Spring 2006, Syracuse University Lecture Notes for CIS/CSE 785: Computer Security

Spring 2006, Syracuse University Lecture Notes for CIS/CSE 785: Computer Security

<p>Spring 2006, Syracuse University Lecture Notes for CIS/CSE 785: Computer Security</p><p>Security Overview</p><p>(1) Risks and Defending Measures</p><p> Risks  You are working on your project in Bird library, and you leave your laptop unattended for a while, what are the risks? </p><p> You are running a web server on your machine, what are the risks? How do you lower the risks?</p><p> What is the most secure system? . A system that is shutdown</p><p> Vulnerabilities: the most common attack is to exploit known operating system vulnerabilities.</p><p> Defending Methods (Three lines of defense)  Prevention . prevent it: make it impossible . deter it: make it harder . deflect it: make other targets more attractive</p><p> Detection . monitoring . intrusion detection</p><p> Recovery . recover the data . identify the damage . find the culprit: forensics </p><p> The focus of this course: prevention</p><p> How does prevention work?  Policies (IST courses)</p><p> Encryption (only basics are covered in this course) . Not just the encryption. Examples include digital cash,  timestamping, secure multiparty computation, e-voting,  e-bidding, etc. . Applied Cryptography covers these. </p><p> Control (the key component of this course) . hardware control . software control . Examples: make sure that only those with security clearance can read this file.</p><p>Wenliang Du Security Overview: Page 1 of 2 4/8/2018 Spring 2006, Syracuse University Lecture Notes for CIS/CSE 785: Computer Security</p><p> How could prevention not work correctly?  Vulnerabilities  Malicious program: virus, trap doors, etc. </p><p> How to achieve correct prevention?  Security engineering principles, awareness of risk, secure programming, etc.</p><p>(2) The meaning of computer security</p><p> When we talk about "computer security", we mean that we are addressing three very important aspects of any computer-related system  Confidentiality  Integrity  Availability</p><p> For different applications, the interpretation of CIA is different. </p><p> Confidentiality: access (reading, viewing, printing, knowing, etc.)  Contents : encryption (cryptography)  Existence of data: steganography . e.g. stock investigation, prisoner, spy, watermarking  Resource hiding: operating system information and configuration . Fingerprinting  Identity: (anonymity) </p><p> Integrity: modification (includes writing, changing, changing status, deleting, and creating).  Data integrity  Program integrity  System integrity  Identity integrity (non-repudiation)  Origin (location) integrity (network traceback)</p><p> Availability.  Denial of service</p><p> Example: what category do they belong to?  TCP SYN flooding  Sniffering  Faked identity  ATM machine  Saving passwords in a plaintext file</p><p>Wenliang Du Security Overview: Page 2 of 2 4/8/2018</p>

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    2 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us