CIS 6930/4930 Computer and Network Security. Dr. Yao Liu



Similar documents
CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

CSC 474 Information Systems Security

CSE 5392 Sensor Network Security

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

CSCI 4541/6541: NETWORK SECURITY

CS 450/650 Fundamentals of Integrated Computer Security

Boston University MET CS 690. Network Security

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

CSCI 4250/6250 Fall 2015 Computer and Network Security. Instructor: Prof. Roberto Perdisci

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Computer and Network Security

CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; /6834)

CS 5490/6490: Network Security Fall 2015

CPSC 467: Cryptography and Computer Security

Lecture 1 - Overview

CSE331: Introduction to Networks and Security. Lecture 1 Fall 2006

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Module: Introduction. Professor Trent Jaeger Fall CSE543 - Introduction to Computer and Network Security

CSC574 - Computer and Network Security Module: Introduction

Weighted Total Mark. Weighted Exam Mark

EECS 588: Computer and Network Security. Introduction January 14, 2014

Computer and Network Security

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

Information Security Basic Concepts

BBM 461: SECURE PROGRAMMING INTRODUCTION. Ahmet Burak Can

MW , TU 1-3; and other times by appointment

CNT4406/5412 Network Security Introduction

External Supplier Control Requirements

Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication

CS 464/564 Networked Systems Security SYLLABUS

EECS 588: Computer and Network Security. Introduction

CSE343/443 Lehigh University Fall Course Overview. Presenter: Yinzhi Cao Lehigh University

TCOM 562 Network Security Fundamentals

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

CS 458 / 658 Computer Security and Privacy. Course mechanics. Course website. Module 1 Introduction to Computer Security and Privacy.

COSC 472 Network Security

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

Cryptography and network security CNET4523

CS Ethical Hacking Spring 2016

Chapter 4 Information Security Program Development

Computer and Network Security

Introduction to Computer Security

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Security + Certification (ITSY 1076) Syllabus

Security Goals Services

CIS 213 PENETRATION TESTING 3 cr. (2-2)

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Syllabus. No: CIS 200. Title: Fundamentals of Network Security. Credits: 4. Coordinator: Dr. B. Dike-Anyiam, Computer Science & Networking Lecturer

Chap. 1: Introduction

The Information Security Problem

CIS 4204 Ethical Hacking Fall, 2014

Computer Science 3CN3 Computer Networks and Security. Software Engineering 4C03 Computer Networks and Computer Security. Winter 2008 Course Outline

CIS 253. Network Security

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

CIT 217 Security + Network Security Fall 2015

Risk Management Guide for Information Technology Systems. NIST SP Overview

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Syllabus COMP 517 Computer Security Penn State Harrisburg Fall 2009

Preliminary Course Syllabus

Content Teaching Academy at James Madison University

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

Course Design Document. IS403: Advanced Information Security and Trust

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Security Practices for Online Collaboration and Social Media

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Computer Security: Principles and Practice

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

CS 203 / NetSys 240. Network Security

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media

Network Security Concepts

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

CNA 432/532 OSI Layers Security

Computer Security (EDA263 / DIT 641)

Course Outline Computing Science Department Faculty of Science. COMP Credits Computer Network Security (3,1,0) Fall 2015

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

How To Protect Your Data From Attack

Application Intrusion Detection

CS 340 Cyber Security Weisberg Division of Computer Science College of Information Technology & Engineering Marshall University

CSE 571S: Network Security CSE571S

EE5723/EE4723. Computer & Network Security. Course Coverage. Prerequisites. Course Logistics. Truly a Network Security course

Network Security ITP 457 (4 Units)

Network Security SWISS GERMAN UNIVERSITY. Administration Charles Lim

CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:

Transcription:

CIS 6930/4930 Computer and Network Security Dr. Yao Liu

About Instructor Dr. Yao Liu, Office: ENB 336 Phone: 813-974-1079 Email: yliu@cse.usf.edu URL: http://www.cse.usf.edu/~yliu/ Office hour: TR 2:00pm 3:30pm Class meetings: TR 09:30pm - 10:45pm in NES 108 2

About TA Mr. Song Fang Office: ENB 213 Email: songf@mail.usf.edu URL: http://www.cse.usf.edu/~songf/ Office hour: 3:30-5:00 pm Tuesdays 3

Course Objectives Understanding of basic issues, concepts, principles, and mechanisms in network security. E.g., Cryptography Authentication Classic security standards like Kerberos, IPsec and Internet key management Be able to determine appropriate mechanisms to protect computer and networked systems. 4

Course Outline Basic Security Concepts Confidentiality, integrity, availability Security terms, security mechanisms Cryptography Basic number theory Secret key cryptography Public key cryptography Hash function Key management 5

Course Outline (Cont d) Identification and Authentication Basic concepts of identification and authentication User authentication Authentication protocols Network and Distributed Systems Security Public Key Infrastructure (PKI) Kerberos IPsec Internet key management 6

Projects Research projects: Project proposal Project report Project demo/presentation You are expected to explore issues beyond what s included in lectures by yourselves 7

Prerequisites It is highly desirable that you have successfully finished introductory computer programming courses. Prior knowledge of networking fundamentals is recommended. 8

Textbook Required textbook Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: Private Communication in a Public World, 2nd Edition, Prentice Hall, ISBN: 0-13-046019-2. 9

