prolog to lecture 2 cs 236 on line ms program networks
play

Prolog to Lecture 2 CS 236 On-Line MS Program Networks and Systems - PowerPoint PPT Presentation

Prolog to Lecture 2 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Lecture 2 Page 1 CS 236 Online Whats This Prolog Stuff? When I can, I will add a short presentation to each lecture Discussing application


  1. Prolog to Lecture 2 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Lecture 2 Page 1 CS 236 Online

  2. What’s This Prolog Stuff? • When I can, I will add a short presentation to each lecture • Discussing application of material from the previous or recent lectures • Generally stuff that’s pretty timely Lecture 2 Page 2 CS 236 Online

  3. Do We Really Care About Security? • Security gets a lot of lip-service • But is the community out there really behind it? – Particularly the industrial community that builds our software? • Two recent stories suggest maybe not Lecture 2 Page 3 CS 236 Online

  4. 1. Fun With Firewire • Many computers have firewire interfaces – Especially laptops • These interfaces allow direct access to memory – No access control – No nuthin’ Lecture 2 Page 4 CS 236 Online

  5. What’s That Mean? • Anyone who hooks up a firewire device to your laptop doesn’t need to log in • He can just read and alter the memory • Proof-of-concept tool 1 allows you to own Windows machine in seconds 1 http://www.darkreading.com/document.asp?doc_id=147713&f_src=drweekly – Lecture 2 Page 5 CS 236 Online

  6. What’s the Response? • “Well, duh, that’s what Firewire is supposed to do” • In other words, we designed your computer to let anyone take it over – If they have physical access • All this login stuff is just window dressing to impress the rubes Lecture 2 Page 6 CS 236 Online

  7. 2. Backdoor Processors • Many devices come with complete processors “hidden” inside – Printers, routers, storage devices, etc. • They’re installed with complete OSes – Often very badly configured • Allowing anyone access • E.g., Cisco had an undocumented test interface in wireless APs and routers (2013) – Allowed attacker to run anything on them Lecture 2 Page 7 CS 236 Online

  8. The Implications • If attacker knows about these, • And you don’t, • He’s got a hidden backdoor into your system • Often these processors have network capabilities • And can access the CPU you already knew you had Lecture 2 Page 8 CS 236 Online

  9. What’s That Mean? • The people who put these processors in neither knew nor cared about security • System management (the purpose of them) was more important • They didn’t care enough to even mention they were there Lecture 2 Page 9 CS 236 Online

  10. The General Lesson • Just because people say they care about security doesn’t mean they do • Many decisions seem to be made without even considering security implications Lecture 2 Page 10 CS 236 Online

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend