CS 177 Computer Security Lecture 19. Stefano Tessaro

Similar documents
PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Course Content: Session 1. Ethics & Hacking

EECS 588: Computer and Network Security. Introduction

CYBERTRON NETWORK SOLUTIONS

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

McAfee Certified Assessment Specialist Network

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

CRYPTUS DIPLOMA IN IT SECURITY

Computer and Network Security

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

CS5008: Internet Computing

A Systems Engineering Approach to Developing Cyber Security Professionals

UVic Department of Electrical and Computer Engineering

Application Security Testing

CompTIA Security+ (Exam SY0-410)

Learn Ethical Hacking, Become a Pentester

Cruise Line Agencies of Alaska. Cruise Ship Calendar for 2016 FOR PORT(S) = KTN AND SHIP(S) = ALL AND VOYAGES = ALL

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Web Applications The Hacker s New Target

Cruise Line Agencies of Alaska. Cruise Ship Calendar for 2016 FOR PORT(S) = KTN AND SHIP(S) = ALL AND VOYAGES = ALL

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Computer Security SEGC-00 - Overview

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Hack Proof Your Webapps

FORBIDDEN - Ethical Hacking Workshop Duration

CIS 4204 Ethical Hacking Fall, 2014

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Certified Cyber Security Expert V Web Application Development

EECS 588: Computer and Network Security. Introduction January 14, 2014

Fixture List 2018 FIFA World Cup Preliminary Competition

Ethical Hacking Course Layout

Midterm. Name: Andrew user id:

CEH Version8 Course Outline

Security Engineering Part III Network Security. Intruders, Malware, Firewalls, and IDSs

[CEH]: Ethical Hacking and Countermeasures

Advanced Systems Security

Advanced Internet Security

CS 356 Lecture 16 Denial of Service. Spring 2013

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications

How To Protect Your Network From Attack From A Hacker (For A Fee)

Web App Security Audit Services

IBM Protocol Analysis Module

Loophole+ with Ethical Hacking and Penetration Testing

Network Security Testing using MMT: A case study in IDOLE project

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Magento Security and Vulnerabilities. Roman Stepanov

The Top Web Application Attacks: Are you vulnerable?

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Networks and Security Lab. Network Forensics

Network Incident Report

Importance of Web Application Firewall Technology for Protecting Web-based Resources

Summary of the SEED Labs For Authors and Publishers

Certified Ethical Hacker (CEH)

CS 5490/6490: Network Security Fall 2015

Penetration Testing Service. By Comsec Information Security Consulting

SONDRA SCHNEIDER JOHN NUNES

Comprehensive Security for Internet-of-Things Devices With ARM TrustZone

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Automating Security Testing. Mark Fallon Senior Release Manager Oracle

What is Web Security? Motivation

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

Cruise Line Agencies of Alaska. Cruise Ship Calendar for 2012 FOR PORT(S) = KTN AND SHIP(S) = ALL AND VOYAGES = ALL

EC Council Certified Ethical Hacker V8

CSCI 4250/6250 Fall 2015 Computer and Network Security. Instructor: Prof. Roberto Perdisci

Rational AppScan & Ounce Products

Certified Cyber Security Analyst VS-1160

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Cruise Line Agencies of Alaska. Cruise Ship Calendar for 2013 FOR PORT(S) = KTN AND SHIP(S) = ALL AND VOYAGES = ALL

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

Description: Objective: Attending students will learn:

INFORMATION SECURITY TRAINING

Build Your Own Security Lab

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

KEN VAN WYK. Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

Application Security Best Practices. Wally LEE Principal Consultant

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

Attacks from the Inside

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

CS 558 Internet Systems and Technologies

Network Threats and Vulnerabilities. Ed Crowley

USM IT Security Council Guide for Security Event Logging. Version 1.1

BBM 461: SECURE PROGRAMMING INTRODUCTION. Ahmet Burak Can

Seminar Computer Security

Malicious Network Traffic Analysis

CS Ethical Hacking Spring 2016

Course Title: Course Description: Course Key Objective: Fee & Duration:

IJMIE Volume 2, Issue 9 ISSN:

13 Ways Through A Firewall

Transcription:

CS 177 Computer Security Lecture 19 Stefano Tessaro tessaro@cs.ucsb.edu

Update #1: The Piazza story This is amazing! (in many ways, but good job!) Will get in touch with Piazza asap If you were involved, drop me an e-mail so that I know who will get the credits Will probably not disclose your names on first e-mail Do not disclose or use exploits Ethical disclosure: We will give Piazza some time to deal with it Authors of Monday morning exploit apologied Good lesson!

Update #2: The VM vs ResNet Network security is great! VM was victim of anti-spoofing counter measures at campus-level device Took 2 weeks, 4-5 people, until problem was detected So that you know, ResNet admins acted awesomely in all of this, but it wasn t their fault either

Today General grading info (25 min) Initial Q&A (35 min) Class evaluation (15 minutes)

Final information Final will take place Thursday in two weeks. Final will be 3 hours Similar style as midterm You are allowed to take with you 4 letter-sized sheets (i.e., 8 pages) of handwritten notes Will publish list of topics. Q&A next Wednesday.

Q&A session Next Tuesday Next Tuesday, Phelps 3526 at 5:30pm

Grades You will receive an e-mail by early next week (i.e., when done grading HW6) with your current scores Next slides explain how to read them!

How is the grade computed Each of six homework assignments is assigned a normalized score (Your score / Max score) E.g., 28/30 = 0.93, 34/30 = 1.13 Similarly for the midterm (out of 80 points) and final (out of 180 points) Hence, three scores (call them HW, MT, FI)

Overall scores HW: Remove lowest homework, and compute average of remaining 5 scores E.g. HW1: 0.9, HW2: 0.8, HW3: 1.0, HW4: 1.1, HW5: 0.7, HW6: 1 Remove HW5, average is 0.48/5 = 0.96 Score: S = 0.4 * HW + 0.2 * MT + 0.4 * FIN E.g. HW = 0.96, MT = 0.85, FIN = 0.75: S = 0.85

It s all about the grade Final letter grade obtain by curving (very fairly ;)) on final score Expect: Median will get B or better Expect: S > 0.5 for passing grade (D) A+ is assigned on an ad-hoc basis (high scores in homework and exams, S close to 1) Currently, ignoring final, and grading with HW6 counting as 0, median is 0.78. (Will drop slightly with final.)

Concerns Many folks have not submitted two homeworks, or haven t submitted one (and scored low in another one) If you are concerned, talk to me now! Typical e-mail 20 min after grades are released: Hi Professor, I do not like my grade. I couldn t solve HW1 because XYZ, is there any chance There is only so much we professors can do after we submitted grades. Also, ad-hoc deals are unfair and hard to implement

Concerns Following procedure: By Friday after exam, you will receive an e-mail with final scores Complaints by Saturday night Then grades will be submitted on Sunday

The Final Understand concepts Expect a couple of question of the type Here is Alice s proposal to do X, is this a good idea? What is most important is Which design choice X opens up vulnerability Y Understand the homework solutions Homework in 2 nd part was hacking intensive, yet final solution is often simple Midterm was on the harder side Solutions are posted (as you see, answers are easy)

Exam Topics Complete list of what is covered at: http://www.cs.ucsb.edu/~tessaro/cs177/

Exam Topics 1 Buffer overflows Understand the memory layout and basics of the x86 architecture Be able to extract from simple assembly code snippets the relative position of a buffer and the stored return pointer Understand all steps necessary for a stack overflow Have an idea about prevention methods

Exam Topics 2 Web Security Basic of the HTTP protocol (GET/POST queries) What are cookies and how do they work? What are the main security issues with scripting languages like PHP? How do SQL injection attacks succeed? How can they be prevented? How do XSS attacks proceed? Which types are there (reflected vs stored)? How can they be prevented? How do cross-site request forgery attacks proceed, and how are they prevented?

Exam Topics 3 Network security Different types of DoS attacks Understand basics of TCP / IP (including handshake) Sequence numbers and session hijacking DNS cache poisoning Network intrusion and port scanning What is a DMZ? What is an idle scan?

Exam Topics 4 Malware Computer Viruses Which types are there? What is polymorphism? What is an encrypted virus? Boot sector, executable, resident, etc What is the virus lifecycle? What does antivirus software do? Trojans, worms, rootkits, keyloggers, etc. What are they? What is a botnet?

Exam Topics 5 Privacy + Bitcoin class Not exam material But helps to know what privacy is about as one of the basic goals of computer security