Computer and Information Security



Similar documents
Introduction to Computer Security

Introduction to Security

Weighted Total Mark. Weighted Exam Mark

Content Teaching Academy at James Madison University

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

EXIN Information Security Foundation based on ISO/IEC Sample Exam

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

Security Goals Services

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Network Security and the Small Business

Application Intrusion Detection

UVic Department of Electrical and Computer Engineering

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

CSE 5392 Sensor Network Security

Network Security. Instructor: Adam Hahn

IY2760/CS3760: Part 6. IY2760: Part 6

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Information, Network & Cyber Security

Business Continuity Planning in IT

Cryptography and Network Security

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Introduction to Information Security

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

REVIEW ON RISING RISKS AND THREATS IN NETWORK SECURITY

Security Basics: A Whitepaper

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Data Management & Protection: Common Definitions

Chap. 1: Introduction

Computer Networks & Computer Security

1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics

CompTIA Security+ (Exam SY0-410)

Principle of Information Security. Asst. Prof. Kemathat Vibhatavanij Ph.D.

Foundations of Computer Security

NOS for IT User and Application Specialist. IT Security (ESKITU04) November 2014 V1.0

Managing Information Resources and IT Security

Network Security: Introduction

Security Defense Strategy Basics

How To Secure Cloud Computing

Notes on Network Security - Introduction

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; /6834)

The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them

CSE331: Introduction to Networks and Security. Lecture 1 Fall 2006

ICASAS505A Review and update disaster recovery and contingency plans

Hackers: Detection and Prevention

Incident Reporting Guidelines for Constituents (Public)

CSCI 4541/6541: NETWORK SECURITY

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

NETWORK SECURITY ASPECTS & VULNERABILITIES

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

Read this guide and you ll discover:

USB Baiting. Project Proposal. Daan Wagenaar, Dimitar Pavlov, Yannick Scheelen. Universiteit van Amsterdam

Computer Security: Principles and Practice

COSC 472 Network Security

Security in Database Systems

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Data Security Incident Response Plan. [Insert Organization Name]

Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software

CYBER SECURITY. II. SCANDALOUS HACKINGS To show the seriousness of hacking we have included some very scandalous hacking incidences.

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

Multi-Factor Authentication (FMA) A new security feature for Home Banking. Frequently Asked Questions 8/17/2006

Network Incident Report

What is Web Security? Motivation

CISCO IOS NETWORK SECURITY (IINS)

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

External Supplier Control Requirements

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

Networked Systems Security

Audit/Logging Repudiation. Security Testing: Testing for What It s NOT supposed to do

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Disaster Recovery. 1.1 Introduction. 1.2 Reasons for Disaster Recovery. EKAM Solutions Ltd Disaster Recovery

National Cyber Crime Unit

Internet Safety and Security: Strategies for Building an Internet Safety Wall

COB 302 Management Information System (Lesson 8)

Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis

E-BUSINESS THREATS AND SOLUTIONS

Lecture 15 - Web Security

Malicious Software. Ola Flygt Växjö University, Sweden Viruses and Related Threats

Hacking Database for Owning your Data

The Information Security Problem

Transcription:

Computer Computer and Information Lecture 1 Introduction

Computer Course Description Course Work Course Description This course builds on Operating Systems Network and System Administration 1 Lectures and all class assignments will be in English 10 ECTS No final exam Folder assessment (mappevurdering)

Computer Course Description Course Work The lectures Lectures Time: Wednesday, 08:30-10:15 Location: P35-PI257 Problem Classes (Øvingstimer) Time: Tuesday, 12:30-14:15 Location: P35-PI257

Computer Course Description Course Work Required Reading This book is the curriculum: Computer, Dieter Gollmann All references, if not otherwise specified, will be to this book

Computer Course Description Course Work Required Reading, option 1 This book is the curriculum: Introduction to Computer, Matt Bishop This book covers the curriculum, and is a good book, but is a bit more detailed.

Computer Course Description Course Work Required Reading, option 2 Computer : Art and Science, Matt Bishop This book can be used in stead of the other Bishop book It has even more information than the Bishiop book on the previous slide

Computer Course Description Course Work Required Reading, option 3 Network Essentials: Applications and Standards, William Stallings Have not been able to review it properly Seems to have potential. Can be used in place of the others.

