Wrapup CSE443 - Spring 2012 Introduction to Computer and Network - - PowerPoint PPT Presentation

wrapup
SMART_READER_LITE
LIVE PREVIEW

Wrapup CSE443 - Spring 2012 Introduction to Computer and Network - - PowerPoint PPT Presentation

Wrapup CSE443 - Spring 2012 Introduction to Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ CSE443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger Final The final is on


slide-1
SLIDE 1

CSE443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger

Wrapup

CSE443 - Spring 2012 Introduction to Computer and Network Security Professor Jaeger

www.cse.psu.edu/~tjaeger/cse443-s12/

slide-2
SLIDE 2

Page CSE443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger

Final

  • The final is on

– Thursday, May 3, 2:30 in 101 Althouse

  • Be late at your own peril (We may lock the door at 2:40)
  • You will have the full time to take the test, but no more
  • Coverage:

– Anything we talked about in class … – or appeared in the readings – Mainly topics since mid-term

  • Types of questions

– Constructive (here is scenario, design X and explain it) – Philosophical (why does Z argue that …) – Explanatory (what is the key tradeoff between A and B …)

2

slide-3
SLIDE 3

Page CSE443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger

Prior Topics

  • Terminology

– Any term defined in the early lectures

  • Crypto Algorithms

– Diffie-Hellman and RSA

  • Crypto protocols

– Public key – Secret key – Integrity, Authenticity, Secrecy

  • Authentication

– Kerberos, SSH, SSL, IPsec

  • Program Security

– Buffer and other overflows, name resolution attacks

  • Access Control

– Protection v Security, Mandatory Protection System, Reference Monitor

3

slide-4
SLIDE 4

Page CSE443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger

Topics Since Midterm

  • Capabilities and Sandboxes
  • Network Security
  • Web Security
  • Intrusion Detection
  • Stuxnet
  • MAC systems
  • Return-oriented programming
  • Virtual machine systems
  • Trusted Computing
  • Wireless Security

4

slide-5
SLIDE 5

Page CSE443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger

Capabilities

  • Problems

– Confused deputy

  • Considerations

– Chroot – Sandboxing and TOCTTOU – Capability definition – Crypto capabilities – Forgery – Confine access using capabilities – Usability

5

slide-6
SLIDE 6

Page CSE443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger

Network Security

  • Problems

– Network protocol vulnerabilities, network access, secure communication at IP level (IPsec), worms, bots

  • Considerations

– Basis for the various vulnerabilities – Firewall rule specification – IPsec principles – Worm propagation – Botnets and command & control

6

slide-7
SLIDE 7

Page CSE443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger

Web Security

  • Problems

– Secure communication (SSL/TLS), cookie, server vulnerabilities, client vulnerabilities, client defenses

  • Considerations

– SSL protocol tasks and results – Secure cookie design – Dynamic content processing – Javascript, applets, ... – Client security architectures

7

slide-8
SLIDE 8

Page CSE443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger

Intrusion Detection

  • Anomaly and misuse detection
  • Network and host IDS
  • Positives/Negatives
  • Bayes’ Rate Fallacy

8

slide-9
SLIDE 9

Page CSE443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger

Modern Attacks

  • Problems

– Stuxnet and Return-oriented programming

  • Considerations

– Stuxnet threats – Limitations that made these threats viable – Relationship between overflows and ROP – ROP execution model – Gadgets

9

slide-10
SLIDE 10

Page CSE443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger

MAC Systems VM Systems

  • MAC systems

– how does SELinux confine root processes? – how does SELinux prevent access to setuid programs? – why used for confining network facing daemons?

  • VM systems

– virtualization types – tasks for securing VM computation (VAX VMM) – IOMMU

10

slide-11
SLIDE 11

Page CSE443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger

Trusted Computing

  • Extend

– TPM hash chain operation over PCRs

  • Quote/Attest

– Sign PCR using challenge-response protocol

11

slide-12
SLIDE 12

Page CSE443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger

Wireless Security

  • Attacks on wireless

– radio channel

  • Attacks on WEP
  • NIST recommendations

– Why?

12

slide-13
SLIDE 13

Page CSE443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger

The state of security …

  • … issues are in public consciousness

– Press coverage is increasing … – Losses mounting … (billions and billions) – Affect increasing …… (ATMs, commerce)

  • What are we doing?

“… sound and fury signifying nothing …”

  • W. Shakespeare

(well, its not quite that bad)

13

slide-14
SLIDE 14

Page CSE443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger

The problems …

  • What is the root cause?

– Security is not a key goal … – … and it never has been … … so, we need to figure out how to change the way we do engineering (and science) … … to make computers secure.

  • Far too much misunderstanding about basic security

and the use of technology

  • This is also true physical security

14

slide-15
SLIDE 15

Page CSE443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger

The current solutions …

  • Make better software

– “we mean it” - B. Gates (2002) – “no really …” - B. Gates (2003) – “Linux is bad too …” - B. Gates (2005) – “it’s in longhorn ...” - B. Gates (2006)

  • CERT/SANS-based problem/event tracking

– Experts tracking vulnerabilities – Patch system improving

  • Destructive research

– Back-pressure on product developers – Arms-race with bad guys

  • Problem: reactive, rather than proactive

15

slide-16
SLIDE 16

Page CSE443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger

The real solutions …

  • Fix the economic incentive equation …

– Eventually, MS/Sun/Apple/*** will be in enough pain that they change the way they make software

  • Education

– Things will get better when people understand when how to use technology

  • Fix engineering practices

– Design for security

  • Apply technology

– What we have been talking about

16

slide-17
SLIDE 17

Page CSE443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger

The bottom line

  • The Web/Internet and new technologies are being

limited by their ability to address security and privacy concerns …

  • … it is incumbent in us as scientists to meet these

challenges.

– Evangelize importance of security … – Provide sound technologies … – Define better practices …

17

slide-18
SLIDE 18

Page CSE443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger

Thank You!!!

18

tjaeger@cse.psu.edu