CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun



Similar documents
CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

CSC 474 Information Systems Security

CSE 5392 Sensor Network Security

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

External Supplier Control Requirements

CS 450/650 Fundamentals of Integrated Computer Security

CSCI 4541/6541: NETWORK SECURITY

CSCI 4250/6250 Fall 2015 Computer and Network Security. Instructor: Prof. Roberto Perdisci

Weighted Total Mark. Weighted Exam Mark

Boston University MET CS 690. Network Security

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

Passing PCI Compliance How to Address the Application Security Mandates

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

COSC 472 Network Security

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

BBM 461: SECURE PROGRAMMING INTRODUCTION. Ahmet Burak Can

CSE331: Introduction to Networks and Security. Lecture 1 Fall 2006

Security Goals Services

Security + Certification (ITSY 1076) Syllabus

CSC574 - Computer and Network Security Module: Introduction

MW , TU 1-3; and other times by appointment

Lecture 1 - Overview

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

EECS 588: Computer and Network Security. Introduction January 14, 2014

CPSC 467: Cryptography and Computer Security

CSE343/443 Lehigh University Fall Course Overview. Presenter: Yinzhi Cao Lehigh University

CS 5490/6490: Network Security Fall 2015

Information Security Basic Concepts

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Content Teaching Academy at James Madison University

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Module: Introduction. Professor Trent Jaeger Fall CSE543 - Introduction to Computer and Network Security

CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; /6834)

Computer and Network Security

CIS 4204 Ethical Hacking Fall, 2014

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

EECS 588: Computer and Network Security. Introduction

A Systems Engineering Approach to Developing Cyber Security Professionals

Computer and Network Security

CS 464/564 Networked Systems Security SYLLABUS

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Computer Security: Principles and Practice

Bellevue University Cybersecurity Programs & Courses

Principles of Information Assurance Syllabus

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Juniper Networks Secure

CS Ethical Hacking Spring 2016

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers

FORBIDDEN - Ethical Hacking Workshop Duration

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

CNT4406/5412 Network Security Introduction

TCOM 562 Network Security Fundamentals

External Supplier Control Requirements

CompTIA Security+ (Exam SY0-410)

Introduction to Cyber Security / Information Security

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

Loophole+ with Ethical Hacking and Penetration Testing

Chap. 1: Introduction

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications

CS 458 / 658 Computer Security and Privacy. Course mechanics. Course website. Module 1 Introduction to Computer Security and Privacy.

Security Practices for Online Collaboration and Social Media

Computer Security (EDA263 / DIT 641)

Why Security Matters. Why Security Matters. 00 Overview 03 Sept CSCD27 Computer and Network Security. CSCD27 Computer and Network Security 1

Cryptography and network security CNET4523

Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Information Security Services

Master of Science in Information Systems & Security Management. Courses Descriptions

Cybersecurity Awareness. Part 1

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. March 19, 2015

The Information Security Problem

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Network Security: Introduction

Introduction to Computer Security

Evaluate the Usability of Security Audits in Electronic Commerce

Security Defense Strategy Basics

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

ITSY Security Assessment/Auditing Spring 2010 Professor: Zoltan Szabo D111 LEC TR 11:20AM 12:45PM D111 LAB TR 12:50PM 02:15PM

Risk Management Guide for Information Technology Systems. NIST SP Overview

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

CS 340 Cyber Security Weisberg Division of Computer Science College of Information Technology & Engineering Marshall University

CNA 432/532 OSI Layers Security

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Transcription:

CSCI 454/554 Computer and Network Security Instructor: Dr. Kun Sun

About Instructor Dr. Kun Sun, Assistant Professor of Computer Science http://www.cs.wm.edu/~ksun/ Phone: (757) 221-3457 Email: ksun@wm.edu Office: McGrothlin-Street Hall, 105 Office hours 2:00pm-3:15pm MW, or by appointment (send me email) 2

About TA Wenting Tan Email: wwtan@email.wm.edu Office: : McGrothlin-Street Hall, 107-A Office Hour: by appointment (send email) 3

