Computer Security (EDA263 / DIT 641)



Similar documents
Computer Security (EDA263 / DIT 641)

Module 5: Analytical Writing

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Introduction to Laboratory Assignment 3 Vulnerability scanning with OpenVAS

Course Content: Session 1. Ethics & Hacking

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

Don t Fall Victim to Cybercrime:

2012 NORTON CYBERCRIME REPORT

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

UVic Department of Electrical and Computer Engineering

Cybercrime in Canadian Criminal Law

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

Certified Cyber Security Analyst VS-1160

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Common Cyber Threats. Common cyber threats include:

Cybercrime. Crime and Cybercrime. Examples of Cybercrime. Illegal, immoral, unethical

CRYPTUS DIPLOMA IN IT SECURITY

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

RUTGERS POLICY. Section Title: Legacy UMDNJ policies associated with Information Technology

Using big data analytics to identify malicious content: a case study on spam s

EC-Council. Certified Ethical Hacker. Program Brochure

Internet Safety and Security: Strategies for Building an Internet Safety Wall

ICT Barriers, High Tech Crime, and Police

3 day Workshop on Cyber Security & Ethical Hacking

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!

CS Ethical Hacking Spring 2016

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA

TUSKEGEE CYBER SECURITY PATH FORWARD

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

Information Security Incident Management Guidelines

Ethical Hacking & Cyber Security Workshop

Hackers: Detection and Prevention

Hot Topics in IT Security PREP#28 May 1, David Woska, Ph.D. OCIO Security

Internet threats: steps to security for your small business

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

A Decision Maker s Guide to Securing an IT Infrastructure

An Introduction on How to Better Protect Your Computer and Sensitive Data

Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis

Cybercrimes NATIONAL CRIME PREVENTION COUNCIL

Current counter-measures and responses by CERTs

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

The Impact of Cybercrime on Business

Information Security Threat Trends

Cyber Security and Critical Information Infrastructure

Promoting Network Security (A Service Provider Perspective)

CITY OF BOULDER *** POLICIES AND PROCEDURES

Network Security and the Small Business

EC Council Certified Ethical Hacker V8

CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts

The Business Case for Security Information Management

Current Threat Scenario and Recent Attack Trends

GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V

TELE 301 Network Management. Lecture 18: Network Security

ITS425: Ethical Hacking and Penetration Testing

Incident Response. Proactive Incident Management. Sean Curran Director

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Questions You Should be Asking NOW to Protect Your Business!

GlobalSign Malware Monitoring

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Protecting your business from fraud

Certified Cyber Security Analyst VS-1160

CHAPTER 10: COMPUTER SECURITY AND RISKS

Certified Ethical Hacker (CEH)

Network Security Essentials:

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

FORBIDDEN - Ethical Hacking Workshop Duration

SecurityMetrics Vision whitepaper

Cyber Security Awareness. Internet Safety Intro.

Almost 400 million people 1 fall victim to cybercrime every year.

Remote Deposit Quick Start Guide

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One

Security A to Z the most important terms

MITB Grabbing Login Credentials

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software

EC-Council Ethical Hacking and Countermeasures

PREP Course #25: Hot Topics in Cyber Security and Database Security. Presented by: Joe Baskin Manager, Information Security, OCIO

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Malware & Botnets. Botnets

What legal aspects are needed to address specific ICT related issues?

CYBER SECURITY. II. SCANDALOUS HACKINGS To show the seriousness of hacking we have included some very scandalous hacking incidences.

Loophole+ with Ethical Hacking and Penetration Testing

CSC 474 Information Systems Security

Transcription:

Computer Security (EDA263 / DIT 641) Lecture 1: Course introduction Magnus Almgren (Erland Jonsson) Department of Computer Science and Engineering Chalmers University of Technology Sweden

Motivation Course in Computer Security: relates to the future exhibits many problems related to the IT revolution security is multi-disciplinary requires a holistic approach Motivation for taking the course: interest understand risk and tools in society (like driving with bad breaks ) money jobs Motivation for NOT taking the course:

The operation discovered cyber crime rings linked to Yahos malware which compromised over 11m computers and caused losses up to $850m. The suspected individuals stole money using the Butterfly Botnet, which steals credit card, and bank account information from computer users'. Botnets can be used by cyber criminals to perform DDoS (distributed denial of service) attacks, distribute malware and send spam emails.

Money. Computer Security Losses

With findings based on self-reported experiences of more than 13,000 adults across 24 countries, the 2012 edition of the Norton Cybercrime Report calculates the direct costs 1 associated with global consumer cybercrime at US $110 billion 2 over the past twelve months. Every second, 18 adults become a victim of cybercrime 3 * 15 percent of social network users reported someone had hacked into their profile and pretended to be them. * 1 in 10 social network users said they d fallen victim to a scam or fake link on social network platforms.

Money.

Jobs..