Computer Course Description Course Work Optional Reading Other books worth reading: Secrets and Lies, Bruce Schneier The Code Book, Simon Singh The art of intrusion, Kevin Mitnick The art of deception, Kevin Mitnick

Computer Course Description Course Work My expectations Course: 10 ECTS Work week: 40 hours Your work load: 13 hours 20 minutes every week

Computer Course Description Course Work Handing in Work When writing an answer, do not copy. This means that you may not copy from: The Internet From Co-students Work previously handed in by former students Any other source, including, but not limited to Books Magazines Papers

Computer Course Description Course Work Handing in Work Legal ways to copy You may copy others work if you are Quoting (or Citing) Paraphrasing Rephrase But only do this on short sections. Definition (Quote) Repeat or copy out, typically with an indication that one is not the original author or speaker. Definition (Paraphrase) Express the meaning of the writer using different words. Definition (Rephrasing) Express in an alternative way, especially with the purpose of changing the detail or perspective of the original idea.

Computer Course Description Course Work Handing in Work Do it, and to it well Discuss with fellow students. Research your questions. Do the work by yourself. Do not just copy from others. Think for your self.

Computer Computers and is security, whether it is on a computer or not. The principles are general. We want to protect our assets. So what is valuable to us? Money Information Freedom of speech...

Computer Risk and Certainty There is alway an element of risk. What level of risk can we accept? We want to protect our property or interest. Restrict or grant access. Who can we trust?

Computer Risk and Certainty Criteria for measuring computer security: Confidentiality/Privacy The ability to keep things private/confidential. Trust Can we trust this data? Authenticity Are we talking with whom we think we are talking? Integrity Is the system compromised/altered? Non-repudiation It should not be possible to deny having done an action.

Computer Physical Threats The environment that the computer is a part of can be dangerous. Weather Rain Lightning Natural Disasters Flood Earthquake Hurricane Power failures etc...

Computer Human Threats Humans can be dangerous to computer systems. Stealing Trickery Bribery Hacking Spying Sabotage Accident etc...

Computer Software threats Computers can be a threat to other computers. Malicious software is a huge problem. Virus Trojan Horses Logic Bombs Denial of Service (DOS) attack

Computer What are the risks? As mentioned, there are many threats to the system. So what do we stand to lose? We might lose the control of the system the ability to use the system privacy (e.g. private or sensitive information) data (deleted files) face/reputation money

Computer Goals of security Prevention Detection Recovery

Computer Mantra Mantra #1 Every problem in security boils down to a question of trust. Who or what do we trust?

Computer So what do we trust? Predictability We trust things that are predictable. We believe we are secure if we trust.

Computer Mantra Mantra #2 is a property of systems. should be designed or built into the system from the start.

Computer Where do we need security? User Interface Functionality Algorithms/Methods System calls Hardware Communication Implicit trust relationships

Computer What can we do to be secure? Failure All systems fail. We have to make sure that they fail predictably. Main theme What can we do to ensure predictability?

Computer What can we do to be secure? Create protocols Limit functionality Standardise Behaviour Interface Communication

Computer Definition (From Merriam-Webster Online) a : a definite course or method of action selected from among alternatives and in light of given conditions to guide and determine present and future decisions b : a high-level overall plan embracing the general goals and acceptable procedures especially of a governmental body Definition (From Wikipedia) A policy is a plan of action for tackling issues.

Computer policy Definition () A security policy is a statement of what is, and what is not, allowed.

Computer There are several challenges with making policies: We have to state what we value. We do not always agree on what is valuable. is often inconvenient. Management is necessary (assign and control of privileges).

Computer Final thoughts Do you trust the information in this course? Do you trust the identity and authenticity of the source? Can you verify that I am who I say I am? Do I have a hidden agenda? How much proof is enough?

Computer Contact Information mailto:simen.hagen@iu.hio.no http://www.iu.hio.no/~simenhag Lu Xing mailto:lu.xing@stud.iu.hio.no