safety in the cloud
play

Safety in the Cloud An Introduction to Cybersecurity Frank Chen | - PowerPoint PPT Presentation

CS 88S Safety in the Cloud An Introduction to Cybersecurity Frank Chen | Spring 2017 Agenda Introductions Icebreaker Activity Administrative Myths & Realities Computers, Networks, Paradigms of Cybersecurity Frank Chen |


  1. CS 88S Safety in the Cloud An Introduction to Cybersecurity Frank Chen | Spring 2017

  2. Agenda ● Introductions ● Icebreaker Activity ● Administrative ● Myths & Realities ● Computers, Networks, Paradigms of Cybersecurity Frank Chen | Spring 2017

  3. Agenda ● Introductions ● Icebreaker Activity ● Administrative ● Myths & Realities ● Computers, Networks, Paradigms of Cybersecurity Frank Chen | Spring 2017

  4. Who am I? I’m Canadian! I love Computer Science B.S. poutine. 4 th year @ UCLA CS 136: Computer Security Excited to graduate! Resident Assistant @ Incoming PM @ Microsoft UCLA Residential Life Information Security Frank Chen Frank Chen | Spring 2017

  5. ASK ME ANYTHING, ANYTIME. Frank Chen | Spring 2017

  6. Agenda ● Introductions ● Icebreaker Activity ● Administrative ● Myths & Realities ● Computers, Networks, Paradigms of Cybersecurity Frank Chen | Spring 2017

  7. Activity: Why CS 88S? Name Intended Area of Study Your "hidden hemisphere" Why CS 88S? Frank Chen | Spring 2017

  8. Why Why Why Why Why The Five Why’s Frank Chen | Spring 2017

  9. Why Why Why Why Why Why am I taking CS 88S? Because I want to learn about cybersecurity . Frank Chen | Spring 2017

  10. Why Why Why Why Why Why am I taking CS 88S? Because I want to learn about cybersecurity . Frank Chen | Spring 2017

  11. Why Why Why Why Why Why do I want to learn about cybersecurity? Because I want to protect myself on the Internet. Frank Chen | Spring 2017

  12. Why Why Why Why Why Why do I want to learn about cybersecurity? Because I want to protect myself on the Internet. Frank Chen | Spring 2017

  13. Why Why Why Why Why Why do I want to protect myself on the Internet? Because I don’t want a malicious individual to hack me. Frank Chen | Spring 2017

  14. Why Why Why Why Why Why do I want to protect myself on the Internet? Because I don’t want a malicious individual to hack me. Frank Chen | Spring 2017

  15. Why Why Why Why Why Why don’t I want to be hacked? Because I have a lot of personal information online that should remain private . Frank Chen | Spring 2017

  16. Why Why Why Why Why Why don’t I want to be hacked? Because I have a lot of personal information online that should remain private . Frank Chen | Spring 2017

  17. Why Why Why Why Why ISPs vs. Google/Amazon/Facebook "Not only are users unable to control what traffic the ISP sees, but frequently they have no alternative; no Protonmail , no DuckDuckGo , no Signal . Much of the population gets to choose between two or three providers if they have any choice at all. This lack of choice puts ISPs in a different category from edge providers. " http://tcrn.ch/2nhnAI1 Frank Chen | Spring 2017

  18. Why Why Why Why Why Why should my personal information remain private? Because my personal information gives me access to my money , my personal contacts , my identification , and I don’t want that to be taken advantage of. Frank Chen | Spring 2017

  19. Why Why Why Why Why Why should my personal information remain private? Because my personal information gives me access to my money , my personal contacts , my identification , and I don’t want that to be taken advantage of. Frank Chen | Spring 2017

  20. In Summary cybersecurity ~ 2 weeks protect myself ~ 4 weeks hack privacy ~ 2 weeks money, personal contact, identification ~ 2 weeks extra ( ex. security in IoT devices ) Frank Chen | Spring 2017

  21. Agenda ● Introductions ● Icebreaker Activity ● Administrative ● Myths & Realities ● Computers, Networks, Paradigms of Cybersecurity Frank Chen | Spring 2017

  22. Course Website! http://kfrankc.me/cs88s Frank Chen | Spring 2017

  23. A Note on “Homework” Frank Chen | Spring 2017

  24. Grading Scheme → Grade Frank Chen | Spring 2017

  25. <10 Hours Frank Chen | Spring 2017

  26. “Being right keeps you in place. Being wrong forces you to explore.” Steven Johnson Where Good Ideas Come From Frank Chen | Spring 2017

  27. ASK ME ANYTHING, ANYTIME. Frank Chen | Spring 2017

  28. Agenda ● Introductions ● Icebreaker Activity ● Administrative ● Myths & Realities ● Computers, Networks, Paradigms of Cybersecurity Frank Chen | Spring 2017

  29. Myths vs. Reality Frank Chen | Spring 2017

  30. Common Myths ● “No one cares about my computer.” ● “I have nothing worth stealing.” ● “Who would go through the effort of targeting me?” ● “It would be obvious if my computer was compromised.” Frank Chen | Spring 2017

  31. The Reality ● “No one cares about my computer.” ● Attacks are easily automated ○ For example: Spam & Phishing Frank Chen | Spring 2017

  32. The Reality ● “I have nothing worth stealing.” ● There are billions to be made off of insecure computers ○ Stolen money, but also: identities, accounts etc. Frank Chen | Spring 2017

  33. The Reality ● Who would go through the effort of targeting me?” ● Many of you are valuable targets ○ Credit cards, shopping accounts, research lab data, corporate data etc. Frank Chen | Spring 2017

  34. The Reality ● “It would be obvious if my computer was compromised.” ● When someone wants to take advantage of your information, they do NOT want you to discover them. Frank Chen | Spring 2017

  35. “Nothing is more important to a democracy than a well-informed electorate.” Will McAvoy The Newsroom Frank Chen | Spring 2017

  36. Nothing is more important to the success of cybersecurity than a cybersecurity-aware population. Frank Chen | Spring 2017

  37. ASK ME ANYTHING, ANYTIME. Frank Chen | Spring 2017

  38. Agenda ● Introductions ● Icebreaker Activity ● Administrative ● Myths & Realities ● Computers, Internet, Paradigms of Cybersecurity Frank Chen | Spring 2017

  39. Computers Computers deal with data . Computers are deterministic Frank Chen | Spring 2017

  40. Internet Internet brings everyone together. Internet is nondeterministic . Frank Chen | Spring 2017

  41. The CIA Principle C Confidentiality I Integrity A Accessibility Frank Chen | Spring 2017

  42. Confidentiality C Def: ability to hide information from those people unauthorised I to view it. A Frank Chen | Spring 2017

  43. Confidentiality C I A Frank Chen | Spring 2017

  44. Integrity C Def: ability to ensure that data is an accurate and unchanged representation of the original I secure information. A Frank Chen | Spring 2017

  45. Integrity C I $1000.00 A Frank Chen | Spring 2017

  46. Accessibility C Def: ability to ensure that the information concerned is readily I accessible to the authorised viewer at all times A Frank Chen | Spring 2017

  47. Accessibility C I A Frank Chen | Spring 2017 http://tcrn.ch/2dt8sHy

  48. In Summary C Confidentiality I Integrity A Accessibility Frank Chen | Spring 2017

  49. S�f��� �� ��� C���� T�� Always perform system update http://r29.co/2doFCmR Frank Chen | Spring 2017

  50. Mr. Robot, an Emmy Award-winning TV drama starring a vigilante hacker Next Week... Frank Chen | Spring 2017

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend