CSE343/443 Lehigh University Fall 2015. Course Overview. Presenter: Yinzhi Cao Lehigh University



Similar documents
CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

CSC 474 Information Systems Security

Introduction to Computer Security

CNT4406/5412 Network Security Introduction

CPSC 467: Cryptography and Computer Security

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

What is Really Needed to Secure the Internet of Things?

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts

Network Security Fundamentals

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

CS 450/650 Fundamentals of Integrated Computer Security

PRESENTATION TO THE UNIVERSITY SYSTEM OF MARYLAND S BOARD OF REGENTS

Understanding Cyber Defense A Systems Architecture Approach

Nuclear Security Requires Cyber Security

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

CS5008: Internet Computing

The A-to-Z of CyberSecurity as a Kid Understands It

CSE 5392 Sensor Network Security

A Systems Engineering Approach to Developing Cyber Security Professionals

EECS 354 Network Security. Introduction

External Supplier Control Requirements

INTRODUCTION TO NETWORK SECURITY. Nischit Vaidya, CISSP Instructor

Curran, K. Tutorials. Independent study (including assessment) N/A

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

U. S. Attorney Office Northern District of Texas March 2013

Network Threats and Vulnerabilities. Ed Crowley

COSC 472 Network Security

Cybersecurity: Protecting Your Business. March 11, 2015

Information Security and Risk Management

Network Security - ISA 656 Review

CS 464/564 Networked Systems Security SYLLABUS

Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication

I ve been breached! Now what?

CSE331: Introduction to Networks and Security. Lecture 1 Fall 2006

Botnets. Botnets and Spam. Joining the IRC Channel. Command and Control. Tadayoshi Kohno

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

Certified Ethical Hacker Exam Version Comparison. Version Comparison

CSCI 4541/6541: NETWORK SECURITY

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

August 6, Technology 101 for the Corporate Lawyer

DDoS Overview and Incident Response Guide. July 2014

Overview. Firewall Security. Perimeter Security Devices. Routers

Global Web Application Firewall Market

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Juniper Networks Secure

Information Security Basic Concepts

CS Ethical Hacking Spring 2016

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Is Your IT Environment Secure? November 18, Sarah Ackerman, Greg Bernard, Brian Matteson Clark Schaefer Consulting

Midterm. Name: Andrew user id:

Why Security Matters. Why Security Matters. 00 Overview 03 Sept CSCD27 Computer and Network Security. CSCD27 Computer and Network Security 1

Secure Software Programming and Vulnerability Analysis

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

How To Defend Yourself Against Cyber Attacks

CNA 432/532 OSI Layers Security

Security. Definitions

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Security Goals Services

Network Security: Introduction

CYBERTRON NETWORK SOLUTIONS

DDoS Protection on the Security Gateway

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

Application Security in the Software Development Lifecycle

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

white SECURITY TESTING WHITE PAPER

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Network attack and defense

Penetration Testing Service. By Comsec Information Security Consulting

Detailed Description about course module wise:

Korean National Protection Profile for Voice over IP Firewall V1.0 Certification Report

CS 203 / NetSys 240. Network Security

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

Transcription:

CSE343/443 Lehigh University Fall 2015 Course Overview Presenter: Yinzhi Cao Lehigh University

Who am I? Yinzhi Cao It is kinda like [yihn jee] [chow] If you feel that it is really difficult, call me Ian. My research focuses on cyber-security, such as web security and mobile security. I am a new assistant professor in CSE department.

Course Logistics (1) Course web site: http://www.yinzhicao.org/courses/f15/cse343443/ Course Email: cse343443@gmail.com Office Hours: Thursday (3:30pm 4:30pm) Half lecture + half seminar In the lecture, I (Yinzhi Cao) will teach basic cyber security concept. In the seminar, you (students) will learn how to present, defend, and offend a research paper.

Course Logistics (2) CSE 343 (Undergraduate Students): Homework (40%) Paper Summary (10%) w You can miss two without penalty Class Project (40% = 20% mid-term Presentation + 20% final Presentation) Class Participation (10%) Paper Presentation (+10%, optional)

Course Logistics (3) CSE 443 (Graduate Students) Paper Presentation (20% = 10% + 10%) Paper Summary (15%) w You can miss two without penalty Class Project (55%) w Mid-term Presentation 10% w Final Presentation 20% w Weekly report and final deliverable 25% Class Participation (10%) Homework (HW1+HW2, optional, +10%)

Paper Summary Summarize the paper sufficiently to demonstrate your understanding. What is the main result of the paper? (One or two sentence summary) What strengths do you see in this paper? What are some key limitations, unproven assumptions, or methodological problems with the work? How could the work be improved? What is its relevance today, or what future work does it suggest? Due 24hours before the class Late penalty: 10% for the first 24hrs, 40% for up to 2 days You can miss two without penalty

Paper Presentation Two teams: defense and offense. The defense team: 30mins w What are the compelling motivations for the stated work? w What are the major contributions over state-of-the-art work in the literature? w How does the paper achieve their stated goals? The offense team: 25mins w What are the limitations in the paper s motivation? w What are the technical limitations of the paper? w What are the possible improvements or future work of the paper? Discussion between two teams and the rest of the class.

Paper Presentation Cont d Presentation slides are due 48hours before the class. Please adhere to the rule! You are welcome to look at and borrow contents from the authors original slides (especially for defense team).

Homework HW1 shellcode (10%) due Sept 10th HW2 buffer overflow (15% = 7%+5%+3%) due Sept 29th HW3 cross-site scripting (9%) Due Oct 29th HW4 firewall (6%) Due Nov 17 th All dues are at the beginning of that day s class. Late penalties are 10% for the first 24hrs, 20% for up to 2 days late, 30% for up to 3 days late, 40% for up to 4 days late. No assignment is accepted when it is more than 4 days late.

Class Projects A team with Graduate students w Responsible for weekly report (due at the beginning of Tuesday class) w Responsible for weekly meeting (for research project, please schedule a time with the instructor) w Responsible for final report and deliverable (due by the end of the semester) w Mid-term and Final Presentation One or two undergraduate students w Participate in the project and finish the assigned task(s) from the graduate students w Mid-term and Final Presentation

Class Schedule Overview http://www.yinzhicao.org/courses/f15/cse343 443/schedule.html

Paper Presentation Pitching

Class Project Pitching and Forming Teams Team 1: Team 2: Team 3:

Class Participation Attending the class Raising questions during the paper presentation

Why Cyber-security? (1) The past decade has seen an explosion in concern about information security G-20 countries recently urged to treat cyber-attacks as threat to global economy. G20 have lost 2.5 million jobs to counterfeiting and piracy, and lost $125 billion annually to cyber-attacks.

Why Cyber-security? (2) Security specialist markets are expanding! Salary Premiums for Security Certifications Increasing (Computerworld 2007) w Up to 15% more salary w Demand is being driven not only by compliance and government regulation, but also by customers who are "demanding more security" from companies

Why Cyber-security? (3) It is in the everyday news: The Office of Personnel Management (OPM) Hack: Sensitive personal information of roughly 21.5 million people from both inside and outside the government. Sony Picture Entertainment Hack: 47,000 unique Social Security numbers Target Data Breach: 40 million credit cards And so on and on

What is Cyber-security? Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. Wikipedia CIA Triad Confidentiality Integrity Availability

Confidentiality Confidentiality "is the property, that information is not made available or disclosed to unauthorized individuals, entities, or processes. Attacks: Package Sniffing, Phishing, Password Attacks Defense: e.g., Access Control

Integrity Data integrity means maintaining and assuring the accuracy and completeness of data over its entire life-cycle. Attacks: Man-in-the-middle attacks, Session hijacking attacks, Defense: e.g., TLS/SSL

Availability For any information system to serve its purpose, the information must be available when it is needed. Attacks: Deny-of-Service Attack (DOS, e.g., SYN flood attacks and ICMP flood attacks), Distributed Deny-of-Service Attack (DDoS) Defense: Increase bandwidth and decrease processing time

In addition to CIA (1) Authenticity Authenticity is assurance that a message, transaction, or other exchange of information is from the source it claims to be from. E.g., password, single sign-on Accountability Non-repudiation Reliability

In addition to CIA (2) Authenticity Accountability Accountability is the property that ensures that the actions of an entity can be traced solely to this entity. E.g., use MAC and IP address to track a physical machine Non-repudiation Reliability

In addition to CIA (3) Authenticity Accountability Non-repudiation Nonrepudiation is the assurance that someone cannot deny something, such as the receipt of a message or the authenticity of a statement or contract. E.g., Digital Signature Reliability

In addition to CIA (4) Authenticity Accountability Non-repudiation Reliability Reliability is the property of leading to consistent intended behavior and results.