CSE331: Introduction to Networks and Security. Lecture 1 Fall 2006
|
|
|
- Andrea Amber McLaughlin
- 10 years ago
- Views:
Transcription
1 CSE331: Introduction to Networks and Security Lecture 1 Fall 2006
2 Basic Course Information Steve Zdancewic lecturer Web: Office hours: Tues. 9:30-10:30 Levine 511 Savi Basavaraj TA Office hours: TBA Course Web Pages: Course news group: upenn.cis.cse331 CSE331 Fall
3 Prerequisites Would like to learn network and security fundamentals Programming experience Java: CSE 121/115 C / Assembly: (not mandatory) CSE 240 Have not taken TCOM 500 take CIS 551 instead. CSE331 Fall
4 Recommended Reading No required text: instead, articles (mostly from the web) will be provided. Supplementary reading (available at library): Security in Computing 3 rd edition Charles P. Pfleeger Computer Networks: A Systems Approach Larry L. Peterson & Bruce S. Davie Applied Cryptography Bruce Schneier Slides will be available on the web (PDF) Linked to from the course schedule page. Material: Slides, Lectures, Articles, HW, Projects CSE331 Fall
5 Assessment Individual homework assignments 20% Group projects 40% 2 or 3 people per group Programming (in Java) Midterms I & II 24% Final exam 15% Time & place determined by registrar Covers entire course (mostly security) Participation (mandatory and subjective) 01% CSE331 Fall
6 Course Policies No late homework accepted Unless prior permission Emergency No collaboration on individual homework No individual work on group projects Regrades: Only reasonable requests Entire homework is regraded Scores may go up or down CSE331 Fall
7 Course Topics Software Security / Malicious Code Buffer overflows, viruses, worms, protection mechanisms Networks & Infrastructure Ethernet, , TCP/IP, Denial of Service, IPSEC, TLS/SSL Basic Cryptography Shared Key Crypto (AES/DES), Public Key Crypto (RSA) Crypto Software & Applications Cryptographic libraries, authentication, digital signatures System Security Hacker behavior, intrusion & anomaly detection, hacker and admin tools CSE331 Fall
8 Plan for today Try to answer the question: What is security? What do we mean by a secure system? Historical context Basic definitions & background Examples General principles of secure design CSE331 Fall
9 Software Vulnerabilities Every day you read about new software vulnerabilities in the news Buffer overflow vulnerabilities Format-string vulnerabilities Cross-site scripting vulnerabilities Check out for plenty of examples CSE331 Fall
10 CERT Vulnerabilities CSE331 Fall
11 CERT Incidents CSE331 Fall
12 What do we mean by security? What does it mean for a computer system to be secure? Comments generated from class discussion: The system only does things the way the designer intended. Should prevent unauthorized use. What about spam? CSE331 Fall
13 When is a program secure? When it does exactly what it should? Not more. Not less. But how do we know what a program is supposed to do? Somebody tells us? (But do we trust them?) We write the specification ourselves? (How do we verify that the program meets the specification?) We write the code ourselves? (But what fraction of the software you use have you written?) CSE331 Fall
14 When is a program secure? 2nd try: A program is secure when it doesn t do something it shouldn t. Easier to specify a list of bad things: Delete or corrupt important files Crash my system Send my password over the Internet Send threatening to the president posing as me But what if most of the time the program doesn t do bad things, but occasionally it does? Is it secure? CSE331 Fall
15 When is a program secure? Claim: Perfect security does not exist. Security vulnerabilities are the result of violating an assumption about the software (or, more generally the entire system). Corollary: As long as you make assumptions, you re vulnerable. And: You always need to make assumptions! Example: Buffer overflows Assumption (by programmer) is that the data will fit in the buffer. This leads to a vulnerability: Supply data that is too big for the buffer (thereby violating the assumptions) Vulnerabilities can be exploited by an attack. CSE331 Fall
16 When is a program secure enough? Security is all about tradeoffs Performance Cost Usability Functionality The right question is: how do you know when something is secure enough? Still a hard question Requires understanding of the tradeoffs involved Is Internet Explorer secure enough? Depends on context CSE331 Fall
17 How to think about tradeoffs? What is it that you are trying to protect? Music collection vs. nuclear missile design data How valuable is it? In what way is it valuable? Information may be important only to one person (e.g. private or passwords) Information may be important because it is accurate and reliable (e.g. bank s accounting information) A computer system may be important because of a service it provides (e.g. Google s web servers) CSE331 Fall
18 Historical Context Assigned Reading: Saltzer & Schroeder 1975 The Protection of Information in Computer Systems Chapter 1 of Anderson's book: Security Engineering Both available from course web pages Unauthorized information release Confidentiality Unauthorized information modification Integrity Unauthorized denial of use Availability What does unauthorized mean? CSE331 Fall
19 Example Security Techniques Labeling files with a list of authorized users Access control (must check that the user is permitted on access) Verifying the identity of a prospective user by demanding a password Authentication Shielding the computer to prevent interception and subsequent interpretation of electromagnetic radiation Covert channels Enciphering information sent over telephone lines Cryptography Locking the room containing the computer Physical aspects of security Controlling who is allowed to make changes to a computer system (both its hardware and software) Social aspects of security CSE331 Fall
20 Building Secure Software Source: book by John Viega and Gary McGraw Strongly recommend buying it if you care about implementing secure software. Designing software with security in mind What are the security goals and requirements? Risk Assessment Tradeoffs Why is designing secure software a hard problem? Design principles Implementation Testing and auditing CSE331 Fall
21 Security Goals Prevent common vulnerabilities from occurring (e.g. buffer overflows) Recover from attacks Traceability and auditing of security-relevant actions Monitoring Detect attacks Privacy, confidentiality, anonymity Protect secrets Authenticity Needed for access control, authorization, etc. Integrity Prevent unwanted modification or tampering Availability and reliability Reduce risk of DoS CSE331 Fall
22 Other Software Project Goals Functionality Usability Efficiency Time-to-market Simplicity Often these conflict with security goals Examples? So, an important part of software development is risk assessment/risk management to help determine the design choices made in light of these tradeoffs. CSE331 Fall
23 Risk Assessment Identify: What needs to be protected? From whom? For how long? How much is the protection worth? Refine specifications: More detailed the better (e.g. "Use crypto where appropriate." vs. "Credit card numbers should be encrypted when sent over the network.") How urgent are the risks? Follow good software engineering principles, but take into account malicious behavior. CSE331 Fall
24 Principles of Secure Software What guidelines are there for developing secure software? How would you go about building secure software? Class answers: CSE331 Fall
25 #1: Secure the Weakest Link Attackers go after the easiest part of the system to attack. So improving that part will improve security most. How do you identify it? Weakest link may not be a software problem. Social engineering Physical security When do you stop? CSE331 Fall
26 #2: Practice Defense in Depth Layers of security are harder to break than a single defense. Example: Use firewalls, and virus scanners, and encrypt traffic even if it's behind firewall CSE331 Fall
27 #3: Fail Securely Complex systems fail. Plan for it: Aside: For a great example, see the work of George Candea who's Ph.D. research is about something called "microreboots" Sometimes better to crash or abort once a problem is found. Letting a system continue to run after a problem could lead to worse problems. But sometimes this is not an option. Good software design should handle failures gracefully For example, handle exceptions CSE331 Fall
28 #4: Principle of Least Privilege Recall the Saltzer and Schroeder article Don't give a part of the system more privileges than it needs to do its job. Classic example is giving root privileges to a program that doesn't need them: mail servers that don't relinquish root privileges once they're up and running on port 25. Another example: Lazy Java programmer that makes all fields public to avoid writing accessor methods. Military's slogan: "Need to know" CSE331 Fall
29 #5: Compartmentalize As in software engineering, modularity is useful to isolate problems and mitigate failures of components. Good for security in general: Separation of Duties Means that multiple components have to fail or collude in order for a problem to arise. For example: In a bank the person who audits the accounts can't issue cashier's checks (otherwise they could cook the books). Good examples of compartmentalization for secure software are hard to find. Negative examples? CSE331 Fall
30 #6: Keep it Simple KISS: Keep it Simple, Stupid! Einstein: "Make things as simple as possible, but no simpler." Complexity leads to bugs and bugs lead to vulnerabilities. Failsafe defaults: The default configuration should be secure. Ed Felten quote: "Given the choice between dancing pigs and security, users will pick dancing pigs every time." CSE331 Fall
31 #7: Promote Privacy Don't reveal more information than necessary Related to least privileges Protect personal information Consider implementing a web pages that accepts credit card information. How should the cards be stored? What tradeoffs are there w.r.t. usability? What kind of authentication/access controls are there? CSE331 Fall
32 #8: Hiding Secrets is Hard The larger the secret, the harder it is to keep That's why placing trust in a cryptographic key is desirable Security through obscurity doesn't work Compiling secrets into the binary is a bad idea Code obfuscation doesn't work very well Reverse engineering is not that difficult Software antipirating measures don't work Even software on a "secure" server isn't safe (e.g. source code to Quake was stolen from id software) CSE331 Fall
33 #9: Be reluctant to trust Trusted Computing Base: The set of components that must function correctly in order for the system to be secure. The smaller the TCB, the better. Trust is transitive Be skeptical of code quality Especially when obtained from elsewhere Even when you write it yourself CSE331 Fall
34 #10 Use Community Resources Software developers are not cryptographers Don't implement your own crypto (e.g. bugs in Netscape's storage of user data) Make use of CERT, Bugtraq, developer information, etc. CSE331 Fall
Design Principles for Protection Mechanisms. Security Principles. Economy of Mechanism. Least Privilege. Complete Mediation. Economy of Mechanism (2)
Security Principles Design Principles for Protection Mechanisms Security is a system requirement just like performance, capability, cost, etc. Therefore, it may be necessary to trade off certain security
CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun
CSCI 454/554 Computer and Network Security Instructor: Dr. Kun Sun About Instructor Dr. Kun Sun, Assistant Professor of Computer Science http://www.cs.wm.edu/~ksun/ Phone: (757) 221-3457 Email: [email protected]
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
CIS 6930/4930 Computer and Network Security. Dr. Yao Liu
CIS 6930/4930 Computer and Network Security Dr. Yao Liu About Instructor Dr. Yao Liu, Office: ENB 336 Phone: 813-974-1079 Email: [email protected] URL: http://www.cse.usf.edu/~yliu/ Office hour: TR 2:00pm
CSC 474 Information Systems Security
CSC 474 Information Systems Security Introduction About Instructor Dr. Peng Ning, assistant professor of computer science http://www.csc.ncsu.edu/faculty/ning [email protected] (919)513-4457 Office: Room
CPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 1 September 2, 2015 CPSC 467, Lecture 1 1/13 Protecting Information Information security Security principles Crypto as a security
Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication
CS 458 / 658 Computer Security and Privacy Module 1 Introduction to Computer Security and Privacy Fall 2008 Course mechanics Instructor: Ian Goldberg Contact info: http://www.cs.uwaterloo.ca/ iang/ Office
Introduction to Security
2 Introduction to Security : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 25 October 2013 its335y13s2l01, Steve/Courses/2013/s2/its335/lectures/intro.tex,
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
CS 458 / 658 Computer Security and Privacy. Course mechanics. Course website. Module 1 Introduction to Computer Security and Privacy.
CS 458 / 658 Computer Security and Privacy Module 1 Introduction to Computer Security and Privacy Spring 2013 Course mechanics Instructor: Ian Goldberg https://cs.uwaterloo.ca/ iang/ Office hours: Thursdays
Weighted Total Mark. Weighted Exam Mark
CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU
EECS 588: Computer and Network Security. Introduction January 14, 2014
EECS 588: Computer and Network Security Introduction January 14, 2014 Today s Class Welcome! Goals for the course Topics, what interests you? Introduction to security research Components of your grade
Why Security Matters. Why Security Matters. 00 Overview 03 Sept 2015. CSCD27 Computer and Network Security. CSCD27 Computer and Network Security 1
CSCD27 Computer and Network Security Instructor: Alan Rosselet Office: IC-494 E-mail: rosselet @ utsc utoronto ca Web: http://www.utsc.utoronto.ca/~rosselet/cscd27/ 00 Overview CSCD27 Computer and Network
Threat Modeling. Frank Piessens ([email protected] ) KATHOLIEKE UNIVERSITEIT LEUVEN
Threat Modeling Frank Piessens ([email protected] ) Secappdev 2007 1 Overview Introduction Key Concepts Threats, Vulnerabilities, Countermeasures Example Microsoft s Threat Modeling Process
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
Introduction to Computer Security
Introduction to Computer Security (ECE 458) Vijay Ganesh Spring 2014 Online Resources, Books, Notes,... Books Introduction to Computer Security by Matt Bishop Computer Security: Art and Science by Matt
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 17 IT Security Controls, Plans and Procedures First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Implementing IT Security
BBM 461: SECURE PROGRAMMING INTRODUCTION. Ahmet Burak Can
BBM 461: SECURE PROGRAMMING INTRODUCTION 1 Ahmet Burak Can COURSE MATERIAL Counter Hack Reloaded:A Step-by- Step Guide to Computer Attacks and Effective Defenses, Edward Skoudis, Tom Liston, Prentice Hall
Application Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
Security Goals Services
1 2 Lecture #8 2008 Freedom from danger, risk, etc.; safety. Something that secures or makes safe; protection; defense. Precautions taken to guard against crime, attack, sabotage, espionage, etc. An assurance;
Security Defense Strategy Basics
Security Defense Strategy Basics Joseph E. Cannon, PhD Professor of Computer and Information Sciences Harrisburg University of Science and Technology Only two things in the water after dark. Gators and
Name: 1. CSE331: Introduction to Networks and Security Fall 2003 Dec. 12, 2003 1 /14 2 /16 3 /16 4 /10 5 /14 6 /5 7 /5 8 /20 9 /35.
Name: 1 CSE331: Introduction to Networks and Security Final Fall 2003 Dec. 12, 2003 1 /14 2 /16 3 /16 4 /10 5 /14 6 /5 7 /5 8 /20 9 /35 Total /135 Do not begin the exam until you are told to do so. You
EECS 588: Computer and Network Security. Introduction
EECS 588: Computer and Network Security Introduction January 13, 2014 Today s Cass Class Welcome! Goals for the course Topics, what interests you? Introduction to security research Components of your grade
Some principles of secure design. Designing Secure Systems module Autumn 2015
Some principles of secure design Designing Secure Systems module Autumn 2015 Design principles for protection mechanisms [Saltzer and Schroeder 1975] Caveat: No magic formulas We have no silver bullet.
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
How To Protect Your Network From Attack From Outside From Inside And Outside
IT 4823 Information Security Administration Firewalls and Intrusion Prevention October 7 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
CS 203 / NetSys 240. Network Security
CS 203 / NetSys 240 Network Security Winter 2015 http://sconce.ics.uci.edu/203-w15/ 1 Contact Information Instructor: Gene Tsudik Email: gene.tsudik *AT* uci.edu Phone: (949) 824-43410 use only as the
8 Steps for Network Security Protection
8 Steps for Network Security Protection cognoscape.com 8 Steps for Network Security Protection Many small and medium sized businesses make the mistake of thinking they won t be the target of hackers because
8 Steps For Network Security Protection
8 Steps For Network Security Protection 8 Steps For Network Security Protection Many small and medium sized businesses make the mistake of thinking they won t be the target of hackers because of their
Penetration Testing Service. By Comsec Information Security Consulting
Penetration Testing Service By Consulting February, 2007 Background The number of hacking and intrusion incidents is increasing year by year as technology rolls out. Equally, there is no hiding place your
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 Table of Contents Introduction AMI Communication Architecture Security Threats Security
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How
This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How Network Security Is Breached Network Security Policy
CSE331: Introduction to Networks and Security. Lecture 32 Fall 2004
CSE331: Introduction to Networks and Security Lecture 32 Fall 2004 Hackers / Intruders External attacks Typical hacker Exploits carried out remotely Does not have an account on the remote machine Insider
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs
Network Security Ola Lundh [email protected] Schedule/ time-table: landris.hh.se/ (NetwoSec) Course home-page: hh.se/english/ide/education/student/coursewebp ages/networksecurity cisco.netacad.net Packet
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
Computer and Network Security
EECS 588 Computer and Network Security Introduction January 12, 2016 Alex Halderman Today s Class Welcome! Goals for the course Topics, what interests you? Introduction to security research Components
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Security within a development lifecycle. Enhancing product security through development process improvement
Security within a development lifecycle Enhancing product security through development process improvement Who I am Working within a QA environment, with a focus on security for 10 years Primarily web
E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications
Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Who Are The Enemies? What Can They Do?
Who Are The Enemies? What Can They Do? Internet Software Security Issues in the Software Development Process Dr Charles P Pfleeger Pfleeger Consulting Group [email protected] Overview WAMPS 2009 - Workshop
Developing Network Security Strategies
NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network
Notes on Network Security - Introduction
Notes on Network Security - Introduction Security comes in all shapes and sizes, ranging from problems with software on a computer, to the integrity of messages and emails being sent on the Internet. Network
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK John T Lounsbury Vice President Professional Services, Asia Pacific INTEGRALIS Session ID: MBS-W01 Session Classification: Advanced
Network Security. Instructor: Adam Hahn
Network Security Instructor: Adam Hahn The syllabus Reading for Wednesday Ken Thompson, Reflections on Trusting Trust, Communication of the ACM, Vol. 27, No. 8, August 1984, pp. 761-763. http://cm.bell-labs.com/who/ken/trust.html
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus
Department of Computer & Information Sciences INFO-450: Information Systems Security Syllabus Course Description This course provides a deep and comprehensive study of the security principles and practices
Juniper Networks Secure
White Paper Juniper Networks Secure Development Lifecycle Six Practices for Improving Product Security Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3
Network Security: Introduction
Network Security: Introduction 1. Network security models 2. Vulnerabilities, threats and attacks 3. Basic types of attacks 4. Managing network security 1. Network security models Security Security has
INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph 0925910 I MCA
INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph 0925910 I MCA OVERVIEW Introduction Overview The IDS Puzzle Current State of IDS Threats I have a good firewall, why do I need an IDS? Expectations
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
ICTN 4040. Enterprise Database Security Issues and Solutions
Huff 1 ICTN 4040 Section 001 Enterprise Information Security Enterprise Database Security Issues and Solutions Roger Brenton Huff East Carolina University Huff 2 Abstract This paper will review some of
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
THE ROLE OF IDS & ADS IN NETWORK SECURITY
THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker
Cryptography and Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Shinu Mathew John http://shinu.info/ Chapter 1 Introduction http://shinu.info/ 2 Background Information Security requirements
CIS 551 / TCOM 401 Computer and Network Security
CIS 551 / TCOM 401 Computer and Network Security Spring 2008 Lecture 8 2/12/08 CIS/TCOM 551 1 Announcements Project 1 has been graded. Project 2: will be posted this week Due March 7th Network intrusion
90% of data breaches are caused by software vulnerabilities.
90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Introduction: Cyber attack is an unauthorized access to a computer
Principles of Computer Security. Dr George Danezis ([email protected])
Principles of Computer Security Dr George Danezis ([email protected]) Why SecAppDev? Learning security on the job is necessary. However, Foundations: Principles. (Today) Access control. Advances: Privacy-friendly
Web Application Security
Chapter 1 Web Application Security In this chapter: OWASP Top 10..........................................................2 General Principles to Live By.............................................. 4
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
CS 5490/6490: Network Security Fall 2015
CS 5490/6490: Network Security Fall 2015 Professor Sneha Kumar Kasera School of Computing 1 What is this course about? Comprehensive introduction to network security Ø learn principles of network security
Chapter 6: Fundamental Cloud Security
Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
If you know the enemy and know yourself, you need not fear the result of a hundred battles.
Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group [email protected] 1 (604) 961-0701 If you know the enemy and know yourself, you
CSE 5392 Sensor Network Security
About Instructor CSE 5392 Sensor Network Security Course Introduction Dr. Donggang Liu, assistant professor, CSE department http://ranger.uta.edu/~dliu [email protected] Tel: (817) 272-0741 Office: 330NH
SECURITY ISSUES INTERNET WORLD WIDE WEB FOR THE AND THE
SECURITY ISSUES FOR THE INTERNET AND THE WORLD WIDE WEB - Internet connections: a back door into the enterpre. - Internet security incidents. - Viruses and how they spread. - The internet as a hacker s
CSCI 4541/6541: NETWORK SECURITY
1 CSCI 4541/6541: NETWORK SECURITY COURSE INFO CSci 4541/6541 Tuesdays 6:10pm 8:40pm Bell Hall 108 Office Hours: Tuesdays 2:30pm 4:30pm Dr. Nan Zhang Office: SEH 4590 Phone: (202) 994-5919 Email: nzhang10
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
SECURITY CHAPTER 24 (6/E) CHAPTER 23 (5/E)
SECURITY CHAPTER 24 (6/E) CHAPTER 23 (5/E) 2 LECTURE OUTLINE Threats and countermeasures Access control mechanisms SQL s grant and revoke Role of views 3 THREATS What are the threats? Loss of integrity
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
Intrusion Detection Systems
Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics
Network Security and Firewall 1
Department/program: Networking Course Code: CPT 224 Contact Hours: 96 Subject/Course WEB Access & Network Security: Theoretical: 2 Hours/week Year Two Semester: Two Prerequisite: NET304 Practical: 4 Hours/week
Network Security and Privacy
CS 361S Network Security and Privacy Vitaly Shmatikov http://www.cs.utexas.edu/~shmat/courses/cs361s/ Course Personnel Instructor: Vitaly Shmatikov Office: GDC 6.812 Office hours: Tuesday, 1-2pm Open door
Threat modeling. Tuomas Aura T-110.4206 Information security technology. Aalto University, autumn 2011
Threat modeling Tuomas Aura T-110.4206 Information security technology Aalto University, autumn 2011 Threats Threat = something bad that can happen Given an system or product what are the threats against
BM482E Introduction to Computer Security
BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification
1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
