0% found this document useful (0 votes)
182 views

Study Guide To Information Security

This is a study guide for a course on Information Security.

Uploaded by

dbosk
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
182 views

Study Guide To Information Security

This is a study guide for a course on Information Security.

Uploaded by

dbosk
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

A course on Information Security

Daniel Bosk
Department of Information Systems and Technology
Mid Sweden University, Sundsvall
School of Computer Science and Communication
KTH Royal Institute of Technology, Stockholm

14th October 2019

Abstract
The study guide covers provides an overview of the course: the scope
and intended learning outcomes, how the teaching is organized to achieve
that, what is studied when, what to do if you miss the due times for
assignments etc.

1
Contents
1 Scope and aims 3
1.1 Intended learning outcomes . . . . . . . . . . . . . . . . . . . . . 3

2 Course structure and overview 4


2.1 Teaching and tutoring . . . . . . . . . . . . . . . . . . . . . . . . 4
2.2 Schedule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

3 Course contents 4
3.1 S0 What’s up with security? . . . . . . . . . . . . . . . . . . . . . 4
3.2 Foundations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
3.3 Managing information security . . . . . . . . . . . . . . . . . . . 7
3.3.1 MSB part I . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3.3.2 M1 Information security management system . . . . . . . 7
3.3.3 MSB part II . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3.3.4 M2 and S3 Assessment and risk analysis . . . . . . . . . . 7
3.3.5 Information security from a records management perspect-
ive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.4 Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.5 Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.5.1 L4 Evaluating and designing authentication . . . . . . . . 9
3.6 Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3.6.1 L5 Private communication . . . . . . . . . . . . . . . . . . 10
3.7 Access control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3.8 Accountability . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.9 Differential privacy . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.10 Software security . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
3.11 Trusted computing . . . . . . . . . . . . . . . . . . . . . . . . . . 12
3.12 P6 Applying security and usability in practice . . . . . . . . . . . 13

4 Assessment 13
4.1 Handed-in assignments . . . . . . . . . . . . . . . . . . . . . . . . 14
4.2 ‘What if I’m not done in time?’ . . . . . . . . . . . . . . . . . . . 14

2
1 Scope and aims
The aim of the course is that after the course you should be able to make high-
level designs for secure solutions, i.e. combine relevant research results based on
their high-level properties into a solution with the desired security, privacy and
usability properties. The problems and solutions can be in both the technical
or organizational domain.

1.1 Intended learning outcomes


More concretely, after completing the course, you should be able to:
• evaluate the usability of security solutions and suggest improvements that
improve usability and security.
• evaluate threats, possible protection mechanisms and design a high-level
approach to protection which considers usability.

• navigate the field of information security, distinguish your own limits and
where to search for solutions, e.g. experts or published research results
that are relevant to the solution of a given problem.
• analyse and apply the results of published research in the security field.

• apply the Swedish Civil Contingency Agency’s Framework for Information


Security Management Systems (ISO 27000) to analyse, assess and improve
the information security in an organization.
The course has a variety of learning sessions designed to ensure that you
learn these intended learning outcomes (ILOs). Each such session has a set of
further specified ILOs that will help you achieve the ILOs above.
The grades will be based on the following grading criteria.
Grade E You fulfil all the ILOs above. You should have identified a relevant
problem, and given a solution to it. It must be a viable solution, however
gaps and mistakes are allowed, if they don’t render your solution unusable.

Grade C You fulfil the criteria for E. Additionally, your evaluations and designs
are good with some base in theory and, where applicable, the research lit-
erature. Gaps and errors are allowed if they only render your solution less
optimal.
Grade A You fulfil the criteria for C. However, your evaluations and designs
must be extensive and well-founded in theory and, where applicable, the
research literature. Gaps and errors are not allowed in the solution unless
they have been properly addressed and you have given a suggestion on an
approach to how to start resolve the issue.
The grades B and D are intermediary grades.

3
2 Course structure and overview
The course is divided into three parts. The first part of the course covers the
foundations of security: what it is, how to evaluate new knowledge in the field.
This covers both purely technical aspects, but also includes human aspects such
as usability — even if a system is proved secure, it will offer no security if its
human users cannot use it.
The second part of the course covers information security on a strategic level,
this concerns organizational management systems for information security: how
to implement these and how to continuously run them in an organization. It also
includes threat and risk analysis. The main material is produced by the Swedish
Civil Contingencies Agency (MSB) and is based on the ISO 27000 standard.
The third part of the course covers the technical aspects: how to design
security (and not to design security). The focus in this part of the course is on
security mechanisms and how to use these in secure systems.

