CSE543 - Introduction to Computer and Network Security. Module: Final review

Similar documents
CNT Computer and Network Security Review/Wrapup

CSCI 454/554 Computer and Network Security. Final Exam Review

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Advanced Systems Security

CEH Version8 Course Outline

Introduction to Cyber Security / Information Security

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

[CEH]: Ethical Hacking and Countermeasures

Network Security Essentials:

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Network Security Course Specifications

Concierge SIEM Reporting Overview

Curran, K. Tutorials. Independent study (including assessment) N/A

Midterm 2 exam solutions. Please do not read or discuss these solutions in the exam room while others are still taking the exam.

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

CompTIA Security+ (Exam SY0-410)

CSE543 Computer and Network Security Module: Cloud Computing

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Intrusion Detection Systems

IINS Implementing Cisco Network Security 3.0 (IINS)

Networking for Caribbean Development

Information Security Basic Concepts

McAfee Network Security Platform Administration Course

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Cisco RSA Announcement Update

CS 356 Lecture 28 Internet Authentication. Spring 2013

CS Final Exam

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028

Description: Objective: Attending students will learn:

Observation and Findings

Bellevue University Cybersecurity Programs & Courses

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

CS 161 Computer Security Spring 2010 Paxson/Wagner MT2

Table of Contents. Introduction. Audience. At Course Completion

Implementing Cisco IOS Network Security

EC Council Certified Ethical Hacker V8

CSCI 4250/6250 Fall 2015 Computer and Networks Security

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

CS Computer and Network Security: Intrusion Detection

The Hillstone and Trend Micro Joint Solution

Operating System Security

SURVEY OF INTRUSION DETECTION SYSTEM

EECS 588: Computer and Network Security. Introduction

Threat landscape how are you getting attacked and what can you do better protect yourself and your e-commerce platform

EECS 588: Computer and Network Security. Introduction January 14, 2014

VALLIAMMAI ENGINEERING COLLEGE

Network Security in Building Networks

Passing PCI Compliance How to Address the Application Security Mandates

PART D NETWORK SERVICES

Human Factors in Information Security

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

Lecture 15 - Web Security

Security + Certification (ITSY 1076) Syllabus

Where every interaction matters.

PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Cisco IPS Tuning Overview

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Secret Server Qualys Integration Guide

Designing and Coding Secure Systems

Firewalls and Intrusion Detection

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Endpoint Threat Detection without the Pain

CompTIA Network+ (Exam N10-005)

Content Teaching Academy at James Madison University

SSL BEST PRACTICES OVERVIEW

Detailed Description about course module wise:

C. Universal Threat Management C.4. Defenses

Tunisia s experience in building an ISAC. Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc

All Information is derived from Mandiant consulting in a non-classified environment.

Chapter 4 Application, Data and Host Security

NETWORK ADMINISTRATION AND SECURITY

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

CRYPTOGRAPHY AND NETWORK SECURITY

McAfee Network Security Platform

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Linux Operating System Security

System Specification. Author: CMU Team

Firewalls, Tunnels, and Network Intrusion Detection

The Base Rate Fallacy and its Implications for the Difficulty of Intrusion Detection

MAC Web Based VPN Connectivity Details and Instructions

Chapter 11 Cloud Application Development

How to Build an Effective Mail Server Defense

Reducing Application Vulnerabilities by Security Engineering

Intel Enhanced Data Security Assessment Form

Strategic Plan On-Demand Services April 2, 2015

Web Security. Introduction: Understand applicable laws, legal issues and ethical issues regarding computer crime

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

74% 96 Action Items. Compliance

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

BM482E Introduction to Computer Security

CTS2134 Introduction to Networking. Module Network Security

Transcription:

CSE543 - Introduction to Computer and Network Security Module: Final review Professor Trent Jaeger Fall 2012 1

Since Midterm Firewalls Intrusion Detection Malware Botnets Web Security Virtualization Cloud Trusted Computing 2

Before Midterm Cryptography (Algorithms) Applied Cryptography (Protocols) Authentication PKI Access Control OS Security 3

Know from 1st Midterm Cryptography (Algorithms) Applied Cryptography (Protocols) Cookies, Trusted Computing Authentication SSL PKI DAA, SSL Access Control Firewalls, Virtualization OS Security Web Security, Virtualization, Cloud 4

Stuff from Before Midterm Cryptography (Algorithms) Applied Cryptography (Protocols) Hash functions, signatures,... Authentication Kerberos PKI PKI Access Control Concepts and Models OS Security Multics, Capability Systems 5

Since Midterm Firewalls Policy spec, Wool study, iptables (concepts) Intrusion Detection Host and network, misuse and anomaly, Forrest, Bayes Malware types, propagation, DoS, Defenses Botnets Definition, Botnet cycle, Botnet size estimation Web Security Cookies, SSL, Dynamic content attacks, Server security, OP 6

Firewalls Given a set of requirements, write a sufficient set of firewall rules Allow some access Prevent others Don t forget the stealth rule 7

Intrusion Detection What does the Base-Rate Fallacy tell us about false positives in intrusion detection systems? State your answer in terms of the probability of key events. 8

Intrusion Detection What does the Base-Rate Fal lacy tell us about false positives in intrusion detection systems? State your answer in terms of the probability of key events. answer: BRF states that if the probability of an accurate detection is high, the number of false positives may still be high. The false positive rate depends on the probability of a detection and the probability of an intrusion. If the latter is very low, even a very accurate detection will not be effective. 9

Malware Design a puzzle to stop a DoS attack Cost of puzzle Cost of checking Relate via a formula 10

Botnets Methods for botnet size estimation See so many DNS blacklist requests What is the infection footprint? What is the effective botnet size? 11

Web security Implement single-signon using cookies Design cookie 12

Virtualization Why must a sensitive instruction be privileged in a secure virtualized environment? Complete mediation. The VMM must be mediate all securitysensitive instructions to implement security checks comprehensively. 13

Cloud Why do cloud insiders create additional security problems when deploying in cloud? What additional threats do users of pre-configured instances care about? What additional threats are caused by co-hosting? Can you prevent/mitigate those threats? What s a side channel? Stakeholders What do service providers care about? What do clients care about? What to cloud admins care about? 14

Trusted Computing Extend Seal Build an Attestation Obtain a Public Key via DAA Mostly crypto Also need to show how validation works What does validation mean under prescribed circumstances 15

Deeper Papers Key issues? How do they prove? Why convinced or not? OP Reference monitor Attack analysis Security analysis AmazonIA Attacks, yes, but what about defense? 4 attack types (flaws) in AMIs What was proof for defense for X? Why convinced or not? What is missing that would convince you? 16