Safety in the Cloud An Introduction to Cybersecurity Frank Chen | - - PowerPoint PPT Presentation

safety in the cloud
SMART_READER_LITE
LIVE PREVIEW

Safety in the Cloud An Introduction to Cybersecurity Frank Chen | - - PowerPoint PPT Presentation

CS 88S Safety in the Cloud An Introduction to Cybersecurity Frank Chen | Spring 2017 Agenda Introductions Icebreaker Activity Administrative Myths & Realities Computers, Networks, Paradigms of Cybersecurity Frank Chen |


slide-1
SLIDE 1 Frank Chen | Spring 2017

CS 88S

Safety in the Cloud

An Introduction to Cybersecurity

slide-2
SLIDE 2 Frank Chen | Spring 2017

Agenda

  • Introductions
  • Icebreaker Activity
  • Administrative
  • Myths & Realities
  • Computers, Networks, Paradigms of

Cybersecurity

slide-3
SLIDE 3 Frank Chen | Spring 2017

Agenda

  • Introductions
  • Icebreaker Activity
  • Administrative
  • Myths & Realities
  • Computers, Networks, Paradigms of

Cybersecurity

slide-4
SLIDE 4 Frank Chen | Spring 2017

Who am I?

I’m Canadian! I love poutine. 4th year @ UCLA Excited to graduate! Resident Assistant @ UCLA Residential Life Computer Science B.S. CS 136: Computer Security Incoming PM @ Microsoft Information Security

Frank Chen

slide-5
SLIDE 5 Frank Chen | Spring 2017

ASK ME ANYTHING, ANYTIME.

slide-6
SLIDE 6 Frank Chen | Spring 2017

Agenda

  • Introductions
  • Icebreaker Activity
  • Administrative
  • Myths & Realities
  • Computers, Networks, Paradigms of

Cybersecurity

slide-7
SLIDE 7 Frank Chen | Spring 2017

Why CS 88S?

Activity: Name Intended Area of Study Your "hidden hemisphere" Why CS 88S?

slide-8
SLIDE 8 Frank Chen | Spring 2017

The Five Why’s

Why Why Why Why Why

slide-9
SLIDE 9 Frank Chen | Spring 2017

Why Why Why Why Why

Why am I taking CS 88S?

Because I want to learn about cybersecurity.

slide-10
SLIDE 10 Frank Chen | Spring 2017

Why Why Why Why Why

Why am I taking CS 88S?

Because I want to learn about cybersecurity.

slide-11
SLIDE 11 Frank Chen | Spring 2017

Why Why Why Why Why

Why do I want to learn about cybersecurity?

Because I want to protect myself on the Internet.

slide-12
SLIDE 12 Frank Chen | Spring 2017

Why Why Why Why Why

Why do I want to learn about cybersecurity?

Because I want to protect myself on the Internet.

slide-13
SLIDE 13 Frank Chen | Spring 2017

Why Why Why Why Why

Why do I want to protect myself on the Internet?

Because I don’t want a malicious individual to hack me.

slide-14
SLIDE 14 Frank Chen | Spring 2017

Why Why Why Why Why

Why do I want to protect myself on the Internet?

Because I don’t want a malicious individual to hack me.

slide-15
SLIDE 15 Frank Chen | Spring 2017

Why Why Why Why Why

Why don’t I want to be hacked?

Because I have a lot of personal information

  • nline that should remain private.
slide-16
SLIDE 16 Frank Chen | Spring 2017

Why Why Why Why Why

Why don’t I want to be hacked?

Because I have a lot of personal information

  • nline that should remain private.
slide-17
SLIDE 17 Frank Chen | Spring 2017

Why Why Why Why Why

ISPs vs. Google/Amazon/Facebook

http://tcrn.ch/2nhnAI1 "Not only are users unable to control what traffic the ISP sees, but frequently they have no alternative; no Protonmail, no DuckDuckGo, no Signal. Much of the population gets to choose between two or three providers if they have any choice at all. This lack of choice puts ISPs in a different category from edge providers."
slide-18
SLIDE 18 Frank Chen | Spring 2017

Why Why Why Why Why

Why should my personal information remain private?

Because my personal information gives me access to my money, my personal contacts, my identification, and I don’t want that to be taken advantage of.

slide-19
SLIDE 19 Frank Chen | Spring 2017

Why Why Why Why Why

Why should my personal information remain private?

