CSC574 - Computer and Network Security Module: Introduction



Similar documents
Module: Introduction. Professor Trent Jaeger Fall CSE543 - Introduction to Computer and Network Security

CIS433/533 - Computer and Network Security Introduction

Module: Introduction. Professor Patrick McDaniel Spring CMPSC443 - Introduction to Computer and Network Security

Lecture 1 - Overview

CSE598k / CSE545 Advanced Network Security

Advanced Systems Security

CSC 474 Information Systems Security

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

CS 450/650 Fundamentals of Integrated Computer Security

CSCI 4250/6250 Fall 2015 Computer and Network Security. Instructor: Prof. Roberto Perdisci

CS 458 / 658 Computer Security and Privacy. Course mechanics. Course website. Module 1 Introduction to Computer Security and Privacy.

CSCI 4541/6541: NETWORK SECURITY

Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication

Why Security Matters. Why Security Matters. 00 Overview 03 Sept CSCD27 Computer and Network Security. CSCD27 Computer and Network Security 1

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

CPSC 467: Cryptography and Computer Security

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

CNT4406/5412 Network Security Introduction

IBM Managed Security Services Vulnerability Scanning:

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Introduction to Security

CS Ethical Hacking Spring 2016

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Cisco Advanced Services for Network Security

CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; /6834)

Security Defense Strategy Basics

Penetration Testing Service. By Comsec Information Security Consulting

Avaya TM G700 Media Gateway Security. White Paper

Avaya G700 Media Gateway Security - Issue 1.0

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

IT 101 Introduction to Information Technology

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Chapter 6: Fundamental Cloud Security

White Paper. Information Security -- Network Assessment

Data Security Incident Response Plan. [Insert Organization Name]

Payment Card Industry (PCI) Data Security Standard

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

Computer and Network Security

Wireless Network Security

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011

Information Security Policy

Syllabus: IST451. Division of Business and Engineering. Penn State Altoona

Network Security ITP 457 (4 Units)

Network and Host-based Vulnerability Assessment

A Decision Maker s Guide to Securing an IT Infrastructure

Name. Description. Rationale

ITAR Compliance Best Practices Guide

COSC 472 Network Security

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

CS 464/564 Networked Systems Security SYLLABUS

Juniper Networks Secure

Network Security and Surveillance

Network Security: Introduction

CS 203 / NetSys 240. Network Security

Network Security. Introduction. Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Application Security in the Software Development Lifecycle

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

IS Management Information Systems

Computer and Network Security

Boston University MET CS 690. Network Security

Course Title: Penetration Testing: Network Threat Testing, 1st Edition

MW , TU 1-3; and other times by appointment

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

BBM 461: SECURE PROGRAMMING INTRODUCTION. Ahmet Burak Can

The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.

INTRODUCTION TO NETWORK SECURITY. Nischit Vaidya, CISSP Instructor

Basics of Internet Security

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

NETWORK SECURITY ASPECTS & VULNERABILITIES

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

Weighted Total Mark. Weighted Exam Mark

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Observation and Findings

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

EECS 588: Computer and Network Security. Introduction January 14, 2014

Cisco Security Optimization Service

By David G. Holmberg, Ph.D., Member ASHRAE

Transcription:

CSC574 - Computer and Network Security Module: Introduction Prof. William Enck Spring 2013 1

Some bedtime stories 2

Some bedtime stories 2

Some bedtime stories 2

Some bedtime stories 2

This course We are going to explore why these events are not isolated, infrequent, or even unexpected. Why are we doing so poorly in computing systems at protecting our users and data from inadvertent or intentional harm? 3

This course We are going to explore why these events are not isolated, infrequent, or even unexpected. Why are we doing so poorly in computing systems at protecting our users and data from inadvertent or intentional harm? The answer: stay tuned! 3

This course... This course is a systems course covering general topics in computer and network security, including: network security, authentication, security protocol design and analysis, social engineering, key management, program safety, intrusion detection, DDOS detection and mitigation, architecture/operating systems security, security policy, group systems, biometrics, web security, languagebased security, and other emerging topics (as time permits) 4

You need to understand... IP Networks Modern Operating Systems Discrete Mathematics Basics of systems theory and implementation E.g., File systems, distributed systems, networking, operating systems,... 5

Goals My goal: to provide you with the tools to understand and evaluate research in computer security. Basic technologies Engineering/research trade-offs How to read/write/present security research papers This is going to be a hard course. The key to success is sustained effort. Failure to keep up with readings and project will likely result in poor grades, and ultimately little understanding of the course material. Pay-off: security competence is a rare, valuable skill 6

Course Materials Website - I am maintaining the course website at http://www.csc.ncsu.edu/faculty/enck/cse574-s13/ Course assignments, slides, and other artifacts will be made available on the course website. Course textbook Kaufman, C., Perlman, R. and Speciner, M., Network Security (Private Communication in a Public World), 2nd edition, Prentice Hall 2002. Jaeger, T., Operating System Security. Morgan & Claypool, 2008. 7

Course Calendar The course calendar as all the relevant readings, assignments and test dates The calendar page contains electronic links to online papers assigned for course readings. Please check the website frequently for announcements and changes to the schedule. Students are responsible for any change on the schedule. 8

Grading The course will be graded on exams, quizzes, assignments, projects, and class participation in the following proportions: 25% Course Research Project 20% Mid-term Exam 25% Final Exam 20% Assignments 10% Quizzes and Class Participation 9

