computer security. dr. barry wittman not dr. barry whitman education: phd and ms in computer...

59
CS363 Computer Security

Upload: derek-little

Post on 25-Dec-2015

227 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

CS363Computer Security

Page 2: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Who am I? (for those of you who don’t know me already)

Dr. Barry Wittman Not Dr. Barry Whitman Education:

PhD and MS in Computer Science, Purdue University

BS in Computer Science, Morehouse College Hobbies:

Reading, writing Enjoying ethnic cuisine DJing Lockpicking

Page 3: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

How can you reach me?

E-mail: [email protected] Office: Esbenshade 284B Phone: (717) 361-4761 Office hours: MWF 11:00am –

12:00pmM 3:30 – 4:20pmW 3:30 – 5:30pmAnd by appointment

Website:http://users.etown.edu/w/wittmanb/

Page 4: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Who are you?

43%

29%

7%

7%7% 7%

Major

Computer ScienceInformation SystemsComputer EngineeringMathematicsAccountingOther

Page 5: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Why are we here?

What’s the purpose of this class? What do you want to get out of it? Do you want to be here?

Page 6: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Course Overview

Page 7: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Textbook

Charles P. Pfleeger and Shari Lawrence Pfleeger

Security in Computing Fourth Edition, 2006, Prentice Hall ISBN-10: 0132390779 ISBN-13: 978-0132390774

Page 8: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

You have to read the book

You are expected to read the material before class

If you're not prepared, you will be asked to leave You will forfeit the education you have

paid around $100 per class meeting to get

Page 9: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

This is a class about computer security

It’s more theory than practice This is not a class that will teach you

how to hack a webserver (at least not directly)

Hacking systems depends on knowing about very specific vulnerabilities Those vulnerabilities are constantly

changing Teaching the principles behind security is

a much better investment

Page 10: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Cost

Real security often boils down to cost: How much does it cost to secure a

system? What is the value of the data or services

to be secured? Is it more cost effective to hire a

computer security expert to break into a system or to bribe someone to give you their password?

Page 11: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Topics to be covered

Security basics Cryptography

Classical ciphers Modern ciphers Public key cryptography Cryptographic hash functions

Program security OS security Designing trusted systems Database security Network security Administering security Economics of security Privacy Legal and ethical issues

Page 12: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

More information

For more information, visit the webpage: http://users.etown.edu/w/wittmanb/cs363

The webpage will contain: The most current schedule Notes available for download Reminders about exams and homework Syllabus (you can request a printed copy if you like) Detailed policies and guidelines

Piazza will allow for discussion and questions about the assignments and projects:

https://piazza.com/etown/spring2014/cs363/

Page 13: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Projects

Page 14: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Three projects

30% of your grade will be three equally weighted projects

Each will focus on a hands on element of computer security Cracking encryption Doing public key cryptography Designing a secure system

You will work on each project in two-person teams

Page 15: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Teams

All projects are done in teams of two The team will stay the same for the

whole semester One member of the team is the

leader The leader must send me an e-mail by

Friday, January 17, 2014 saying who is in the team

I will copy assignments from the leader’s class folder (J:\SP2013-2014\CS363A)

Page 16: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Turning in projects

Projects must be turned in by saving them in your team leader’s class folder (J:\SP2013-2014\CS363A) before the deadline

Do not put projects in your public directories Late projects will not be accepted

Exception: Each team will have 2 grace days You can use the two grace days together or

separately as extensions for your projects You must inform me before the deadline that you

are going to use grace days

Page 17: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Homework

Page 18: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Five homework assignments

15% of your grade will be five equally weighted homework assignments

Each will focus on a different set of topics from the course

All homework is to be done individually

I am (nearly always) available for assistance

Page 19: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Turning in homework

Homework assignments must be turned in by saving them in your class folder (J:\SP2013-2014\CS363A) before the deadline

Do not put assignments in your public directories

Late homework will not be accepted Paper copies of homework will not be accepted Each homework done in LaTeX will earn 0.5%

extra credit toward the final semester grade Doing every homework in LaTeX will raise your

final grade by 2.5% (one quarter of a letter grade)

Page 20: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Presentations

Page 21: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Presentations

5% of your grade will be based around two individual presentations given during the semester

These presentations can be about anything related to computer security or privacy