Because my personal information gives me access to my money, my personal contacts, my identification, and I don’t want that to be taken advantage of.

slide-20
SLIDE 20 Frank Chen | Spring 2017

cybersecurity protect myself hack privacy money, personal contact, identification extra (ex. security in IoT devices)

In Summary

~ 2 weeks ~ 4 weeks ~ 2 weeks ~ 2 weeks

slide-21
SLIDE 21 Frank Chen | Spring 2017

Agenda

  • Introductions
  • Icebreaker Activity
  • Administrative
  • Myths & Realities
  • Computers, Networks, Paradigms of

Cybersecurity

slide-22
SLIDE 22 Frank Chen | Spring 2017

Course Website!

http://kfrankc.me/cs88s

slide-23
SLIDE 23 Frank Chen | Spring 2017

A Note on “Homework”

slide-24
SLIDE 24 Frank Chen | Spring 2017

Grading Scheme → Grade

slide-25
SLIDE 25 Frank Chen | Spring 2017

<10

Hours

slide-26
SLIDE 26 Frank Chen | Spring 2017

“Being right keeps you in place. Being wrong forces you to explore.”

Steven Johnson Where Good Ideas Come From

slide-27
SLIDE 27 Frank Chen | Spring 2017

ASK ME ANYTHING, ANYTIME.

slide-28
SLIDE 28 Frank Chen | Spring 2017

Agenda

  • Introductions
  • Icebreaker Activity
  • Administrative
  • Myths & Realities
  • Computers, Networks, Paradigms of

Cybersecurity

slide-29
SLIDE 29 Frank Chen | Spring 2017

Myths vs. Reality

slide-30
SLIDE 30 Frank Chen | Spring 2017

Common Myths

  • “No one cares about my computer.”
  • “I have nothing worth stealing.”
  • “Who would go through the effort of targeting me?”
  • “It would be obvious if my computer was

compromised.”

slide-31
SLIDE 31 Frank Chen | Spring 2017

The Reality

  • “No one cares about my computer.”
  • Attacks are easily automated

○ For example: Spam & Phishing

slide-32
SLIDE 32 Frank Chen | Spring 2017

The Reality

  • “I have nothing worth stealing.”
  • There are billions to be made off of insecure

computers ○ Stolen money, but also: identities, accounts etc.

slide-33
SLIDE 33 Frank Chen | Spring 2017

The Reality

  • Who would go through the effort of targeting me?”
  • Many of you are valuable targets

○ Credit cards, shopping accounts, research lab data, corporate data etc.

slide-34
SLIDE 34 Frank Chen | Spring 2017

The Reality

  • “It would be obvious if my computer was

compromised.”

  • When someone wants to take advantage of your

information, they do NOT want you to discover them.

slide-35
SLIDE 35 Frank Chen | Spring 2017 “Nothing is more important to a democracy than a well-informed electorate.” Will McAvoy The Newsroom
slide-36
SLIDE 36 Frank Chen | Spring 2017

Nothing is more important to the success

  • f cybersecurity than a

cybersecurity-aware population.

slide-37
SLIDE 37 Frank Chen | Spring 2017

ASK ME ANYTHING, ANYTIME.

slide-38
SLIDE 38 Frank Chen | Spring 2017

Agenda

  • Introductions
  • Icebreaker Activity
  • Administrative
  • Myths & Realities
  • Computers, Internet, Paradigms of

Cybersecurity

slide-39
SLIDE 39 Frank Chen | Spring 2017

Computers

Computers deal with data. Computers are deterministic

slide-40
SLIDE 40 Frank Chen | Spring 2017

Internet

Internet brings everyone together. Internet is nondeterministic.

slide-41
SLIDE 41 Frank Chen | Spring 2017

The CIA Principle

C I A

Confidentiality Integrity Accessibility

slide-42
SLIDE 42 Frank Chen | Spring 2017

Confidentiality

C I A

Def: ability to hide information from those people unauthorised to view it.

slide-43
SLIDE 43 Frank Chen | Spring 2017

Confidentiality

C I A

slide-44
SLIDE 44 Frank Chen | Spring 2017

Integrity

C I A

Def: ability to ensure that data is an accurate and unchanged representation of the original secure information.

slide-45
SLIDE 45 Frank Chen | Spring 2017

Integrity

C I A

$1000.00
slide-46
SLIDE 46 Frank Chen | Spring 2017

Accessibility

C I A

Def: ability to ensure that the information concerned is readily accessible to the authorised viewer at all times

slide-47
SLIDE 47 Frank Chen | Spring 2017

Accessibility

C I A

http://tcrn.ch/2dt8sHy
slide-48
SLIDE 48 Frank Chen | Spring 2017

In Summary

C I A

Confidentiality Integrity Accessibility

slide-49
SLIDE 49 Frank Chen | Spring 2017

Sf C T

http://r29.co/2doFCmR

Always perform system update

slide-50
SLIDE 50 Frank Chen | Spring 2017
  • Mr. Robot, an Emmy Award-winning
TV drama starring a vigilante hacker

Next Week...