2.1 Teaching and tutoring


The teaching of the course is oriented towards active learning. I.e. the course
consists of learning sessions which requires active participation.
Each topic is covered by some recorded lectures and an interactive session.
For each topic the reading material is specified. Generally, you are expected
to watch the videos and read the material in advance. During the (interactive)
learning session the most important parts of the material will be discussed and
you will perform some tasks to work with the topic in groups, i.e. to apply it to
learn it more efficiently. Some modules of the course will have several learning
sessions linked together, e.g. a starting seminar, followed by laboratory work
which is then summarized and used in a final seminar.

2.2 Schedule
In Table 1 you will find an overview of the schedule for the course. The detailed
schedule can be found in the University’s central scheduling system. The details
for each session can be found in Section 3.

3 Course contents
This section summarizes each of the learning sessions, i.e. what they cover, what
you are expected to learn and its reading material.

3.1 S0 What’s up with security?


Summary: The purpose of this assignment is to get an idea of how security
affects products, which in turn affects not only the companies behind them, but
also the consumers and can have effects on a societal scale.
Intended learning outcomes: The aim of this assignment is
• to reflect on the effects of security, or lack thereof, on both individual and
society.

4
Course week Work
1 Session: Introduction
Seminar: What’s up with security? (Section 3.1)
Foundations: What is security?, The scientific method, At-
tacking humans, Psychology (Section 3.2)
Session: Foundations
2 Lecture: MSB’s framework, part I (Section 3.3)
Start working on M1 (Section 3.3.2)
Lecture: MSB’s framework, part II
Start working on M2, prepare S3 (Section 3.3.4)
Lecture: Records management
3 Crypto: Shannon entropy, Some applications of info theory
(Section 3.4)
Crypto: High-level overview of modern crypto
Authentication (Section 3.5)
Session: Crypto, Authentication
4 Seminar: L4 (Section 3.5.1) part I
Seminar: L4 part II
5 Protocols (Section 3.6)
Seminar: L5 (Section 3.6.1)
Access control (Section 3.7)
Accountability (Section 3.8)
Session: Protocols, Access control, Accountability
6 Differential privacy (Section 3.9)
Software security (Section 3.10)
Trusted computing (Section 3.11)
Session: Differential privacy, Software and Trusted Com-
puting
7 Tutoring: P6 (Section 3.12)
Seminar: S3 (Section 3.3.4)
8 Tutoring: P6 (devel)
9 Tutoring: P6 (devel)
10 Presentation: P6 (devel)
Second grading: M1 (isms), M2 (risk)
Second seminar: S3 (risk), L4 (pwdeval), L5 (pricomlab)
+3 months Second presentation: P6 (devel)
Final grading: M1 (isms), M2 (risk)
Final seminar: S3 (risk), L4 (pwdeval), L5 (pricomlab)
+6 months Final presentation: P6 (devel)

Table 1: A summary of the parts of the course and when they will (or should)
be done. The table is adapted to taking this course at half-time pace, i.e. 20
hours per week for 10 weeks.

5
• to value and argue about the responsibilities of engineers.
Reading: To be able to reason and have a discussion, we will have some ethics
guidelines as a base: Code of Ethics: ACM Code of Ethics and Professional
Conduct [1], Software Engineering Code of Ethics and Professional Practice [2]
and IEEE Code of Ethics [3].
First, you must read up on the influence campaigns during the 2016 US
election [4]. Then you must read up on the Cambridge Analytica scandal [e.g.
5–8] and the Mirai botnet incident [9].
Finally, you should search for and read current news articles of your own
choice illustrating the problem of lacking security.

3.2 Foundations
What is security? Summary: In this learning session we will cover the found-
ations of security. By this we mean what security is all about, e.g. what types
of properties we are interested in and what we want to achieve in our security
work.
Intended learning outcomes: After this session you should be able:
• to understand the what security is generally about.
Reading: You should read Gollmann’s chapter on ‘Foundations of Computer
Security’ [10, Chap. 3]. There he attempts at a definition of Computer Security
and related terms, e.g. confidentiality, integrity, and availability, which we need
for our treatment of the topic. Anderson also covers this in Chapter 1 of [11].
He also treats a wider area than just computer security, which is good for us,
he covers many aspects of security in different examples.

The scientific method Summary: In this learning session we will give an


introduction to the scientific method and particularly how this can be applied
in the area of security.
Intended learning outcomes: After this session you should be able:
• to differentiate which types of scientific methods are appropriate to answer
a given question.
Reading: You should read ‘How to Design Computer Security Experiments’ [12].
This paper discusses the scientific method of (parts of) the security field. For
a more in-depth reflection on the state of security as a scientific pursuit, we re-
commend ‘SoK: Science, Security and the Elusive Goal of Security as a Scientific
Pursuit’ [13].

Attacking humans Summary: One important aspect of security is users’


weaknesses. There are many ways to attack systems through their human op-
erators. During this learning session we cover a variety of examples of such
attacks.
Intended learning outcomes: After this learning session you should be able:
• to adopt an adversarial thinking for situtions involving humans.
Reading: Anderson gives a short summary of the psychology of users, their
strengths and weaknesses, in Chapter 2 “Usability and Psychology” of Security
Engineering [11].