Exams and Quizzes Exams Conceptual Questions (Basic and Complex) Constructions Precise Answers Quizzes Quick quizzes on the previous lecture and readings Quizzes on readings may require: Define Concepts Comparison with Other Approaches Details of Approach 10

Readings There are a large amount of readings in this course covering various topics. These assignments are intended to: Support the lectures in the course (provide clarity) Augment the lectures and provide a broader exposure to security topics. Students are required to do the reading! About 10-20% of questions on the tests (and most of the quizzes) will be off the reading on topics that were not covered in class. You better do the reading or you are going to be in deep trouble when it comes to grades. 11

Course Project End Result: Research Paper Motivation for an Experiment Background Related Work Experimental Approach Experimental Evaluation I will provide sample topic areas General Areas Start with an Existing System/Approach Break It Improve It Aim for a Research-Quality Result 12

Project Milestones Recall the course project makes of 25% of your grade Milestones (see course schedule for due dates) Project Proposal - 10 points Related work - 20 points Abstract/Intro - 20 points Final project poster presentation - 50 points Unless otherwise specified, all project related assignments must be created in LaTeX 13

Assignments There will be four homework/lab assignments Assignment #1: Introductions and LaTeX Assignment #2: SCP tool Assignment #3: TBD (likely buffer overflows) Assignment #4: DNS Pharming You will need a computer capable of running virtual machines. If this is a problem, let me know ASAP! 14

Ethics Statement This course considers topics involving personal and public privacy and security. As part of this investigation we will cover technologies whose abuse may infringe on the rights of others. As an instructor, I rely on the ethical use of these technologies. Unethical use may include circumvention of existing security or privacy measurements for any purpose, or the dissemination, promotion, or exploitation of vulnerabilities of these services. Exceptions to these guidelines may occur in the process of reporting vulnerabilities through public and authoritative channels. Any activity outside the letter or spirit of these guidelines will be reported to the proper authorities and may result in dismissal from the class and or institution. When in doubt, please contact the instructor for advice. Do not undertake any action which could be perceived as technology misuse anywhere and/or under any circumstances unless you have received explicit permission from Professor Enck. 15

What is security? Garfinkel and Spafford (1991) A computer is secure if you can depend on it and its software to behave as expected. Harrison, Ruzzo, Ullman (1978) Prevent access by unauthorized users Not really satisfactory does not truly capture that security speaks to the behavior of others Expected by whom? Under what circumstances? 16

Risk At-risk valued resources that can be misused Monetary Data (loss or integrity) Time Confidence Trust What does being misused mean? Privacy (personal) Confidentiality (communication) Integrity (personal or communication) Availability (existential or fidelity) Q: What is at stake in your life? 17

Threats A threat is a specific means by which an attacker can put a system at risk An ability/goal of an attacker (e.g., eavesdrop, fraud, access denial) Independent of what can be compromised A threat model is a collection of threats that deemed important for a particular environment A collection of attacker(s) abilities E.g., A powerful attacker can read and modify all communications and generate messages on a communication channel Q: What were risks/threats in the introductory examples? PlayStation Network Yale/Princeton Estonia 18

Vulnerabilities (attack vectors) A vulnerability is a systematic artifact that exposes the user, data, or system to a threat E.g., buffer-overflow, WEP key leakage What is the source of a vulnerability? Bad software (or hardware) Bad design, requirements Bad policy/configuration System Misuse Unintended purpose or environment E.g., student IDs for liquor store 19

Adversary An adversary is any entity trying to circumvent the security infrastructure The curious and otherwise generally clueless (e.g., scriptkiddies) Casual attackers seeking to understand systems Venal people with an ax to grind Malicious groups of largely sophisticated users (e.g, chaos clubs) Competitors (industrial espionage) Governments (seeking to monitor activities) 20

Are users adversaries? Have you ever tried to circumvent the security of a system you were authorized to access? Have you ever violated a security policy (knowingly or through carelessness)? 21

Are users adversaries? Have you ever tried to circumvent the security of a system you were authorized to access? Have you ever violated a security policy (knowingly or through carelessness)? This is known as the insider adversary! 21

Attacks An attack occurs when someone attempts to exploit a vulnerability Kinds of attacks Passive (e.g., eavesdropping) Active (e.g., password guessing) Denial of Service (DOS) Distributed DOS using many endpoints A compromise occurs when an attack is successful Typically associated with taking over/altering resources 22

Participants Participants are expected system entities Computers, agents, people, enterprises, Depending on context referred to as: servers, clients, users, entities, hosts, routers, Security is defined with respect to these entites Implication: every party may have unique view A trusted third party Trusted by all parties for some set of actions Often used as introducer or arbiter 23

Trust Trust refers to the degree to which an entity is expected to behave What the entity not expected to do? E.g., not expose password What the entity is expected to do (obligations)? E.g., obtain permission, refresh A trust model describes, for a particular environment, who is trusted to do what? Note: you make trust decisions every day Q: What are they? Q: Whom do you trust? 24

Security Model A security model is the combination of a trust and threat models that address the set of perceived risks The security requirements used to develop some cogent and comprehensive design Every design must have security model LAN network or global information system Java applet or operating system The single biggest mistake seen in use of security is the lack of a coherent security model It is very hard to retrofit security (design time) This class is going to talk a lot about security models What are the security concerns (risks)? What are the threats? Who are our adversaries? Who do we trust and to do what? Systems must be explicit about these things to be secure. 25

A Security Model Example Assume we have a University website that hosts courses through the web (e.g., WolfWare) Syllabus, other course information Assignments submissions Online Grading In class: elements of the security model Participants (Trusted) Adversaries Risks Threats 26