And not only traditional systems Critical Infrastructures are dependent on IT and IT security Banking and Finance Transportation Power Water purification plants Communication and Information exchange Trade and Business Manufacturing and Companies etc, etc Thus, we need CIP: Critical Infrastructure Protection

And even lamps need security http://www.meethue.com/en-us

Explanation of Attacks Treasure

http://www.cse.chalmers.se/edu/master/secspec/

CHALMERS UNIVERSITY OF TECHNOLOGY Department of Computer Science and Engineering Maskingränd, level 4, Ph. 031 772 1008 (department s student office) Rev. A EDA263 (DIT641 for GU) Computer Security for the International Masters Program in Secure and Dependable Computer Systems, 7.5 credits - Study period 3, 2013/2014 Aim The course gives basic knowledge in the security area, i.e. how to protect your system against intentional intrusions and attacks. The purpose of intrusions can be to change or delete resources (data, programs, hardware, etc), to get unauthorized access to confidential information or unau-thorized use of the system's services. The course covers threats and vulnerabilities in the com-puter systems and networks, as well as rules, methods and mechanisms for protection. Modeling and assessment of security and dependability as well as metrication methods are cov-ered. During a few lectures, a holistic security approach is taken and organizational, business-related, social, human, legal and ethical aspects are treated. Prerequisites The course EDA092 Operating systems or equivalent knowledge is recommended. Teachers Assistant Professor Magnus Almgren, ph. 031 772 1702, email: magnus.almgren 1 Responsible for laborations M.Sc Valentin Tudor, email: tudor 1 M.Sc Pierre Kleberger, email: pierre,kleberger 1 Laboratory supervisors M.Sc Aljoscha Lautenbach, email: aljoscha 1 M.Sc Fatemeh Ayatolahi, email: fatemeh.ayatolahi 1 Contents Part 1: Lectures Part 2: Laborations There are four laborations in the course. They will start in course week 2 and continue until course week 6. All information on the laborations are found on the course homepage.

CHALMERS UNIVERSITY OF TECHNOLOGY Department of Computer Science and Engineering Maskingränd, level 4, Ph. 031 772 1008 (department s student office) Rev. A EDA263 (DIT641 for GU) Computer Security for the International Masters Program in Secure and Dependable Computer Systems, 7.5 credits - Study period 3, 2013/2014 Aim The course gives basic knowledge in the security area, i.e. how to protect your system against intentional intrusions and attacks. The purpose of intrusions can be to change or delete resources (data, programs, hardware, etc), to get unauthorized access to confidential information or unau-thorized use of the system's services. The course covers threats and vulnerabilities in the com-puter systems and networks, as well as rules, methods and mechanisms for protection. Modeling and assessment of security and dependability as well as metrication methods are cov-ered. During a few lectures, a holistic security approach is taken and organizational, business-related, social, human, legal and ethical aspects are treated. Prerequisites The course EDA092 Operating systems or equivalent knowledge is recommended. Teachers Assistant Professor Magnus Almgren, ph. 031 772 1702, email: magnus.almgren 1 Responsible for laborations M.Sc Valentin Tudor, email: tudor 1 Responsible for laborations M.Sc Valentin Tudor, email: tudor 1 M.Sc Pierre Kleberger, email: pierre,kleberger 1 Laboratory supervisors M.Sc Aljoscha Lautenbach, email: aljoscha 1 M.Sc Fatemeh Ayatolahi, email: fatemeh.ayatolahi 1 Contents Part 1: Lectures Part 2: Laborations There are are four four laborations laborations in the course. in the They course. will start in course week 2 and continue until course week 6. All information on the laborations are found on the course homepage.

Reading Text book: Stallings & Brown: Computer Security, Pearson, second edition, ISBN: 978-0-273-76449-6 Downloads and links (DL) from the course homepage. Offprints (OP): will be sold at DC. Offprints is some selected extra course material. Some of the offprints are relevant for the laborations. Lecture slides and notes.

Where is DC?

Course outline problems, definitions, concepts, taxonomies, ref to dependability threats, vulnerabilities, attacks, intrusions malicious software (viruses, worms, trojans, etc) defences and countermeasures security models and mechanisms security policies, risk analysis, certification, evaluation forensics, ethics laboratory exercises

Lab information for EDA263 login:: root password: ****** Secure programming Accounts and passwords: GNU Privacy Guard Vulnerability scanning SQL injection To do the labs, you need to book a lab group. Booking of lab groups is made on-line in Ping Pong (for CTH, SDCS, NDS and GU students) Form groups of two students before you book! Booking of laboratory sessions are done on papers brought to the lectures. For login, your Chalmers account will be used. New this year: Assignment 3 on vulnerability scanning is handed out early so that you can work on it during the course.

Where is the course lab? On the 4th floor

Lab information (cont d) Respect deadlines! Following the deadline guarantees that you get a timely notification of your result on the lab (at most 5 working days from hand-in day)! Keeping the deadlines also generates less confusion regarding whether you are approved! Late submissions will not be considered for correction until the re-exam week in August. Each report will only be considered twice = only one resubmission until re-exam period!!! Remote login: ssh X Y <CID>@remoteXX.student.chalmers.se Information regarding deadlines and hand-in instructions can be found in the labpm or at the course page: http://www.cse.chalmers.se/edu/course/eda263/ (follow lab link) Cheating, e.g. copying code, lab report content or text found elsewhere is plagiarism and will be subject to disciplinary action. - so DON T CHEAT!

Lab information (cont d) Respect deadlines! Following the deadline guarantees that you get a timely notification of your result on the lab (at most 5 working days from hand-in day)! Keeping the deadlines also generates less confusion regarding whether you are approved! Late submissions will not be considered for correction until the re-exam week in August. Each report will only be considered twice = only one resubmission until re-exam period!!! Remote login: ssh X Y <CID>@remoteXX.student.chalmers.se Information regarding deadlines and hand-in instructions can be found in the labpm or at the course page: http://www.cse.chalmers.se/edu/course/eda263/ (follow lab link) Cheating, e.g. copying code, lab report content or text found elsewhere is plagiarism and will be subject to disciplinary action. - so DON T CHEAT! Cheating, e.g. copying code, lab report content or text found elsewhere is plagiarism and will be subject to disciplinary action. - so DON T CHEAT!