Choose topics you find interesting Part of your grade will be determined by

your involvement in discussions of other students’ presentations

Sign up on Friday for the date of your presentations

Page 22: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Grading presentations

1. Quality of contentMaterial is relevant to some aspect of computer security and is of interest to a classroom of CS and IS majors; content has not been covered in class and reflects current trends

2. Factual accuracyMaterial presented is free from major errors or inconsistencies

3. Clear and concise communication of content Talk has a defined beginning, middle, and end; a clear thesis statement emerges from the presentation; level of discussion is appropriate to the audience

4. Polished presentationVisually appealing presentation; use of images or animations when appropriate; spelling and grammatical mistakes are avoided

Page 23: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Quizzes

Page 24: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Pop Quizzes

5% of your grade will be pop quizzes These quizzes will be based on material

covered in the previous one or two lectures

They will be graded leniently They are useful for these reasons:

1. Informing me of your understanding2. Feedback to you about your understanding3. Easy points for you4. Attendance

Page 25: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Exams

Page 26: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Exams

There will be two equally weighted in-class exams totaling 30% of your final grade Exam 1: 2/17/2014 Exam 2: 3/31/2014

The final exam will be worth 15% of your grade Final: 2:30 – 5:30pm

5/05/2014

Page 27: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Exam format

Objective portion Multiple choice, short answer, and/or

matching questions Essays

Short essay questions about the philosophies or theories behind computer security

Page 28: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Course Schedule

Page 29: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Tentative scheduleWeek Starting Topics Chapters

1 01/13/14 Overview of computer security Chapter 12 01/20/14 Basic encryption and decryption Chapters 2 and 123 01/27/14 Modern symmetric ciphers Chapters 2 and 124 02/03/14 Public key cryptography Chapters 2 and 125 02/10/14 Cryptographic hash functions Chapters 2 and 126 02/17/14 Program security Chapter 37 02/24/14 OS security Chapter 4  03/03/14 Spring Break8 03/10/14 Designing trusted systems Chapter 59 03/17/14 Database security Chapter 610 03/24/14 Network security Chapter 711 04/07/14 Administering security Chapter 812 04/07/14 Economics of security Chapter 913 04/14/14 Privacy Chapter 1014 04/21/14 Legal and ethical issues Chapter 1115 04/28/14 Review All chapters

Page 30: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Project schedule

Project 1:  10% Tentatively due 2/07/2014

Project 2: 10% Tentatively due 3/21/2014

Project 3: 10% Phase 1:  Tentatively due 4/17/2014 Phase 2:  Tentatively due

5/02/2014

Page 31: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Policies

Page 32: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Grading breakdown

30% •Three team projects

15% •Homework assignments

5% •Pop quizzes

5% •Individual presentations

30% •Two equally weighted midterm exams

15% •Final exam

Page 33: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Grading scale

A 93-100 B- 80-82 D+ 67-69

A- 90-92 C+ 77-79 D 63-66

B+ 87-89 C 73-76 D- 60-62

B 83-86 C- 70-72 F 0-59

Page 34: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Attendance

You are expected to attend class You are expected to have read the

material we are going to cover before class

Missed quizzes cannot be made up Exams must be made up before the

scheduled time, for excused absences

Page 35: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

R-E-S-P-E-C-T

I hate having a slide like this I ask for respect for your classmates

and for me You are smart enough to figure out

what that means A few specific points:

Silence communication devices Don’t use the computers in class

unless specifically told to No food or drink in the lab

Page 36: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Computer usage

We won't be doing much work on the computers together

Nevertheless, when we do, students are always tempted to surf the Internet, etc.

Research shows that it is nearly impossible to do two things at the same time (e.g. use Facebook and listen to a lecture)

For your own good, I will enforce this by taking 1% of your final grade every time I catch you using your computer for anything other than course exercises

Page 37: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Academic dishonesty

Don’t cheat First offense:

I will give you a zero for the assignment, then lower your final letter grade for the course by one full grade

Second offense: I will fail you for the course and try to kick you

out of Elizabethtown College Refer to the Student Handbook for the

official policy Ask me if you have questions or concerns

Page 38: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Programming projects

Must compile If your program does not compile, it will score zero

points Must be handed in on time

If your program is late (and grace days are not available), it will score zero points

