EECS 588: Computer and Network Security. Introduction



Similar documents
EECS 588: Computer and Network Security. Introduction January 14, 2014

Computer and Network Security

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

Loophole+ with Ethical Hacking and Penetration Testing

CNT Computer and Network Security Review/Wrapup

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

MS-55096: Securing Data on Microsoft SQL Server 2012

Security Goals Services

External Supplier Control Requirements

CS5008: Internet Computing

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

FORBIDDEN - Ethical Hacking Workshop Duration

Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication

CS 458 / 658 Computer Security and Privacy. Course mechanics. Course website. Module 1 Introduction to Computer Security and Privacy.

Introduction to Cyber Security / Information Security

Securing Data on Microsoft SQL Server 2012

The Information Security Problem

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

A Systems Engineering Approach to Developing Cyber Security Professionals

Networking: EC Council Network Security Administrator NSA

Professional Penetration Testing Techniques and Vulnerability Assessment ...

BBM 461: SECURE PROGRAMMING INTRODUCTION. Ahmet Burak Can

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Web Application Security

CSE331: Introduction to Networks and Security. Lecture 1 Fall 2006

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Where every interaction matters.

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

What is Web Security? Motivation

OWASP Top Ten Tools and Tactics

Certified Cyber Security Analyst VS-1160

Content Teaching Academy at James Madison University

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Network Security - ISA 656 Review

Network Security Essentials:

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Operating System Security

Certified Ethical Hacker Exam Version Comparison. Version Comparison

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

Certificate in Cyber Security

WhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program

COSC 472 Network Security

NIST E-Authentication Guidance SP and Biometrics

Detailed Description about course module wise:

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

Eleventh Hour Security+

CPSC 467: Cryptography and Computer Security

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Computer Security (EDA263 / DIT 641)

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Introduction to Computer Security

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Topics in Network Security

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

WEB APPLICATION FIREWALLS: DO WE NEED THEM?


Network Security Course Specifications

Alexander Nikov. 9. Information Assurance and Security, Protecting Information Resources. Learning Objectives. You re on Facebook? Watch Out!

CS 203 / NetSys 240. Network Security

CompTIA Security+ (Exam SY0-410)

CS Final Exam

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

Criteria for web application security check. Version

Implementing Cisco IOS Network Security

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Why Security Matters. Why Security Matters. 00 Overview 03 Sept CSCD27 Computer and Network Security. CSCD27 Computer and Network Security 1

Web Application Report

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Chapter 7 Transport-Level Security

Passing PCI Compliance How to Address the Application Security Mandates

Course Outline Computing Science Department Faculty of Science. COMP Credits Computer Network Security (3,1,0) Fall 2015

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

6. ecommerce Security and Payment Systems. Alexander Nikov. Teaching Objectives. Video: Online Banking, Is It Secure?

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Network Security. Mobin Javed. October 5, 2011

Secure Sockets Layer

CSC 474 Information Systems Security

Information Security Services

DISA's Application Security and Development STIG: How OWASP Can Help You. AppSec DC November 12, The OWASP Foundation

CYBERTRON NETWORK SOLUTIONS

Introduction to Information Security

Transcription:

EECS 588: Computer and Network Security Introduction January 13, 2014

Today s Cass Class Welcome! Goals for the course Topics, what interests you? Introduction to security research Components of your grade Legal and ethical concerns

Who am I? J. Alex Halderman CSE Prof. Princeton Ph.D. Web: Email: https://jhalderm.com jhalderm@umich.edu Office: 4717 7 BBB Hours: TuTh 3:30 4:30 or by appointment Mobile: 609 558 2312

How I spent my winter vacation

How I spent my winter vacation

How I spent my winter vacation

How I spent my winter vacation

How I spent my winter vacation

My Work Electronic c Voting

Alex s Work Electronic c Voting

My Work Disk Encryption cypto

My Work Anticensorship tce sos

My Work Internet Measurement

My Work HTTPS

Goals for this scourse Gi Gain hands on experience Building secure systems Evaluating system security Prepare for research Computer security subfield Security related issues in other areas Generally, improve research, writing, and presentation skills Learn to be a 1337 hax0r, but an ethical one!

Getting In, Getting an A Waitlist? Prereqs: EECS482 or EECS489 or grad standing We ll grant everybody overrides, but can t guarantee hard work will bring success, unless you have the prerequisites.

Building Blocks The security mindset, thinking like an attacker, reasoning about risk, research ethics Symmetric ciphers, hash functions, message authentication codes, pseudorandom generators Key exchange, public key cryptography, key management, the SSL protocol Software Security Exploitable bugs: buffer overflows and other common vulnerabilities attacks and defenses Malware: viruses, spyware, rootkits operation and detection Automated security testing and tools for writing secure code Virtualization, sandboxing, and OS level defenses Web Security The browser security model Web site attacks and defenses: cross site scripting, SQL injection, cross site reference forgery Internet crime: spam, phishing, botnets technical and nontechnical responses Network Security Network protocols security: TCP and DNS attacks and defenses Policing packets: Firewalls, VPNs, intrusion detection Denial of service attacks and defenses Data privacy, anonymity, censorship, surveillance Advanced Topics Hardware security attacks and defenses Trusted computing and digital rights management Electronic voting vulnerabilities, cryptographic voting protocols Not a crypto course

Getting to Know You Who are you? What topics interest t you? What would you like to learn in this course?

