cs 334: computer security - university of richmonddszajda/classes/cs334/fall_2014/... · ethics...

42
CS 334: Computer Security Prof. Doug Szajda http://www.richmond.edu/~dszajda Fall 2014

Upload: others

Post on 30-Jun-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -

CS 334: Computer Security

Prof. Doug Szajda

http://www.richmond.edu/~dszajdaFall 2014

Page 2: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -

What Is This Class?• Computer security = how to keep computing systems

functioning as intended & free of abuse …– … and keep data we care about accessed only as desired …– … in the presence of an adversary

• We will look at:– Attacks and defenses for

• Programs• Networks• Systems (OS, Web)

– Securing data and communications– Enabling/thwarting privacy and anonymity

• How these notions have played out in the Real World• Issues span a very large range of CS

– Programming, systems, hardware, networking, theory

Page 3: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -

What Will You Learn?• How to think adversarially• How to assess threats for their significance• How to build programs & systems that have

robust security properties• How to gauge the protections and limitations

provided by today’s technology– How to balance the costs of security mechanisms vs.

the benefits they offer• How today’s attacks work in practice• How security issues have played out “for

real” (case studies)

Page 4: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -

Ethics & Legality• We will be discussing (and launching!) attacks -

many quite nasty - and powerful eavesdropping technology

• None of this is in any way an invitation to undertake these in any fashion other than with informed consent of all involved parties– The existence of a security hole is no excuse

• These concerns regard not only ethics but UR policy and Virginia/United States law

• If in some context there’s any question in your mind, come talk with me first

Page 5: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -

Course Overview• Software issues

– exploits, defenses, design principles• Web security

– browsers, servers, authentication• Networking

– protocols, imposing control, denial-of-service• Large-scale automated attacks

– worms & botnets• Securing communication & data via

cryptography– confidentiality, integrity, signatures, keys, e-cash

Page 6: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -

Course Overview, con’t

• Operating systems–access control, isolation, virtual machines,

viruses & rootkits• The pervasive problem of Usability• Privacy

– anonymity, releasing data, remanence• Detecting/blocking attacks in “real time”• Landscape of modern attacks

– spam, phishing, underground economy• Case studies

Page 7: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -

Some Broad Perspectives• A vital, easily overlooked facet of security is

policy (and accompanying it: operating within constraints)

• High-level goal is risk management, not bulletproof protection.– Much of the effort concerns “raising the bar” and

trading off resources• How to prudently spend your time & money?

• Key notion of threat model: what you are defending against– This can differ from what you’d expect– Consider the Department of Energy …

Page 8: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -
Page 9: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -
Page 10: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -
Page 11: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -

Modern Threats• An energetic arms race between

attackers and defenders fuels rapid innovation in “malcode” …

• … including powerful automated tools …

• … and defenders likewise devise novel tactics …

Page 12: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -
Page 13: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -

13

Page 14: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -

Modern Threats• An energetic arms race between

attackers and defenders fuels rapid innovation in “malcode” …

• … including powerful automated tools …

• … and defenders likewise devise novel tactics …

Page 15: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -
Page 16: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -

Modern Threats• An energetic arms race between

attackers and defenders fuels rapid innovation in “malcode” …

• … including powerful automated tools …

• … and defenders likewise devise novel tactics …

Page 17: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -
Page 18: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -

Modern Threats, con’t• Most cyber attacks aim for profit and are

facilitated by a well-developed “underground economy …

• … but recent times have seen the rise of nation-state issues, including:– Censorship / network control– Espionage–… and war

Page 19: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -
Page 20: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -
Page 21: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -
Page 22: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -
Page 23: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -

23

Page 24: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -

24

Page 25: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -

Modern Threats, con’t• Most cyber attacks aim for profit and are

facilitated by a well-developed “underground economy …

• … there are also extensive threats to privacy including identity theft

• … but recent times have seen the rise of nation-state issues, including:– Censorship / network control– Espionage–… and war

Page 26: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -
Page 27: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -

27

Page 28: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -

Modern Threats, con’t• Most cyber attacks aim for profit and are

facilitated by a well-developed “underground economy …

• … there are also extensive threats to privacy including identity theft

• … and recent times have seen the rise of nation-state issues, including:– Censorship / network control– Espionage–… and war

Page 29: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -
Page 31: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -

31

Page 32: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -

32

Page 33: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -

33

Page 34: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -

34

Page 35: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -

Modern Threats, con’t• Most cyber attacks aim for profit and are

facilitated by a well-developed “underground economy …

• … there are also extensive threats to privacy including identity theft

• … and recent times have seen the rise of nation-state issues, including:– Censorship / network control– Espionage–… and war

Page 36: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -
Page 37: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -

37

Page 38: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -

38

(August 19, 2014)

Page 39: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -

Modern Threats, con’t• Most cyber attacks aim for profit and are

facilitated by a well-developed “underground economy …

• … there are also extensive threats to privacy including identity theft

• … but recent times have seen the rise of nation-state issues, including:– Censorship / network control– Espionage–… and war

Page 40: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -
Page 41: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -
Page 42: CS 334: Computer Security - University of Richmonddszajda/classes/cs334/Fall_2014/... · Ethics & Legality • We will be discussing (and launching!) attacks - many quite nasty -

42