Must be done within the team If I can ascertain that code from one team’s project

appears in another team’s project, both projects will score zero points

All students will also have a full letter grade reduction at the end of the semester

Page 39: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Disability

Elizabethtown College welcomes otherwise qualified students with disabilities to participate in all of its courses, programs, services, and activities. If you have a documented disability and would like to request accommodations in order to access course material, activities, or requirements, please contact the Director of Disability Services, Lynne Davies, by phone (361-1227) or e-mail [email protected]. If your documentation meets the college’s documentation guidelines, you will be given a letter from Disability Services for each of your professors. Students experiencing certain documented temporary conditions, such as post-concussive symptoms, may also qualify for temporary academic accommodations and adjustments. As early as possible in the semester, set up an appointment to meet with me, the instructor, to discuss the academic adjustments specified in your accommodations letter as they pertain to my class.

Page 40: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

What does security mean?

Page 41: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Computer systems

Page 42: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Computer systems

We will be specifically discussing the security of computer systems Hardware Software Data

Attacks can focus on the theft, alteration, or disruption of any one of the three

The Principle of Easiest Penetration states that an attacker can try anything and will gravitate toward the easiest option

Page 43: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Terminology

A vulnerability is a weakness in a security system

A threat is a set of circumstances that can cause loss or harm

Performing an attack is exploiting a vulnerability

A control is a protection against an attack by reducing a vulnerability

“A threat is blocked by control of a vulnerability.”

Page 44: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Threats

•Someone read something they weren’t supposed toInterception

•Something became unavailable or unusableInterruption

•Someone changed something they weren’t supposed toModification

•Someone created fake thingsFabrication

Page 45: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Method, opportunity, motive

As with traditional crime, an attacker must have these three things:

•Skills and tools to perform the attackMethod•Time and access to accomplish the attackOpportunity

•A reason to perform the attackMotive

Page 46: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

CIA

Page 47: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

The basics of computer security:

Confidentiality

IntegrityAvailability

Page 48: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Confidentiality

You don’t want other people to be able to read your stuff Some of your stuff, anyway

Cryptography, the art of encoding information so that it is only readable by those knowing a secret (key or password), is a principle tool used here

Confidentiality is also called secrecy or privacy

Page 49: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Integrity

You don’t want people to mess up your stuff

You want to know: That your important data cannot be easily

changed That outside data you consider trustworthy

cannot be easily changed either There are many different ways that

data can be messed up, and every application has different priorities

Page 50: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Availability

You want to be able to use your stuff Many attacks are based on denial of

service, simply stopping a system from functioning correctly

Availability can mean any of the following: The service is present in usable form There is enough capacity for authorized users The service is making reasonable progress The service completes in an acceptable period

of time

Page 51: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Vulnerabilities

Page 52: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Hardware vulnerabilities

Adding or removing devices Intercepting the traffic to devices or

flooding them with too much traffic Physical attacks such as water, fire,

electricity, food particles, mice chewing through cables, dust, and blunt force trauma

These vulnerabilities can be exploited intentionally or unintentionally

Page 53: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Software vulnerabilities

Software deletion Accidental or otherwise

Software modification Accidental software changes due to

hardware errors or software bugs Trojan horses Viruses Trapdoors Information leaks

Software theft

Page 54: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Data vulnerabilities

Data confidentiality Wire tapping Van Eck phreaking Shoulder surfing Looking through trash

Data integrity Intercepting data and passing it along

with parts changed

Page 55: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Goals

Mechanisms are intended to accomplish one or more goals: Prevent an attack Detect an attack Recover from an attack

Page 56: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Other issues

Networks can multiply the problems of computer security by making data easy to intercept and change

Physical access to computer systems can allow people to use hardware and software for unauthorized benign or malignant purposes

People are problematic Someone has to design security systems, and they can’t

always be trusted Sometimes people are needed but unavailable People leave (or are fired) with valuable information People behave unpredictably People can be bribed

Page 57: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Upcoming

Page 58: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Next time…

Computer criminals Defense methods Overview of cryptography

Page 59: Computer Security.  Dr. Barry Wittman  Not Dr. Barry Whitman  Education:  PhD and MS in Computer Science, Purdue University  BS in Computer Science,

Reminders

Read Chapter 1 Form your teams

Team leader should send me an e-mail by Friday, January 17

Decide when you want to give your presentations on security