EECS 588: Computer and Network Security. Introduction January 14, 2014



Similar documents
EECS 588: Computer and Network Security. Introduction

Computer and Network Security

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

CNT Computer and Network Security Review/Wrapup

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

External Supplier Control Requirements

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

CS5008: Internet Computing

MS-55096: Securing Data on Microsoft SQL Server 2012

CSE331: Introduction to Networks and Security. Lecture 1 Fall 2006

Securing Data on Microsoft SQL Server 2012

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

The Information Security Problem

Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication

COSC 472 Network Security

CS 458 / 658 Computer Security and Privacy. Course mechanics. Course website. Module 1 Introduction to Computer Security and Privacy.

Network Security Essentials:

BBM 461: SECURE PROGRAMMING INTRODUCTION. Ahmet Burak Can

Content Teaching Academy at James Madison University

Security Goals Services

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

FORBIDDEN - Ethical Hacking Workshop Duration

CYBERTRON NETWORK SOLUTIONS

Loophole+ with Ethical Hacking and Penetration Testing

What is Web Security? Motivation

A Systems Engineering Approach to Developing Cyber Security Professionals

Why Security Matters. Why Security Matters. 00 Overview 03 Sept CSCD27 Computer and Network Security. CSCD27 Computer and Network Security 1

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

Introduction to Computer Security

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Web Application Security

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

Professional Penetration Testing Techniques and Vulnerability Assessment ...

CS Final Exam

Passing PCI Compliance How to Address the Application Security Mandates

Certificate in Cyber Security

Computer Security (EDA263 / DIT 641)

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Network Security - ISA 656 Review

Introduction to Cyber Security / Information Security

Simple Steps to Securing Your SSL VPN

Certified Ethical Hacker Exam Version Comparison. Version Comparison

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Web application testing

CompTIA Security+ (Exam SY0-410)

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

Information Security

Networking: EC Council Network Security Administrator NSA

Network Security and Privacy

Software Development: The Next Security Frontier

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

Description: Objective: Attending students will learn:

EC-Council. Certified Ethical Hacker. Program Brochure

Detailed Description about course module wise:

Protecting Your Organisation from Targeted Cyber Intrusion

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

CPSC 467: Cryptography and Computer Security

Certified Cyber Security Analyst VS-1160

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

Eleventh Hour Security+

e-code Academy Information Security Diploma Training Discerption

Where every interaction matters.

Building the Next Generation of Computer Security Professionals. Chris Simpson

Firewalls, NAT and Intrusion Detection and Prevention Systems (IDS)

Web Application Report

Chapter 4 Application, Data and Host Security

Build Your Own Security Lab

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

90% of data breaches are caused by software vulnerabilities.

CS 464/564 Networked Systems Security SYLLABUS

Chapter 7 Transport-Level Security

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Web Security. Discovering, Analyzing and Mitigating Web Security Threats

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

IBM Protocol Analysis Module

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

Computer Security Curriculum at the Univ. of Wisconsin Eau Claire. Paul J. Wagner

Privacy + Security + Integrity

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Transcription:

EECS 588: Computer and Network Security Introduction January 14, 2014

Today s Class Welcome! Goals for the course Topics, what interests you? Introduction to security research Components of your grade Legal and ethical concerns

Who am I? J. Alex Halderman CSE Prof. Princeton Ph.D. Web: https://jhalderm.com Email: jhalderm@umich.edu Office: 4717 BBB Hours: TuTh 3:30-4:30 or by appointment Mobile: 609-558-2312

My Work DRM

My Work Electronic Voting

Alex s Work Electronic Voting

My Work Disk Encryption

My Work Anticensorship

Goals for this Course Gain hands-on experience Building secure systems Evaluating system security Prepare for research Computer security subfield Security-related issues in other areas Generally, improve research, writing, and presentation skills Learn to be a 1337 hax0r, but an ethical one!

Getting In, Getting an A Waitlist? Prereqs: EECS482 or EECS489 or grad standing Will grant everybody overrides, but can t guarantee hard work will bring success, unless you have the prerequisites.

Building Blocks The security mindset, thinking like an attacker, reasoning about risk, research ethics Symmetric ciphers, hash functions, message authentication codes, pseudorandom generators Key exchange, public-key cryptography, key management, the SSL protocol Software Security Exploitable bugs: buffer overflows and other common vulnerabilities attacks and defenses Malware: viruses, spyware, rootkits operation and detection Automated security testing and tools for writing secure code Virtualization, sandboxing, and OS-level defenses Web Security The browser security model Web site attacks and defenses: cross-site scripting, SQL injection, cross-site reference forgery Internet crime: spam, phishing, botnets technical and nontechnical responses Network Security Network protocols security: TCP and DNS attacks and defenses Policing packets: Firewalls, VPNs, intrusion detection Denial of service attacks and defenses Data privacy, anonymity, censorship, surveillance Advanced Topics Hardware security attacks and defenses Trusted computing and digital rights management Electronic voting vulnerabilities, cryptographic voting protocols Not a crypto course

Getting to Know You Who are you? What topics interest you? What would you like to learn in this course?

