• Tidak ada hasil yang ditemukan

lecture1_2.ppt 1080KB Jun 23 2011 10:19:28 AM

N/A
N/A
Protected

Academic year: 2017

Membagikan "lecture1_2.ppt 1080KB Jun 23 2011 10:19:28 AM"

Copied!
23
0
0

Teks penuh

(1)

CS 285 Network Security

(2)

Course Information

When and Where

 Tuesday/Thursday 11am-12:15pm

 209 Featheringill Hall

Instructor: Yuan Xue (

[email protected]

)

 Office: 383 Jacobs Hall, Phone: 615-322-2926

 Office hours: Monday/Thursday 2pm-3pm or by appointment.

Web:

(3)

Books and References

Textbook

[WS] Cryptography and Network Security: Principles

and Practice (4th Edition) by William Stallings

Reference books

[KPS] Network Security: Private Communication in a

Public World (2nd Edition), by Charlie Kaufman,

Radia Perlman, Mike Speciner

[CSP] Security in Computing (3rd Edition), by

Charles P. Pfleeger, Shari Lawrence Pfleeger

[MB] Computer Security: Art and Science, by

(4)

Course Component

Lecture

Slides + white board

Take note

Online digest/slides

Participation

Discussion

Presentation

Homework

5 assignments

Midterm

Project

Grading Policy

Participation:

10%

Homework: 35%

Midterm: 25%

(5)

What you will learn from this

course

What is

Security

?

Where the security problems come from?

Potential threats to a system

What are the solutions?

 Apply an appropriate mix of security measures (protective, defensive, etc)

 Knowing what has worked, what has failed. Security involves many aspects

-Operating system, programming language, administration and policy

Our Focus

(6)

Course Topics

Security Basics and Principles

 Symmetric/ Asymmetric Cryptography  Basic concept, algorithm, mechanism,  Design principles

Security Practices

 Secure protocols, systems and applications  Hand-on experiences

 Secure network programming

Hot Topics and Recent Development

(7)

Survey and Feedback

Your input is important

Online Survey

http://www.zoomerang.com/Survey/?p=WEB22873V62

YWQ

(8)

What is security?

In general, security is the condition of

being protected against danger or loss.

(Wikipedia)

In computer security and network

security

What are the subjects that need to be

protected?

Let’s start with some terms

System

computer, network, application, data, resource

Principal: an entity that participate in a

system

(9)

What is security?

Computer Security

Confidentiality

means that only authorized people

or system can access the data or resource.

Integrity

refers to the trustworthiness of data or

resources.

Data integrity means that data can only be modified by

authorized people or system in authorized ways

Origin integrity means that the source of the data is

trustworthy, also called authentication.

Message authentication means messages received are

exactly as sent (i.e. no modification, insertion, deletion, or replay), and the ID of the sender is valid.

Note: timing information

Availability

means that people has the ability to

(10)

Where the security problem comes

from?

Let’s look at some example systems:

Bank

Bookkeeping

Core operations

 customer account, journals recording the transactions

Who has the access to the information?

 Bank’s own staff – what if they cheat?

ATM

Authenticate users based on card and ID number

Let’s go Internet

The user – how do we know they are the “real” (authenticate)

user?

(11)

Where the security problem comes

from?

Hospital

Patient record system

Who can access the record? –

 Many parties – insurance company, care giver, researcher, etc  Complicated -- role can change

 Privacy issue – HIPPA

Anonymize the record for research

Is it sufficient?

 Show me all records of 59-year-old males who were treated for

a broken collarbone on September 15, 1966

Drug management

Let’s go to Web

(12)

Issues that will be

(13)

Network Security Issues

From a Computer to Internet

Single computer

Networking environment

Secure communication in a public environmentComputer system security with remote access

(14)

Some Simple Scenarios

Internet Lin k IP TCP/UDP Application Lin k IP TCP/UDP Application Lin k IP Lin k IP

Bob

Alice

Darth

(15)

Some Simple Scenarios

Internet Lin k IP TCP/UDP Application Lin k IP TCP/UDP Application Lin k IP Lin k IP

Bob

Alice

Darth

(16)

Some Simple Scenarios

Internet Lin k IP TCP/UDP Application Lin k IP TCP/UDP Application Lin k IP Lin k IP

Bob

Alice

Darth

(17)

Some Simple Scenarios

Internet Lin k IP TCP/UDP Application Lin k IP TCP/UDP Application Lin k IP Lin k IP

Bob

Alice

Darth

Pretend to be Bob to
(18)
(19)

Some Simple Scenarios

Internet Lin k IP TCP/UDP Application Lin k IP TCP/UDP Application Lin k IP Lin k IP

Bob

Alice

Darth

(20)
(21)

Why many solutions fail?

Protect wrong things

(22)

What are the solutions?

Security Basics and Principles

Symmetric/ Asymmetric Cryptography

Basic concept, algorithm, mechanism,

Security Practices

Secure protocol designs

(23)

How to study network security?

Principle of Easiest Penetration

An intruder are expected to use any available

means of penetration.

Computer security specialists must consider all

possible means of penetration.

Learning methodology

Referensi

Dokumen terkait

Bidang pekerjaan : artinya setiap kotaj dalam struktur organisasi Bidang pekerjaan : artinya setiap kotaj dalam struktur organisasi memberikan informasi mengenai tugas –tugas

If a Uranium atom is struck by a Neutron, it can break apart into a Cesium atom, a Rubidium atom and two more Neutrons.. When this happens, LOTS and LOTS and LOTS of energy

The most effective way to meet those goals is to implement security The most effective way to meet those goals is to implement security risk assessment through a security policy and

– IPSec is a suite of authentication and encryption protocols IPSec is a suite of authentication and encryption protocols developed by the Internet Engineering Task Force (IETF) and

 TUJUAN KHUSUS diwujudkan untuk mengkaji TUJUAN KHUSUS diwujudkan untuk mengkaji aspek masalah tertentu yang berkaitan erat aspek masalah tertentu yang berkaitan erat

Penemuan tentang teknik atau metode untuk mencapai suatu tujuan yang sudah teruji secara eksperimental dapat berguna bagi penyusunan teori baru.. Dapat memberi

• RSS Feed Reader: Organization is mainly chronological (that’s limiting!). Can serve as offline reader. • Print: “Smell of the Book,” Ability to look at two pages at

o the different types of teams in health care o the characteristics of effective teams.. o how ones values and assumptions affect interactions