6
Psychology Summary: One important aspect of security, which technical
people tend to forget, is the users’ weaknesses. The psychology of the human
mind is therefore an important subject to discuss in the context of security. And
consequently, we must adapt our systems to those limitations. In this learning
session, we will focus on relevant parts of our psychology.
Intended learning outcomes: After this learning session you should be able:
• to incorporate basic psychology in the design of a system to increase its
security.

Reading: Anderson gives a short summary of the psychology of users, their


strengths and weaknesses, in Chapter 2 ‘Usability and Psychology’ of Security
Engineering [11].

3.3 Managing information security


3.3.1 MSB part I
Information security is not only about applying new security mechanisms and
security solutions, it is as much about establishing processed and methods for
dealing with informational assets. This lecture covers the Methodological sup-
port written by the Swedish Civil Contingencies Agency. The methodological
support is meant to help organisations to work with their informational assets
in accordance to the ISO27000 standard for implemementing an Information
Security Management System (ISMS).

3.3.2 M1 Information security management system


Before writing this memo, you should have read the following:
• Introduktion till metodstödet [14],
• Säkra ledningens engagemang [15], and
• Projektplanering [16].

3.3.3 MSB part II


This lecture covers the remaining part of MSB’s material [17–29]. This part
of the material treats how to run an ISMS. The largest part is the gap ana-
lysis, i.e. finding the gap between the security practices in the organisation and
the practices recommended by ISO 27000. The main point of this part is not
something done once and never again, an ISMS is a continuous process.

3.3.4 M2 and S3 Assessment and risk analysis


Before doing this assignment you should have read the following:
• Verksamhetsanalys [30] and
• Riskanalys [31]

7
3.3.5 Information security from a records management perspective
Records and Archives management deals with certain kinds of information that
is related to business processes, and serve as evidence of activities. Why it
can forexample be used for accountability purposes, contracts, regulate busi-
ness relations and more. Therefore it is important to ensure the quality of the
information, and that it is not manipulated for example. The trustworthiness of
the information is central, and development of criteria and practices to ensure
that. The emphasis is on the information, and also to understand the context
in which the information is created and managed. Business process analysis is
therefore a central activity. The National Archives of Sweden and the Swedish
Civil Contingencies Agency has for example had some collaboration in that area.
The lecture will be an introduction to archives and information science, ba-
sic concepts, processes, business process analysis and information mapping. It
covers material from primarily Vägledning för processorienterad informations-
kartläggning [32] and the standard ISO 30300:2011 [33].

3.4 Cryptography
Basic information theory The area of Information Theory was founded in
1948 by Claude Shannon. It is a mathematical theory to reason about how much
information is contained in certain data. Equivalently, it is also a measure of
uncertainty in information, and has thus plenty of application in security and
cryptography. This learning session covers the basic concept, Shannon entropy,
and some applications to security and privacy.
After the session you should be able
• to apply Shannon entropy in basic situations related to security and pri-
vacy.
The concept of Shannon entropy, the main part of information theory, is
treated in a few short texts: A Primer on Information Theory and Privacy [34]
and ‘Chapter 6: Shannon entropy’ [35]. You should read on the use of entropy
to estimate identifiability: ‘How Unique Is Your Browser?’ [36].

A high-level overview of crypto Cryptography has a central role in secur-


ity. To fully understand how many security mechanisms can be implemented we
need cryptography. For this reason, we also need higher-level knowledge about
what can be achieved with cryptography to not limit our thoughts about pos-
sible solutions. This learning session is intended to give a high-level overview of
cryptography: symmetric-key encryption, public-key encryption, digital signa-
tures, zero-knowledge proof and secure multiparty computation. In particular,
the ILOs are that you should be able to
• understand what properties can be achieved with cryptography.

• analyse a situation and suggest what cryptographic properties are desir-


able.
The basics are covered by Chapter 5 in Anderson’s Security Engineering [11]
and Chapter 14 in Gollmann’s Computer Security [10]. (To practice your under-
standing of these mechanisms it is recommended to do exercises 14.2, 14.3 and

8
14.7 in [10].) For the remaining topics, however, we refer to the Encyclopedia of
cryptography and security [37] (and cited papers and books).

3.5 Authentication
Authentication is part of the core of security. An entity claims something, a
property or an identity, authentication is about verifying or rejecting any such
claim. We will discuss three aspects of authentication: user-to-machine (and
user-to-user), machine-to-user, machine-to-machine. For user authentication
we will start with the traditional something you know, something you have and
something you are and then look beyond.
More specifically, the session should prepare you to be able to
• understand the authentication and usability problems of authentication
involving users.
• analyse the requirements for authentication in a situation and design an
authentication system with desired authentication properties and usabil-
ity.
Why we want to do this and how we can accomplish this is treated in Chapter
4 in [10]. Anderson also treats this topic [11, Chap. 2], although in a wider
perspective with less technical details. When you have studied this material you
should do exercises 4.2, 4.3, 4.4 and 4.6 in [10]. For the treatment of anonymous
credentials, we refer to ‘Electronic Identities Need Private Credentials’ [38] and
‘Anon-Pass: Practical Anonymous Subscriptions’ [39].

