textbook • Textbook • Computer Security: Art and Science • Non-required supplemental texts –By Matt Bishop • Papers and web pages –First edition • Should be available in UCLA bookstore • First reading assignment: Chapter 1 Lecture 1 Lecture 1 Page 7 Page 8 CS 239, Winter 2006 CS 239, Winter 2006 Supplemental Text 1 Supplemental Text 2 • Applied Cryptography • Secrets and Lies – Also by Bruce Schneier – By Bruce Schneier • Not a textbook at all • Only covers what its title implies • A philosophy of computer security – And, as Schneierhimself argues, there’s a • Great for appreciating the field and problems lot more to security • Not great for depth of technical details • But an excellent book on its subject • Not required • Not required – No readings will be assigned from this book – No reading assignments from this book – But if you plan to work in this field, read it Lecture 1 Lecture 1 Page 9 Page 10 CS 239, Winter 2006 CS 239, Winter 2006 Papers and Web Pages Projects • Usually one paper per week and a • Either individual or small group couple of web pages –Depending on size of class • Usually made available electronically • Usually requiring program –Through class web page development • Material in papers might or might not • Related to some topic covered in class be lectured on • Must be approved by instructor –But it can appear on tests, regardless Lecture 1 Lecture 1 Page 11 Page 12 CS 239, Winter 2006 CS 239, Winter 2006 2

  3. Choosing a Project Topic What Makes a Good Project? • Submit a 1 page proposal • Something new – By end of 3 d week of classes (January 27) • Something you’re interested in – Email submissions OK • Maybe it can turn into a paper for you • I will approve them and offer suggestions • Feasible to demonstrate something interesting within the quarter • Must be submitted, but not part of grade –Running code or other practical demonstration, not just a paper Lecture 1 Lecture 1 Page 13 Page 14 CS 239, Winter 2006 CS 239, Winter 2006 Possible Project Topics Project Updates th week of class • Security for Internet infrastructure • Due at the end of the 7 • Defenses against spam, phishing and click fraud –February 24 th • Handling botnets • Security for ad hoc wireless networks and peer systems • 1 page report on your group’s progress • Methods for measuring and evaluating security on its project • Intrusion and insider threat detection • DDoS and worm defense mechanisms –Email submission OK • Security for sensor networks • Security evaluations of local labs • Not graded, but required • Language-based approaches to secure coding –And should describe actual progress • OS enhancements for security Lecture 1 Lecture 1 Page 15 Page 16 CS 239, Winter 2006 CS 239, Winter 2006 Project Reports Project Demos • Written report on the project • Must show working version of project • Should: to instructor – Describe project • Schedule time individually for this – Discuss how project was performed • Must be done by middle of finals week – Cover difficulties and interesting points – Describe the implementation • Expected to be around 15 pages Lecture 1 Lecture 1 Page 17 Page 18 CS 239, Winter 2006 CS 239, Winter 2006 3

  4. Project Deadlines Tests • Submit project proposal – January 27 th • Midterm – February 8 in class • Submit project update – February 24 th • Final – March 22 (3-6 PM) • Demonstration of project to instructor • Both tests will be open book and project reports – March 24 th –Essay questions concentrating on applying knowledge Lecture 1 Lecture 1 Page 19 Page 20 CS 239, Winter 2006 CS 239, Winter 2006 Office Hours Class Web Page www.lasr.cs.ucla.edu/classes/239_1.winter06 • MW 2-3 • Slides for classes will be posted there • Held in 3532F Boelter Hall – By 5 PM the previous afternoon • Other times available by prior – In 6-up PDF form arrangement • Readings will be posted there – With links to papers • Also links to other interesting info Lecture 1 Lecture 1 Page 21 Page 22 CS 239, Winter 2006 CS 239, Winter 2006 Introduction to Why Is Security Necessary? Computer Security • Because people aren’t always nice • Why do we need computer security? • Because a lot of money is handled by • What are our goals and what threatens computers them? • Because a lot of important information is handled by computers • Because our society is increasingly dependent on correct operation of computers Lecture 1 Lecture 1 Page 23 Page 24 CS 239, Winter 2006 CS 239, Winter 2006 4

  5. Some Examples of Large Scale History of the Security Problem Security Problems • In the beginning, there was no computer security problem • The Internet Worm • Later, there was a problem, but nobody cared • Now, there’s a big problem and people care • New malicious code attacks – Only a matter of time before a real disaster – At least one company went out of business due to a • Distributed denial of service attacks DDoS attack – Many individuals have been harmed by phishing and • Vulnerabilities in commonly used identity theft systems – A cyberattack released a large quantity of sewage in Australia – Companies continue to increase spending on cybersecurity Lecture 1 Lecture 1 Page 25 Page 26 CS 239, Winter 2006 CS 239, Winter 2006 The Internet Worm Malicious Code Attacks • Launched in 1988 • Multiple new viruses, worms, and Trojan • A program that spread over the Internet to horses appear every week many sites • The Virkel.f Trojan horse attacks instant • Around 6,000 sites were shut down to get messaging rid of it – Clicking on a link in the instant message • And (apparently) its damage was largely infects your machine unintentional • IM attacks becoming increasingly popular • The holes it used have been closed – And cell phone attacks appearing – But the basic idea still works Lecture 1 Lecture 1 Page 27 Page 28 CS 239, Winter 2006 CS 239, Winter 2006 Distributed Denial of Service The DNS DDoS Attack Attacks • Use large number of compromised • Attack on the 13 root servers of the machines to attack one target DNS system – By exploiting vulnerabilities • Ping flood on all servers – Or just generating lots of traffic • Interrupted service from 9 of the 13 • Very common today • But did not interrupt DNS service in • Attacks are increasing in sophistication any noticeable way • In general form, an extremely hard problem Lecture 1 Lecture 1 Page 29 Page 30 CS 239, Winter 2006 CS 239, Winter 2006 5

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend