CS5231: Systems Security

Similar documents
FORBIDDEN - Ethical Hacking Workshop Duration

Loophole+ with Ethical Hacking and Penetration Testing

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Certified Cyber Security Analyst VS-1160

EECS 588: Computer and Network Security. Introduction

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Computer and Network Security

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

Information Security Threat Trends

Information Security. CS526 Topic 1

BBM 461: SECURE PROGRAMMING INTRODUCTION. Ahmet Burak Can

EECS 588: Computer and Network Security. Introduction January 14, 2014

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Statistical Analysis of Internet Security Threats. Daniel G. James

Desktop and Laptop Security Policy

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Malware: Malicious Code

Malware. Björn Victor 1 Feb [Based on Stallings&Brown]

Computer Security DD2395

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

Penetration Testing Service. By Comsec Information Security Consulting

CS 458 / 658 Computer Security and Privacy. Course mechanics. Course website. Module 1 Introduction to Computer Security and Privacy.

COSC 472 Network Security

1949 Self-reproducing cellular automata Core Wars

EC-Council. Program Brochure. EC-Council. Page 1

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

The Information Security Problem

Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication

E-BUSINESS THREATS AND SOLUTIONS

Lecture Embedded System Security A. R. Darmstadt, Introduction Mobile Security

Certified Cyber Security Analyst VS-1160

Top Ten Cyber Threats

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

EXIN Information Security Foundation based on ISO/IEC Sample Exam

Integrated Protection for Systems. João Batista Territory Manager

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Promoting Network Security (A Service Provider Perspective)

A Systems Engineering Approach to Developing Cyber Security Professionals

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

CS 356 Lecture 9 Malicious Code. Spring 2013

ACS-3921/ Computer Security And Privacy. Lecture Note 5 October 7 th 2015 Chapter 5 Database and Cloud Security

Boston University Security Awareness. What you need to know to keep information safe and secure

Web Security School Final Exam

Your Web and Applications

COB 302 Management Information System (Lesson 8)

THE HACKERS NEXT TARGET

CEH Version8 Course Outline

EC Council Certified Ethical Hacker V8

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

[CEH]: Ethical Hacking and Countermeasures

Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Operating System Security

Electronic Security is defined d as:

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

CSE331: Introduction to Networks and Security. Lecture 1 Fall 2006

Malware Trend Report, Q April May June

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Hackers: Detection and Prevention


Rethinking Cyber Security in the Age of the Breach

Security Defense Strategy Basics

Keeping you and your computer safe in the digital world.

Legal & Ethical Considerations of Offensive Cyber-Operations?

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

How-To Guide: Cyber Security. Content Provided by

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

HIPAA Training Part III. Health Insurance Portability and Accountability Act

Network Security Concepts

Ethical Hacking Course Layout

Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

The Key to Secure Online Financial Transactions

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Student Tech Security Training. ITS Security Office

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN Siskiyou Boulevard Ashland OR 97520

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

WEB APPLICATION SECURITY

Malware & Botnets. Botnets

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

GlobalSign Malware Monitoring

Introduction to Computer Security

Computer Security (EDA263 / DIT 641)

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

WHITE PAPER. Understanding How File Size Affects Malware Detection

Top tips for improved network security

Viruses, Trojan Horses, and Worms

ESET SMART SECURITY 6

Transcription:

CS5231: Systems Security Lecture 1: Overview CS5231 Lecture 1 1

About This Module Principle and practice of systems security Understanding security principles through practice Learning skills of programming, system administration, and etc. Research frontier of systems security CS5231 Lecture 1 2

Uniqueness of This Module Think in a different angle How various systems can fail How to prevent such failures Learn to think like a hacker, behave like a defender Make no assumptions of hackers Heavily based on system programming Have fun! CS5231 Lecture 1 3

The Security Problem What are the recent security incidents in news? CS5231 Lecture 1 4

Why Does This Happen? Functionality: the primary concern during design and implementation. Security is the secondary goal Unawareness of security problems Unavoidable human mistakes Awareness Lazy programmer Complex modern computing systems CS5231 Lecture 1 5

Impatient Programmers Maybe enough for learning basic functionality Never enough for to learn subtle implications of functionalities Result: programs can do more than you expect CS5231 Lecture 1 6

Security: Mission impossible Software Behavior Functionality But in practice, we need to make the security problem under control. Need better understanding of whole system CS5231 Lecture 1 7

Principle of Easiest Penetration Security is about every aspect of a computing system Hardware, software, data, and people. Principle of easiest penetration: Any system is most vulnerable at its weakest point. Attackers don't follow any rules. Don't underestimate their creativity. CS5231 Lecture 1 8

Example Windows Vista speech recognition Users can use voice to input text Control the Windows system What can go wrong? Let's see a video CS5231 Lecture 1 9

Another Example Safari Carpet Bomb Downloads Search Path CS5231 Lecture 1 10

Methodology CS5231 Lecture 1 11

Importance of Details Principle? Practice Most of security problems we see are practical problems. CS5231 Lecture 1 12

View of Network CS5231 Lecture 1 13

Is This a Security Device? CS5231 Lecture 1 14

Methodology How Systems Work? Solution: New Defense Attack: Break System How Attacks Work? CS5231 Lecture 1 15

Learning to Attack If you know the enemy and know yourself, you need not fear the result of a hundred battles. 知己知彼, 百战不殆 Sun Tzu, Art of War To prevent attack, we need to learn how attack happens CS5231 Lecture 1 16

Ethical Issue CS5231 Lecture 1 17

Ethical Use of Security Information We discuss vulnerabilities and attacks Most vulnerabilities have been fixed Some attacks may still cause harm Do not try these at home Purpose of this class Learn to prevent malicious attacks Use knowledge for good purposes CS5231 Lecture 1 18

Don t Cross the Line CS5231 Lecture 1 19

Overall Goal CS5231 Lecture 1 20

Your Objective in This Module Grades in transcript vs. Expertise in CV How do you distinguish yourself with other? How will others evaluate your CV? Managing rapid changes in security Tools vs. spirits CS5231 Lecture 1 21

Technical Skills UNIX/Linux administration Open source compiler and project management gcc, make, autoconf, gdb, nasm Programming languages C/C++, assembly language System and kernel programming Source code version control CS5231 Lecture 1 22

Administrative Issue CS5231 Lecture 1 23

Administrative Issues In class tests: 30% Three individual projects: 30% Final group project: 40% Module resources on IVLE Supplementary resources at http://www.comp.nus.edu.sg/~liangzk/cs5231/ TA mailing list: cs5231ta@googlegroups.com CS5231 Lecture 1 24

Text Book Main book: (Not required) Security Engineering (available online) Supplementary book: Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, by Ed Skoudis CS5231 Lecture 1 25

Projects CS5231 Lecture 1 26

Individual Homework Projects Programming assignments Memory attacks Assembly, C, gdb Web attacks PHP, HTML, JavaScript Linux kernel hacking C CS5231 Lecture 1 27

Group-based Final Project Project Goal: Apply our methodology: Modifying a system to extract its operation details, understanding attacks, and design solutions. Each group is expected to have three to four students Joining forces for more interesting results Limited slots in final presentation Please announce your group information to the TA mailing list CS5231 Lecture 1 28

Project Proposal Due date: February 13 th, 2012 What to submit: Problem description Your solution and its novelty The platform and tools used in project Project schedule You need to make sure your group is capable to handle the technical challenge independently CS5231 Lecture 1 29

Progress Report Due date: March 12 th, 2012 How is your progress compared to your proposal? If you have difficult or question, raise them early CS5231 Lecture 1 30

Final Report and Presentation Final report due before reading week Following the typical format of technical report or research papers used in our class Final presentation: last two weeks in class 10 to 15 minutes for each group CS5231 Lecture 1 31

Plagiarism Prevention Plagiarism is a serious offense in academia Information for plagiarism definition and prevention http://www.cit.nus.edu.sg/plagiarism-prevention/ We use the Turn It In tool to check all submissions Submissions are compared with document on the Internet and against one another CS5231 Lecture 1 32

Overview of Computer Security CS5231 Lecture 1 33

Overview of Topics Software security Operating system security Web security CS5231 Lecture 1 34

Malicious Code Example of Topics Virus, rootkit, spyware Internet Attacks Worm, buffer overflow, botnet Web Security Cross-site scripting CS5231 Lecture 1 35

Attacks: Basic Concepts Valuable components of computer system Hardware, software, data Vulnerability: weakness in a system Threat: potential harmful situations Attack: threat + vulnerability Control: something reduce or removes vulnerability CS5231 Lecture 1 36

Security Goals: CIA Triad Confidentiality Protection from unauthorized disclosure Integrity Protection from inappropriate modification Availability CS5231 Lecture 1 37

Confidentiality Confidentiality ensures that computerrelated assets are accessed only by authorized parties. Example, access others emails Sometimes called secrecy or privacy CS5231 Lecture 1 38

Integrity Integrity means that assets can be modified only by authorized parties or only in authorized ways. Example, change bank account balance by attack Modification: writing, changing, changing status, deleting, creating. CS5231 Lecture 1 39

Availability Availability means that assets are accessible to authorized parties at appropriate times. Its opposite is better known: Denial of Service (DoS) CS5231 Lecture 1 40

Balance of three goals The goals are often conflict Zero availability means perfect secrecy. They can overlap or mutually exclusive. I C A CS5231 Lecture 1 41

History of Computer Security CS5231 Lecture 1 42

Code Breaking in World War II Significant mathematical and technical advancement in coding Laying foundations of modern computer CS5231 Lecture 1 43

Computer Viruses 1982, Elk Cloner First virus in the wild. Targeting Apple II 1986, (c)brain First virus for IBM PC. A boot sector virus 1995, Concept virus First Macro virus 1998, CIH One of the most harmful widely circulated viruses Overwrites both hard disks and Flash BIOS CS5231 Lecture 1 44

Computer Worms 1978 Worm at Xerox PARC 1988 Morris Worm 1999 Melissa Worm (Email worm) 2001 CodeRed 2003 SQL Slammer (fastest in propagation) 2003 Blaster 2004 Sasser CS5231 Lecture 1 45

Rootkit Recent Threats Stealthy backdoor programs Spyware Information theft, usually don t propagate Botnet A collection of compromised computers Mobile malware CS5231 Lecture 1 46

Threats on the Web Malicious code install through browsers Cross-site Scripting Malicious JavaScript injected into browser sessions SQL Injection Malicious SQL statements CS5231 Lecture 1 47

Low-tech Threats Spam Recapcha Phishing CS5231 Lecture 1 48

Computer Criminals Amateurs Normal users who discover system vulnerabilities during their job Crackers or malicious hackers Students or computer professionals For fun or to demonstrate their knowledge CS5231 Lecture 1 49

Computer Criminals Career Criminals Skilled computer professionals Security forms a black market business over recent years Terrorist CS5231 Lecture 1 50

Business Model of Career Computer Criminals Encrypt user data and sell passwords Lease bots Blackmail big company Steal money from bank accounts or credit card accounts CS5231 Lecture 1 51

Summary Learning principles through practice Seeing is believing Practical skills Experience with Linux and open source tools Solutions for your new concerns Learn and solve cutting-edge research problems CS5231 Lecture 1 52

Practice Setup a Linux Virtual Machine 32-bit Ubuntu Linux 10.04 Virtual Machine VMWare Workstation VirtualBox CS5231 Lecture 1 53