3.5.1 L4 Evaluating and designing authentication


A lot of user authentication is based on passwords. We use password policies
to aid users in selecting a secure password. Unfortunately, research has shown
that the common password-polices do not have the expected effect: users can
still choose easy-to-guess passwords and the policies actually makes guessing
easier. It is thus important to scientifically evaluate the actual effects of any
user-authentication mechanism, otherwise our security might be at risk. Here
we will focus on exactly that. More specifically, after this lab you should be
able to
• evaluate the effective security by considering security and usability.
• analyse research results in usable security and apply those relevant to a
given situation.
• design security policies aligned with usability.
To do this, we must be familiar with several topics: usability [11, Ch. 2], cryp-
tography [11, Ch. 5] [40], information theory [35] and the scientific method [41].
The main contents is some research papers on password security and usability:
‘Guess again (and again and again): Measuring password strength by simulat-
ing password-cracking algorithms’ [42], ‘Of passwords and people: Measuring
the effect of password-composition policies’ [43], ‘Can long passwords be secure
and usable?’ [44] and ‘The Password Life Cycle’ [45]; complemented by a paper
on the usability of password managers: ‘A comparative usability evaluation of
traditional password managers’ [46].

9
3.6 Protocols
As soon as two entities need to interact, there is need for a protocol — be it
inside or between systems, even one entity communicating with itself in different
points in time (which is the case when storing something for use at a later time).
These protocols need different properties. We will explore how to design secure
protocols and introduce some tools for verifying security properties of protocols.
More concretely, after this session you should be able to
• overview the different approaches and their limits to verify the security of
protocols.
Anderson gives an overview of this area in Security Engineering [11], Chapter
3 ‘Protocols’. Gollmann has a more technically oriented treatment of a part of
this topic in Chapter 15 of Computer Security [10].

3.6.1 L5 Private communication


The more our society depends on digital systems, the more important private
communication becomes. We need private communications to sustain demo-
cracy, thus we need it to be available to everyone. The purpose of this labor-
atory work is to introduce some practical aspects of private messaging. More
specifically, after it, you should be able to
• apply (securely!) some common implementations of cryptography for
private communication — also including any set-up (e.g. key verification).
• analyse different systems for private communication based on their secur-
ity properties and evaluate which is suitable in a given situation.
• evaluate different implementations of private communication from a us-
ability perspective.
The topics of this assignment are: usability [11, Ch. 2] and cryptography [11,
Ch. 5] and privacy-enhancing technologies [11, Ch. 23.4]. We then rely on the
‘Why Johnny can’t encrypt’ papers:
• ‘Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0.’ [47],
• ‘Why Johnny still can’t encrypt: Evaluating the usability of email encryp-
tion software’ [48],
• ‘Why Johnny still, still can’t encrypt: Evaluating the usability of a modern
PGP client’ [49],
• ‘Can Johnny finally encrypt?: evaluating E2E-encryption in popular IM
applications’ [50].

3.7 Access control


Once you have authenticated users you can support access control — and this
is also one of the main reasons to authenticate them in the first place. Access
control aims at controlling who may access what and how they may access it.
There are different models and ways to implement access control. Here we will
give an overview of the possibilities. In particular, the ILOs are that you are
able to:

10
• understand the fundamental access control models and their relations.
• evaluate advantages and disadvantages of different access control solutions.

• analyse a situation and design a proper access control solution.


The reading material is Chapter 5, followed by Chapters 11 and 12, in Com-
puter Security [10]. Anderson also treats the subject in Chapters 4, 8, and 9 of
Security Engineering [11]. (Only one of the two books is necessary to read.)

3.8 Accountability
The need for accountability has been apparent in civilisations for as long as
they have existed. One of today’s institutions which is historically renowned
for keeping strict accounts is the state tax office, another is, of course, the
banks. We will explore some principles in keeping accounts and discuss ways to
implement it in different, sometimes challenging, environments. In particular,
the ILOs are that you are able to:
• evaluate advantages and disadvantages of different levels of accountability.

• analyse a situation and design proper accountability and, in particular,


with privacy considerations.
Anderson describes accountability through his experience from banks in
Chapter 10 ‘Banking and Bookkeeping’ in Security Engineering [11]. We will
also use the secure logging system of Schneier and Kelsey [51] as an example of
how to achieve secure logging in a challenging environment. The construction
described therein is a method to safely store audit logs in an untrusted machine;
in the scheme, all log entries generated prior to a compromise will be impossible
for the attacker to read, modify, or destroy undetectably.

3.9 Differential privacy


User data is collected and processed in many applications. From a privacy
perspective, this is bad for the users — it is a privacy risk, that data might leak
or be used for something unintended by the user. In many cases we actually
do not need the exact user data, e.g. if we want to estimate user behaviour or
do statistical computations over all users. One tool that is available to use is
differential privacy. Here we review the definitions of what it is and look at a
variety of uses.
In particular, after this session you should be able to
• understand the uses of differential privacy and to which kind of problem
it can be applied.

• analyse different solutions in the research literature based on differential


privacy and suggest a design for a solution to a given problem using the
relevant findings.
The basic theory of differential privacy is covered by Chapters 1–2 (with more
in Chapter 3) in ‘The Algorithmic Foundations of Differential Privacy’ [52]. We
will furthermore look at some interesting applications of differential privacy in:

11
• ‘Challenging Differential Privacy: The Case of Non-interactive Mechan-
isms’ [53],

• ‘Private Similarity Computation in Distributed Systems: From Crypto-


graphy to Differential Privacy’ [54],
• ‘BLIP: Non-interactive Differentially-Private Similarity Computation on
Bloom filters’ [55],
• ‘RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response’ [56],
and
• ‘Building a RAPPOR with the unknown: Privacy-preserving learning of
associations and data dictionaries’ [57].

3.10 Software security


Perhaps the part of security most people intuitively associate with security,
and computer security in particular, is software security. This part of computer
security treats vulnerabilities in software, e.g. buffer overruns or code injections.
This is a very important part of security, because although the design is flawless,
its implementation might have vulnerabilities. As an example, most phones are
designed to keep the user and applications unpriviledged, thus all applications
will run with the principle of least priviledges and compartmentalized from each
other. However, software bugs in the operating system can allow malicious apps
to gain priviledges to e.g. monitor other apps.
After this session you should be able to

• understand the need to consider software security in software development.


• evaluate the software security requirements for different sitations.
Gollmann treats this area in Chapter 10 of his book, Computer Security [10].
The recommended exercises to do after reading this material are 10.1, 10.3 and
10.4 in [10]. Anderson also treats this subject — in Chapter 4.4 and Chapter 18
of Security Engineering [11] — albeit with less technical details. We also treat
the results of ‘Four Software Security Findings’ [58].

3.11 Trusted computing


One can only do so much with software. The problem with software and general
purpose processors is that the software can be modified and the processor will
still execute it. Some examples: Alice left the laptop in the hotel room while
having breakfast, perhaps the hotel aide replaced the bootloader to break Alice’s
full-disk encryption? Or, how can Alice even trust the computer when it is
brand new? Another aspect of this is to protect parts of the system from Alice
herself, e.g. this is what digital rights management is all about. We also have
the compartmentalization of apps in a smartphone. If Alice accidentally installs
a malicious app, it shouldn’t be able to compromize the banking app. Here we
will explore how to ensure the integrity of the computer system.
More concretely, after this session you should be able to

12
LADOK ECTS Grade Course assignments
I101 1.0 P, F M1, M2
S101 1.0 P, F S3
L101 1.0 P, F L4, L5
R101 3.0 A–F P6
Total 6.0 A–F P6

Table 2: Table summarizing course modules and their mapping to LADOK. P


means pass, F means fail. A–E are also passing grades, where A is the best.

• understand the problem of trusted computing, its approaches to solutions,


the underlying assumptions and its limitations.
• analyse different approaches to trusted computing and their limitations
and apply them in a solution to a given problem.
We treat the material in Chapters 16, 17, 18, 22 and 23 in Security Engin-
eering [11]. The papers [59–61] illustrates just how difficult this can be. The
authors extract encryption keys using acoustic side-channels, i.e. they analyse
the sound emitted by the electrical circuitry to find the computations done and
hence derive the bits of the key used.

3.12 P6 Applying security and usability in practice


Security, privacy and usability have all gained traction in recent years. High
usability has been a must-have since smartphones and tablets entered the scene
as an alternative to the personal computer. Privacy was probably best emphas-
ized through the advent of EU General Data Protection Regulation (GDPR) in
2018. GDPR also implies strong security. This means that, for any product to
succeed, it must have a strong emphasis on usability, privacy and security.
This project aims for you to practice and show that you are able
• to evaluate the usability of security solutions and suggest improvements
that improve usability and security.
• to evaluate threats, possible protection mechanisms and to design a high-
level approach to protection which considers usability.
• to navigate the field of information security, distinguish your own limits
and where to search for solutions, e.g. experts or published research results
that are relevant to the solution of a given problem.
• to analyse and apply the results of published research in the security field.