What is Computer Security? Math? Engineering? Philosophy? Natural Sciences?

What is Security Research? The study of how systems behave in the presence of an adversary *. * An intelligence that actively tries to cause the system to misbehave.

What s the Difference?

Why is Security its own Area of CS?

Who does Security Research? Academia Industry Military Hobbyists Bad guys

Insecurity? Hierarchy Level-2 Problem: Weakness Factors that predispose systems to vulnerability Attack Assault recipe, vulnerabilities are ingredients Level-1 Problem: Vulnerability Specific errors that could be exploited in an assault. Level-0 Problem: Assault Actual malicious attempt to cause harm.

High-Level Approaches Attacks Defenses

Why Study Attacks? Identify flaws so they can be fixed Pressure vendors to be more careful Learn about new classes of threats Motivate new research on defenses Determine what we need to defend against Help designers build better threat models Help users more accurately evaluate risk Identify false design assumptions Improve models used for proof of security

Thinking Like an Attacker Look for weakest links easiest to attack Insider attacks, social engineering Think outside the box not constrained by system designer s worldview Side-channel attacks (TEMPEST, power analysis) Identify assumptions that security depends on are they false? e.g. cold-boot attacks Practice thinking like an attacker: For every system you interact with, think about what it means for it to be secure, and image how it could be exploited by an attacker.

Exercises Breaking into the CSE building

Exercises Stealing an election

Exercises Stealing my password

Exercises What are some security systems you interact with in everyday life?

Thinking Like a Defender Security policy What properties are we trying to enforce? Threat model What kind of attack are we trying to prevent? Who are the attackers? Capabilities? Motivations? Risk assessment What will successful attacks cost us? How likely? Countermeasures Costs vs. benefits? Technical vs. nontechnical? Challenge is to think rationally and rigorously about risks. Controlled paranoia.

Exercises Using a credit card safely

Exercises Should you lock your door?

Spotting Security Snake-Oil? Kerckhoffs s principle Should be secure even if everything about the design is public except for the secret keys Roll-Your-Own Encryption Just because you can t break it doesn t mean it s hard to break look for AES, SHA-2, etc.

I Need Your Mug Shots! To: eecs588@umich.edu Subject: uniqname 3 minutes. Go!

Recall Course Goals Gain hands-on experience Building secure systems Evaluating system security Prepare for research Computer security subfield Security-related issues in other areas Generally, improve research and communication skills Learn to be a 1337 hax0r, but an ethical one!

Grading Class Participation (5%) Paper Responses (15%) Attack Presentation (30%) Research Project (50%) No exams, no problem sets!

Class Participation (5%) ~2 required papers for discussion in each session (other readings optional but recommended) Come prepared to contribute! Full points for speaking up and contributing substantial ideas Lose points for being silent, frequently missing class, facebook, etc.

Paper Responses (15%) Brief written response to each paper (~400 words) In the first paragraph: State the problem that the paper tries to solve; and Summarize the main contributions. In one or more additional paragraphs: Evaluate the paper's strengths and weaknesses; Discuss something you would have done differently if you had written the paper; and Suggest interesting open problems on related topics.

Attack Presentation (30%) With a partner, choose a specific attack from recent research and implement a demonstration Give a 15 minute presentation: (1) describe the attack (2) talk about how you implemented it, give a demo (3) discuss possible defenses Course schedule will list topics later today Each group send me ratings for each choice by 5pm Friday

Research Project (50%) In groups, investigate new attack/defense/tool Aim for a publishable workshop paper. Components (more detail on website): Preproposal presentation Project proposal Project checkpoint Workshop-style presentation in class Final workshop-style report

Communication Course Web Site http://www.eecs.umich.edu/courses/eecs588/ schedule, readings Piazza announcements, discussion Email Me jhalderm@umich.edu suggestions, questions, concerns

Law and Ethics Don t be evil! Ethics requires you to refrain from doing harm Always respect privacy and property rights Otherwise you will fail the course Federal and state laws criminalize computer intrusion and wiretapping e.g. Computer Fraud and Abuse Act (CFAA) You can be sued or go to jail University policies prohibit tampering with campus systems You can be disciplined, even expelled

Your Assignments First paper discussion (two MD5 papers) See course site for required reading Remember to send written responses Find a partner and pick topics for your attack presentation updated list tonight; email topics by 5pm Friday Start thinking about your course project; Form a group, preproposal due mid-february