What is Computer Security? Math? Engineering? Philosophy? Natural Sciences?

What is Security Research? The study of how systems behave in the presence of an adversary *. *An intelligence that actively tries to cause the system to misbehave.

What s the Difference? ee

Why is Security its own Area of CS?

Who does Security Research? Academia Industry Military Hobbyists Bad guys

Insecurity? Hierarchy Level 2 Problem: Weakness Factors that predispose systems to vulnerability Attack Assault recipe, vulnerabilities are ingredients Level 1 Problem: Vulnerability Specific errors that could be exploited in an assault. Level 0 Problem: Assault Actual malicious attempt to cause harm.

High Level eeapproaches Attacks Defenses

Why Study Attacks? Identify flaws so they can be fixed Pressure vendors to be more careful Learn about new classes of threats Motivate new research on defenses Determine what we need to defend against Help designers build better threat models Help users more accurately evaluate risk Identify false design assumptions Improve models used for proof of security

Thinking Like an Attacker Look for weakest links easiest to attack Insider attacks, social engineering Think outside tid the box not constrained by system designer s worldview Side channel attacks (TEMPEST, power analysis) Identify assumptions that security depends on are they false? e.g. cold boot attacks Practice thinking like an attacker: For every system you interact with, think about what it means for it to be secure, and image how it could be exploited by an attacker.

Exercises ecses Breaking into the CSE building

Exercises ecses Stealing an election

Exercises ecses Stealing my password

Exercises ecses What are some security systems you interact with in everyday life?

Thinking Like a Defender ee Security policy What properties are we trying to enforce? Threat model What kind of attack are we trying to prevent? Who are the attackers? Capabilities? Motivations? Risk assessment What will successful attacks cost us? How likely? Challenge is to think Costs vs. benefits? rationally and rigorously about risks. Technical vs. nontechnical? Controlled paranoia. Countermeasures

Exercises ecses Using a credit card safely

Exercises ecses Should you lock your door?

Spotting Security Snake Oil? Kerckhoffs s principle Should be secure even if everything about the design is public except for the secret keys Roll Your Own Encryption Just because you can t break it doesn t mean it s hard to break look for AES, SHA 2, etc.

Selfie e Time! To: eecs588@umich.edu Subject: uniqname 3 minutes. Go!

Recall Course Goals Gi Gain hands on experience Building secure systems Evaluating system security Prepare for research Computer security subfield Security related issues in other areas Generally, improve research and communication skills Learn to be a 1337 hax0r, but an ethical one!

Grading Gad Class Participation (5%) Paper Responses (15%) Attack Presentation (30%) Research Project (50%) No exams, no problem sets! t!

Class CassParticipation (5%) ~2 required papers for discussion in each session (other readings optional but recommended) Come prepared to contribute! Full points for speaking up and contributing substantial ideas Lose points for being silent, frequently missing class, facebook, etc.

Paper Responses ses (15%) (5%) Bi Brief written response to each paper (~400 words) d) In the first paragraph: State the problem that the paper tries to solve; and Summarize the main contributions. In one or more additional paragraphs: Evaluate the paper's strengths and weaknesses; Discuss something you would have done differently if you had written the paper; and Suggest interesting open problems on related topics.

Attack Presentation (30%) With a partner, choose a specific attack from recent research and implement a demonstration Give a 15 minute presentation: (1) describe the attack (2) talk about how you implemented it, give a demo (3) discuss possible defenses Course schedule will list topics later today Each group send me ratings for each choice by 5pm Friday

Research Project (50%) In groups, investigate new attack/defense/tool Aim for a publishable workshop paper. Components (more detail on website): Preproposal presentation Project proposal Project checkpoint Workshop style style presentation in class Final workshop style report

Communication o Course Web Site http://www.eecs.umich.edu/courses/eecs588/ schedule, hdl readings Piazza announcements, discussion Email Me jhalderm@umich.edu suggestions, questions, concerns

Law and Ethics Don t be evil! Ethics requires you to refrain from doing harm Always respect privacy and property rights Otherwise you will fail the course Federal and state laws criminalize computer intrusion and wiretapping e.g. Computer Fraud and Abuse Act (CFAA) You can be sued or go to jail University policies prohibit tampering with campus systems You can be disciplined, even expelled

Your Assignments First paper discussion Tuesday (2 MD5 papers) See course site for required reading Remember to send written responses Find a partner and rate the topics for your attack presentation; email topic ratings by 5pm this Friday Start thinking about your course project; Form a group, present topic idea February 26