4 Assessment
This section explains how the course modules are graded and mapped to LADOK.
Table 2 visualizes the relations between modules, credits, grades and LADOK.
The project report is graded from A to F, where A–E are for passing and F
and Fx are for failing. The project also includes an oral presentation which is

13
graded pass (P) or fail (F), and is reported with the project to LADOK. The
grade of the project will also be the grade of the course total.

4.1 Handed-in assignments


In general, all hand-ins in the course must be in a ‘passable’ condition; i.e. they
must be well-written, grammatically correct and without spelling errors, have
citations and references according to [62] (see also [63] for a tutorial), and finally
fulfil all requirements from the assignment instruction. If you hand something
in which is not in this condition, you will receive an F without further comment.
All material handed-in must be created by yourself, or, in the case of group
assignments, created by you or one of the group members. When you refer to
or quote other texts, then you must provide a correct list of references and, in
the case of quotations, the quoted text must be clearly marked as quoted. If
any part of the document is plagiarized you risk being suspended from study
for a predetermined time, not exceeding six months, due to disciplinary offence.
If it is a group assignment, all group members will be held accountable for
disciplinary offence unless it is clearly marked in the work who is responsible
for the part containing the plagiarism.
If cooperation takes place without the assignment instruction explicitly al-
lowing this, this will be regarded as a disciplinary offence with the risk of being
suspended for a predetermined time, not exceeding six months. Unless otherwise
stated, all assignments are to be done individually.

4.2 ‘What if I’m not done in time?’


The deadlines on this course are of great importance, make sure to keep these!
For seminars and presentations there will be three sessions during the course
of a year, if you cannot make it to any of those you will have to return the next
time the course is given; i.e. up to a year later. All of these sessions will be
in the course schedule (in the Student Portal). If you miss a deadline for the
preparation for a seminar session, then you have to go for the next seminar even
if the first seminar has not passed yet.
Written assignments are graded once during the course, most often shortly
after the deadline of the assignment. After the course you are offered two
more attempts within a year. In total you have three chances for having your
assignments graded over the period of a year. After that you should come back
the next time the course is given.
No tutoring is planned after the end of the course, i.e. after the last tutor-
ing session scheduled in the course schedule. If you are not done with your
assignments during the course and want to be guaranteed tutoring you have to
reregister for the next time the course is given. Reregistration is a lower priority
class of applicants for a course, all students applying for the course the first time
have higher priority – this includes reserves too.
Thus, if you feel that you will not be done with the course on time, it is
better to stop the course at an early stage. If you register a break within three
weeks of the course start, you will be in the higher priority class of applicants
the next time you apply for the course. You can register such a break yourself
in the Student Portal.

14
References
[1] Association for Computing Machinery. Code of Ethics: ACM Code of Eth-
ics and Professional Conduct. Accessed on 4 April 2014. url: https :
//www.acm.org/about/code-of-ethics.
[2] Association for Computing Machinery. Software Engineering Code of Eth-
ics and Professional Practice. Accessed on 27 March 2019. url: https:
//ethics.acm.org/code-of-ethics/software-engineering-code/.
[3] Institute of Electrical and Electronics Engineers. IEEE Code of Ethics. Ac-
cessed on 4 April 2014. url: http://www.ieee.org/about/corporate/
governance/p7-8.html.
[4] Scott Shane and Mark Mazzetti. ‘Inside a 3-Year Russian Campaign to
Influence U.S. Voters’. en-US. In: The New York Times (Nov. 2018). issn:
0362-4331. url: https://www.nytimes.com/2018/02/16/us/politics/
russia-mueller-election.html (visited on 21/01/2019).
[5] Andrea Valdez. ‘Everything You Need to Know About Facebook and Cam-
bridge An alytica’. In: Wired (Mar. 2018). issn: 1059-1028. url: https:
/ / www . wired . com / story / wired - facebook - cambridge - analytica -
coverage/ (visited on 17/01/2019).
[6] Carole Cadwalladr and Emma Graham-Harrison. ‘Revealed: 50 million
Facebook profiles harvested for Cambridge Anal ytica in major data breach’.
en-GB. In: The Guardian (Mar. 2018). issn: 0261-3077. url: https://
www . theguardian . com / news / 2018 / mar / 17 / cambridge - analytica -
facebook-%20influence-us-election (visited on 17/01/2019).
[7] Matthew Rosenberg, Nicholas Confessore and Carole Cadwalladr. ‘How
Trump Consultants Exploited the Facebook Data of Millions ’. en-US.
In: The New York Times (Apr. 2018). issn: 0362-4331. url: https://
www.nytimes.com/2018/03/17/us/politics/cambridge-analytica-
trump-c%20ampaign.html (visited on 17/01/2019).
[8] Ishaan Tharoor. Analysis — The scary truth that Cambridge Analytica
under stands. en. 2018. url: https://www.washingtonpost.com/news/
worldviews/wp/2018/03/22/the-scary-tru%20th-that-cambridge-
analytica-understands/ (visited on 17/01/2019).
[9] Bruce Schneier. Lessons From the Dyn DDoS Attack - Schneier on Secur-
ity. 2016. url: https://www.schneier.com/blog/archives/2016/11/
lessons_from_th_5.html (visited on 17/01/2019).
[10] Dieter Gollmann. Computer Security. 3rd ed. Chichester, West Sussex,
U.K.: Wiley, 2011. isbn: 9780470741153 (pbk.)
[11] Ross J. Anderson. Security Engineering. A guide to building dependable
distributed systems. 2nd ed. Indianapolis, IN: Wiley, 2008. isbn: 978-0-470-
06852-6 (hbk.) url: http://www.cl.cam.ac.uk/~rja14/book.html.
[12] Sean Peisert and Matt Bishop. ‘How to Design Computer Security Exper-
iments’. In: Fifth World Conference on Information Security Education.
Ed. by Lynn Futcher and Ronald Dodge. Boston, MA: Springer US, 2007,
pp. 141–148. isbn: 978-0-387-73269-5.

15
[13] C. Herley and P. C. v. Oorschot. ‘SoK: Science, Security and the Elusive
Goal of Security as a Scientific Pursuit’. In: 2017 IEEE Symposium on
Security and Privacy (SP). May 2017, pp. 99–120. doi: 10 . 1109 / SP .
2017.38.
[14] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. Introduktion till metodstödet. Dec. 2011. url: http://www.
informationssakerhet.se.
[15] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. Säkra ledningens engagemang. Dec. 2011. url: http://www.
informationssakerhet.se.
[16] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. Projektplanering. Dec. 2011. url: http://www.informationssakerhet.
se.
[17] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. Gapanalys. Dec. 2011. url: http://www.informationssakerhet.
se.
[18] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. Välja säkerhetsåtgärder. Dec. 2011. url: http://www.informationssakerhet.
se.
[19] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. Utforma säkerhetsprocesser. Dec. 2011. url: http : / / www .
informationssakerhet.se.
[20] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. Utforma policy och styrdokument. Dec. 2011. url: http : / /
www.informationssakerhet.se.
[21] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. Planera genomförande. Dec. 2011. url: http://www.informationssakerhet.
se.
[22] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. Konstruera och anskaffa. Dec. 2011. url: http://www.informationssakerhet.
se.
[23] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. Införa. Dec. 2011. url: http://www.informationssakerhet.
se.

16
[24] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. Övervaka. Dec. 2011. url: http://www.informationssakerhet.
se.
[25] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. Granska. Dec. 2011. url: http://www.informationssakerhet.
se.
[26] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. Ledningens genomgång. Dec. 2011. url: http://www.informationssakerhet.
se.
[27] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. ‘Utveckla LIS och skyddet’. Dec. 2011. url: http : / / www .
informationssakerhet.se.
[28] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. ‘Kommunicera förbättringar’. Dec. 2011. url: http://www.
informationssakerhet.se.
[29] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. ‘Fortsatt arbete’. Dec. 2011. url: http://www.informationssakerhet.
se.
[30] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. Verksamhetsanalys. Dec. 2011. url: http://www.informationssakerhet.
se.
[31] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. Riskanalys. Dec. 2011. url: http://www.informationssakerhet.
se.
[32] Myndigheten för samhällsskydd och beredskap (MSB) och Riksarkivet.
Vägledning för processorienterad informationskartläggning. Tech. rep. Nov.
2012. url: https : / / riksarkivet . se / Media / pdf - filer / V % C3 %
A4gledning%20f%C3%B6r%20processorienterad%20informationskartl%
C3%A4ggning.pdf.
[33] Information and documentation – Management systems for records – Fun-
damentals and vocabulary. Standard. Available in Swedish from the library
in database “E-nav SIS standarder“. Geneva, CH: International Organiz-
ation for Standardization, Nov. 2011.
[34] Peter Eckersley. A Primer on Information Theory and Privacy. Jan. 2010.
url: https://www.eff.org/deeplinks/2010/01/primer-information-
theory-and-privacy.
[35] Daniel Ueltschi. ‘Chapter 6: Shannon entropy’. url: http://www.ueltschi.
org/teaching/chapShannon.pdf.

