security concepts
play

Security Concepts Deian Stefan Slides adopted from Kirill Levchenko - PowerPoint PPT Presentation

CSE 127: Computer Security Security Concepts Deian Stefan Slides adopted from Kirill Levchenko and Stefan Savage Computer Security Analysis and protection of computer systems in an adversarial setting What is an adversary? An adversary


  1. CSE 127: Computer Security Security Concepts Deian Stefan Slides adopted from Kirill Levchenko and Stefan Savage

  2. Computer Security Analysis and protection of computer 
 systems in an adversarial setting

  3. What is an adversary? • An adversary is someone who seeks an outcome detrimental to your interests • We assume rational adversaries ➤ I.e., they act to maximize their payoff

  4. Adversarial Setting Example: Games ➤ Structured adversarial setting ➤ Opposing objectives well-defined

  5. Adversary or Attacker? • An adversary becomes an attacker when they act in a way that is detrimental to your interests • Distinction is not hugely important ➤ Adversary often used in cryptography ➤ Attacker often used in computer security ➤ Both ultimately mean “bad person”

  6. How do we define attackers? • Motives: ➤ Curiosity ➤ Fame ➤ Money ➤ National interest • Resources: ➤ Time, money, and training

  7. Classes of Attackers National Interest Spy Personal Gain Thief Trespasser Personal Fame Curiosity Vandal Author Script-Kiddy Hobbyist Expert Specialist Hacker From David Aucsmith, Microsoft.

  8. Computer Security Analysis and protection of computer 
 systems in an adversarial setting

  9. What do we mean by protection? • Protection of systems against an adversary ➤ Secrecy: Can’t view protected information ➤ Integrity: Can’t modify protected info or process ➤ Availability: Can’t deny access to system for others

  10. Computer Security Analysis and protection of computer 
 systems in an adversarial setting

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend