CS 88S
Safety in the Cloud
An Introduction to Cybersecurity
Safety in the Cloud An Introduction to Cybersecurity Frank Chen | - - PowerPoint PPT Presentation
CS 88S Safety in the Cloud An Introduction to Cybersecurity Frank Chen | Spring 2017 Agenda Introductions Icebreaker Activity Administrative Myths & Realities Computers, Networks, Paradigms of Cybersecurity Frank Chen |
CS 88S
Safety in the Cloud
An Introduction to Cybersecurity
Agenda
Cybersecurity
Agenda
Cybersecurity
Who am I?
I’m Canadian! I love poutine. 4th year @ UCLA Excited to graduate! Resident Assistant @ UCLA Residential Life Computer Science B.S. CS 136: Computer Security Incoming PM @ Microsoft Information SecurityFrank Chen
ASK ME ANYTHING, ANYTIME.
Agenda
Cybersecurity
Why CS 88S?
Activity: Name Intended Area of Study Your "hidden hemisphere" Why CS 88S?
The Five Why’s
Why Why Why Why Why
Why Why Why Why Why
Why am I taking CS 88S?
Because I want to learn about cybersecurity.
Why Why Why Why Why
Why am I taking CS 88S?
Because I want to learn about cybersecurity.
Why Why Why Why Why
Why do I want to learn about cybersecurity?
Because I want to protect myself on the Internet.
Why Why Why Why Why
Why do I want to learn about cybersecurity?
Because I want to protect myself on the Internet.
Why Why Why Why Why
Why do I want to protect myself on the Internet?
Because I don’t want a malicious individual to hack me.
Why Why Why Why Why
Why do I want to protect myself on the Internet?
Because I don’t want a malicious individual to hack me.
Why Why Why Why Why
Why don’t I want to be hacked?
Because I have a lot of personal information
Why Why Why Why Why
Why don’t I want to be hacked?
Because I have a lot of personal information
Why Why Why Why Why
ISPs vs. Google/Amazon/Facebook
http://tcrn.ch/2nhnAI1 "Not only are users unable to control what traffic the ISP sees, but frequently they have no alternative; no Protonmail, no DuckDuckGo, no Signal. Much of the population gets to choose between two or three providers if they have any choice at all. This lack of choice puts ISPs in a different category from edge providers."Why Why Why Why Why
Why should my personal information remain private?
Because my personal information gives me access to my money, my personal contacts, my identification, and I don’t want that to be taken advantage of.
Why Why Why Why Why
Why should my personal information remain private?
Because my personal information gives me access to my money, my personal contacts, my identification, and I don’t want that to be taken advantage of.
cybersecurity protect myself hack privacy money, personal contact, identification extra (ex. security in IoT devices)
In Summary
~ 2 weeks ~ 4 weeks ~ 2 weeks ~ 2 weeks
Agenda
Cybersecurity
Course Website!
http://kfrankc.me/cs88s
A Note on “Homework”
Grading Scheme → Grade
Hours
“Being right keeps you in place. Being wrong forces you to explore.”
Steven Johnson Where Good Ideas Come From
ASK ME ANYTHING, ANYTIME.
Agenda
Cybersecurity
Myths vs. Reality
Common Myths
compromised.”
The Reality
○ For example: Spam & Phishing
The Reality
computers ○ Stolen money, but also: identities, accounts etc.
The Reality
○ Credit cards, shopping accounts, research lab data, corporate data etc.
The Reality
compromised.”
information, they do NOT want you to discover them.
Nothing is more important to the success
cybersecurity-aware population.
ASK ME ANYTHING, ANYTIME.
Agenda
Cybersecurity
Computers
Computers deal with data. Computers are deterministic
Internet
Internet brings everyone together. Internet is nondeterministic.
The CIA Principle
C I A
Confidentiality Integrity Accessibility
Confidentiality
C I A
Def: ability to hide information from those people unauthorised to view it.
Confidentiality
C I A
Integrity
C I A
Def: ability to ensure that data is an accurate and unchanged representation of the original secure information.
Integrity
C I A
$1000.00Accessibility
C I A
Def: ability to ensure that the information concerned is readily accessible to the authorised viewer at all times
Accessibility
C I A
http://tcrn.ch/2dt8sHyIn Summary
C I A
Confidentiality Integrity Accessibility
Sf C T
http://r29.co/2doFCmRAlways perform system update
Next Week...