Course Objectives Understanding of basic issues, concepts, principles, and mechanisms in computer and network security. Basic security concepts Cryptography Authentication Kerberos IPsec and Internet key management SSL/TLS Firewall Be able to determine appropriate mechanisms for protecting networked systems. 4

Course Outline Basic Security Concepts Confidentiality, integrity, availability Security policies, security mechanisms, security assurance Cryptography Basic number theory Secret key cryptosystems Public key cryptosystems Hash function Key management 5

Course Outline (Cont d) Identification and Authentication Basic concepts of identification and authentication User authentication Authentication protocols 6

Course Outline (Cont d) Network and Distributed Systems Security Public Key Infrastructure (PKI) Kerberos IPsec IPsec key management SSL/TLS Firewalls 7

Course Outline (Cont d) Miscellaneous topics Evaluation of secure information systems Mobile security Cloud security Malicious software Security management 8

Project Research paper Survey paper Term Project See the class website for detailed requirement You are expected to explore issues beyond what s included in lectures by yourselves 9

What s Left Out? Hacking System configuration, O.S. internals Political, legal, regulatory Financial, economics Social, psychological, human factors Morals, ethics Operational, business procedures, logistics 10

Prerequisites Programming experience in Java and C is required Knowledge in data communication and networking CSCI 415 11

Required textbook Textbook Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: Private Communication in a Public World, 2nd Edition, Prentice Hall, ISBN-13: 007-6092018469, ISBN-10: 0130460192. 12

WWW page: On-line Resources http://www.cs.wm.edu/~ksun/ csci454-s15/index.html For course materials, e.g., lecture slides, homework files, project, tools, etc. Will be updated frequently. So check frequently. 13

Grading CSCI 454 Homework assignments 25% Term project: 10% Midterm exam: 30% Final exam: 35% CSCI 554 Homework assignments 20% Term project: 30% Midterm exam: 20% Final exam: 30% Note: you must use text editor (e.g. MS Word, latex) to complete your homework and project. Handwritten submissions are not accepted. 14

Policies on late assignments Homework and project deadlines will be hard. Late homework will be accepted with a 10% reduction in grade for each day they are late by. Once a homework assignment is discussed in class, submissions will no longer be accepted. 15

Policies on Absences and Makeup You may be excused from an exam only with a university approved condition, with proof. For example, if you cannot take an exam because of a sickness, we will need a doctor's note. Events such as going on a business trip or attending a brother's wedding are not an acceptable excuse for not taking an exam at its scheduled time and place. You will have one chance to take a makeup exam if your absence is excused. There will be no makeup for homework assignments. 16

Academic Integrity The university, college, and department policies against academic dishonesty will be strictly enforced. Honor code Students are required to follow William and Mary's Honor System, as described in the student handbook. 17

Check the website for details! 18

CSCI 454/554 Computer and Network Security Topic #1. Basic Security Concepts

Why This Course? Symantec Internet Security Threat Report 2014 http://www.symantec.com/content/en/us/enterprise/other_resources/bistr_main_report_v19_21291018.en-us.pdf 20

Why This Course? Increased volume of security incidents Security threats Malware: Virus, worm, spyware Spam Botnet DDoS attacks Phishing Cross-site scripting (XSS) 21

Contributing Factors Lack of awareness of threats and risks of information systems Security measures are often not considered until an Enterprise has been penetrated by malicious users The situation is getting better, but (Historical) Reluctance to invest in security mechanisms The situation is improving Example: Windows 95! Windows 2000! Windows XP! Windows Vista! Windows 7! Windows 8 But there exists legacy software Wide-open network policies Many Internet sites allow wide-open Internet access 22

Contributing Factors (Cont d) Lack of security in TCP/IP protocol suite Most TCP/IP protocols not built with security in mind Work is actively progressing within the Internet Engineering Task Force (IETF) Complexity of security management and administration Security is not just encryption and authentication Software vulnerabilities Example: buffer overflow vulnerabilities We need techniques and tools to better software security Hacker skills keep improving Cyber warfare 23