On-line Resources WWW page: http://www.cse.usf.edu/~yliu/network%20sec urity/teaching.html For course materials, e.g., lecture slides, homework files, papers, tools, etc. Will be updated frequently. So check frequently. 10

Grading Assignments 20%, projects 20%, midterm I 20%, final 30%, quiz 10% Tests are open-book and open-notes. The final grades are computed according to the following rules: A+: >= 95%; A: >= 90% and < 95%; A-: >= 85% and < 90%; B+: >= 80% and < 85%; B: >= 75% and < 80%; B-: >= 70% and < 75%; C+: >= 66% and < 70%; C: >= 63% and < 66%; C-: >= 60% and < 63%; D+: >= 56% and < 60%; D: >= 53% and < 56%; D-: >= 50% and < 53%; F: < 50%. 11

Policies on incomplete grades and late assignments Homework and project deadlines will be hard. Late homework will be accepted with a 15% reduction in grade each day they are late by. Once a homework assignment is discussed in class, submissions will no longer be accepted. 12

Policies on Absences and Scheduling Makeup Work Make-up exams will not normally be permitted. Exceptions will be made if a student presents a police report or a doctor's note that show some emergency situation. Events such as going on a business trip or attending a brother's wedding are not an acceptable excuse for not taking an exam at its scheduled time and place. 13

Academic Integrity The university policies against academic dishonesty will be strictly enforced. You may find the university's policies on academic integrity from the following URL. http://generalcounsel.usf.edu/regulations/pdf s/regulation-usf3.027.pdf 14

CIS 6930/4930 Computer and Network Security Topic #1. Basic Security Concepts

Why This Course? Increased volume of security incidents Security threats Malware: Virus, worm, spyware Spam Botnet DDoS attacks Phishing 16

Contributing Factors Lack of awareness of threats and risks of information systems Security measures are often not considered until an Enterprise has been penetrated by malicious users The situation is getting better, but (Historical) Reluctance to invest in security mechanisms The situation is improving Example: Windows 95 Windows 2000 Windows XP Windows XP SP2 Windows Vista Windows 7 But there exists legacy software Wide-open network policies Many Internet sites allow wide-open Internet access 17

Contributing Factors (Cont d) Lack of security in TCP/IP protocol suite Most TCP/IP protocols not built with security in mind Work is actively progressing within the Internet Engineering Task Force (IETF) Complexity of security management and administration Security is not just encryption and authentication Software vulnerabilities Example: buffer overflow vulnerabilities We need techniques and tools to better protect software security Cracker skills keep improving 18

Security Objectives Confidentiality (Secrecy) Integrity Availability (Denial of Service) 19

Security Objectives (CIA) Confidentiality Prevent/detect improper disclosure of information Integrity Prevent/detect improper modification of information Availability Prevent/detect improper denial of access to services provided by the system These objectives have different specific interpretations in different contexts 20

Commercial Example Confidentiality An employee should not know the salary of his manager Integrity An employee should not be able to modify the employee's own salary Availability Paychecks should be printed on time as stipulated by law 21

Military Example Confidentiality The target coordinates of a missile should not be improperly disclosed Integrity The target coordinates of a missile should not be improperly modified Availability When the proper command is issued the missile should fire 22

Achieving Security Security policy What? Security mechanism How? Security assurance How well? 23

Security Policy Organizational Policy Automated Information System Policy 24

Compusec + Comsec = Infosec Compsec Security Comsec Computers Communications Infosec 25

Security Mechanisms In general three types Prevention Example: Access control Detection Example: Auditing and intrusion detection Tolerance Example: Byzantine agreement Good prevention and detection both require good authentication as a foundation 26

Security Services Security functions are typically made available to users as a set of security services through APIs or integrated interfaces Confidentiality: protection of any information from being exposed to unintended entities. Information content. Parties involved. how they communicate, how often, etc. Authentication: assurance that an entity of concern or the origin of a communication is authentic - it s what it claims to be or from Integrity: assurance that the information has not been tampered with 27

Security Services (Cont d) Non-repudiation: offer of evidence that a party is indeed the sender or a receiver of certain information Access control: facilities to determine and enforce who is allowed access to what resources, hosts, software, network connections Monitor & response: facilities for monitoring security attacks, generating indications, surviving (tolerating) and recovering from attacks 28

Security Assurance How well your security mechanisms guarantee your security policy Everyone wants high assurance High assurance implies high cost May not be possible Trade-off is needed 29

Security Tradeoffs Security Functionality COST Ease of Use 30

Security by Obscurity Security by obscurity If we hide the inner workings of a system it will be secure More and more applications open their standards (e.g., TCP/IP, 802.11) Widespread computer knowledge and expertise 31

Security by Legislation Security by legislation says that if we instruct our users on how to behave we can secure our systems For example Users should not share passwords Users should not write down passwords Users should not type in their password when someone is looking over their shoulder User awareness and cooperation is important, but cannot be the principal focus for achieving security 32

Threat-Vulnerability Threats Possible attacks on the system Vulnerabilities Weaknesses that may be exploited to cause loss or harm Requires assessment of threats and vulnerabilities 33

Threat Model and Attack Model Threat model and attack model need to be clarified before any security mechanism is developed Threat model Assumptions about potential attackers Describes the attacker s capabilities Attack model Assumptions about the attacks Describe how attacks are launched 34