Security Objectives Confidentiality (Secrecy) Integrity Availability (Denial of Service) 24

Security Objectives (CIA) Confidentiality Prevent/detect/deter improper disclosure of information Integrity Prevent/detect/deter improper modification of information Availability Prevent/detect/deter improper denial of access to services provided by the system These objectives have different specific interpretations in different contexts 25

Commercial Example Confidentiality An employee should not come to know the salary of his manager Integrity An employee should not be able to modify the employee's own salary Availability Paychecks should be printed on time as stipulated by law 26

Military Example Confidentiality The target coordinates of a missile should not be improperly disclosed Integrity The target coordinates of a missile should not be improperly modified Availability When the proper command is issued the missile should fire 27

A Fourth Objective Securing computing resources Prevent/ detect/deter improper use of computing resources including Hardware Resources Software resources Data resources Network resources 28

Achieving Security Security policy What? Security mechanism How? Security assurance How well? 29

Security Policy Organizational Policy Automated Information System Policy 30

Compusec + Comsec = Infosec Compsec Security Comsec Computers Communications Infosec 31

Security Mechanisms In general three types Prevention Example: Access control Detection Example: Auditing and intrusion detection Tolerance Example: Byzantine agreement Good prevention and detection both require good authentication as a foundation 32

Security Mechanisms (Cont d) Prevention is more fundamental Detection seeks to prevent by threat of punitive action Detection requires that the audit trail be protected from alteration Sometime detection is the only option, e.g., Accountability in proper use of authorized privileges Modification of messages in a network Security functions are typically made available to users as a set of security services Cryptography underlies (almost) all security mechanisms 33

Security Services Security functions are typically made available to users as a set of security services through APIs or integrated interfaces Confidentiality: protection of any information from being exposed to unintended entities. Information content. Parties involved. Where they are, how they communicate, how often, etc. Authentication: assurance that an entity of concern or the origin of a communication is authentic - it s what it claims to be or from Integrity: assurance that the information has not been tampered with 34

Security Services (Cont d) Non-repudiation: offer of evidence that a party is indeed the sender or a receiver of certain information Access control: facilities to determine and enforce who is allowed access to what resources, hosts, software, network connections Monitor & response: facilities for monitoring security attacks, generating indications, surviving (tolerating) and recovering from attacks 35

Security Assurance How well your security mechanisms guarantee your security policy Everyone wants high assurance High assurance implies high cost May not be possible Trade-off is needed 36

Security by Obscurity Security by obscurity If we hide the inner workings of a system it will be secure Less and less applicable in the emerging world of vendor-independent open standards Less and less applicable in a world of widespread computer knowledge and expertise 37

Security by Legislation Security by legislation says that if we instruct our users on how to behave we can secure our systems For example Users should not share passwords Users should not write down passwords Users should not type in their password when someone is looking over their shoulder User awareness and cooperation is important, but cannot be the principal focus for achieving security 38

Security Tradeoffs Security Functionality COST Ease of Use 39

Threat-Vulnerability-Risk Threats Possible attacks on the system Vulnerabilities Weaknesses that may be exploited to cause loss or harm Risk A measure of the possibility of security breaches and severity of the ensuing damage Requires assessment of threats and vulnerabilities 40

Threat Model and Attack Model Threat model and attack model need to be clarified before any security mechanism is developed Threat model Assumptions about potential attackers Describes the attacker s capabilities Attack model Assumptions about the attacks Describe how attacks are launched 41

Risk Management Risk analysis NIST Common Vulnerability Scoring System (CVSS) Mathematical formulae and computer models can be developed, but the parameters are difficult to estimate. Risk reduction Attack surface, Attack graph Risk acceptance Certification Technical evaluation of a system's security features with respect to how well they meet a set of specified security requirements Accreditation The management action of approving an automated system, perhaps with prescribed administrative safeguards, for use in a particular environment 42