17
[36] Peter Eckersley. ‘How Unique Is Your Browser?’ In: Privacy Enhancing
Technologies. Springer. 2010, pp. 1–18. url: https : / / panopticlick .
eff.org/static/browser-uniqueness.pdf.
[37] Henk CA Van Tilborg and Sushil Jajodia. Encyclopedia of cryptography
and security. Springer Science & Business Media, 2011. url: https://
link.springer.com/referencework/10.1007%2F978-1-4419-5906-5.
[38] J. Camenisch, A. Lehmann and G. Neven. ‘Electronic Identities Need
Private Credentials’. In: IEEE Security Privacy 10.1 (Jan. 2012), pp. 80–
83. issn: 1540-7993. doi: 10.1109/MSP.2012.7.
[39] M. Z. Lee, A. M. Dunn, J. Katz, B. Waters and E. Witchel. ‘Anon-Pass:
Practical Anonymous Subscriptions’. In: IEEE Security Privacy 12.3 (May
2014), pp. 20–27. issn: 1540-7993. doi: 10.1109/MSP.2013.158.
[40] Daniel Bosk. ‘A high-level overview of cryptography’. Lecture. 2016. url:
https://github.com/OpenSecEd/appliedcrypto/releases/tag/v1.1.
[41] Sean Peisert and Matt Bishop. ‘How to Design Computer Security Ex-
periments’. In: Fifth World Conference on Information Security Educa-
tion: Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June
2007, United States Military Academy, West Point, New York, USA. Ed.
by Lynn Futcher and Ronald Dodge. Boston, MA: Springer US, 2007,
pp. 141–148. isbn: 978-0-387-73269-5. doi: 10.1007/978-0-387-73269-
5 _ 19. url: http : / / web . cs . ucdavis . edu / ~peisert / research /
Peisert-WISE2007-SecurityExperiments.pdf.
[42] Patrick Gage Kelley, Saranga Komanduri, Michelle L Mazurek, Richard
Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor
and Julio Lopez. ‘Guess again (and again and again): Measuring password
strength by simulating password-cracking algorithms’. In: Security and
Privacy (SP), 2012 IEEE Symposium on. IEEE. 2012, pp. 523–537. doi:
10.1109/SP.2012.38.
[43] Saranga Komanduri, Richard Shay, Patrick Gage Kelley, Michelle L. Mazurek,
Lujo Bauer, Christin Nicolas, Lorrie Faith Cranor and Serge Egelman.
‘Of passwords and people: Measuring the effect of password-composition
policies’. In: CHI. 2011. url: http://cups.cs.cmu.edu/rshay/pubs/
passwords_and_people2011.pdf.
[44] Richard Shay, Saranga Komanduri, Adam L Durity, Phillip Seyoung Huh,
Michelle L Mazurek, Sean M Segreti, Blase Ur, Lujo Bauer, Nicolas Christin
and Lorrie Faith Cranor. ‘Can long passwords be secure and usable?’ In:
Proceedings of the 32nd annual ACM conference on Human factors in
computing systems. ACM. 2014, pp. 2927–2936. url: http://lorrie.
cranor.org/pubs/longpass-chi2014.pdf.
[45] Elizabeth Stobert and Robert Biddle. ‘The Password Life Cycle’. In: ACM
Trans. Priv. Secur. 21.3 (Apr. 2018), 13:1–13:32. issn: 2471-2566. doi:
10.1145/3183341.
[46] Ambarish Karole, Nitesh Saxena and Nicolas Christin. ‘A comparative
usability evaluation of traditional password managers’. In: International
Conference on Information Security and Cryptology. Springer. 2010, pp. 233–
251.

18
[47] Alma Whitten and J Doug Tygar. ‘Why Johnny Can’t Encrypt: A Usab-
ility Evaluation of PGP 5.0.’ In: USENIX Security Symposium. Vol. 348.
1999.
[48] Steve Sheng, Levi Broderick, Colleen Alison Koranda and Jeremy J Hy-
land. ‘Why Johnny still can’t encrypt: Evaluating the usability of email en-
cryption software’. In: Symposium On Usable Privacy and Security. 2006,
pp. 3–4.
[49] Scott Ruoti, Jeff Andersen, Daniel Zappala and Kent Seamons. ‘Why
Johnny still, still can’t encrypt: Evaluating the usability of a modern PGP
client’. In: arXiv preprint arXiv:1510.08555 (2015).
[50] Amir Herzberg and Hemi Leibowitz. ‘Can Johnny finally encrypt?: evalu-
ating E2E-encryption in popular IM applications’. In: Proceedings of the
6th Workshop on Socio-Technical Aspects in Security and Trust. ACM.
2016, pp. 17–28.
[51] Bruce Schneier and John Kelsey. ‘Secure audit logs to support computer
forensics’. In: ACM Transactions on Information and System Security
(TISSEC) 2.2 (1999), pp. 159–176.
[52] Cynthia Dwork and Aaron Roth. ‘The Algorithmic Foundations of Dif-
ferential Privacy’. In: Foundations and Trends® in Theoretical Com-
puter Science 9.3–4 (2014), pp. 211–407. issn: 1551-305X. doi: 10.1561/
0400000042. url: http://dx.doi.org/10.1561/0400000042.
[53] Raghavendran Balu, Teddy Furon and Sébastien Gambs. ‘Challenging Dif-
ferential Privacy: The Case of Non-interactive Mechanisms’. In: Computer
Security — ESORICS 2014 — 19th European Symposium on Research in
Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
Part II. 2014, pp. 146–164. doi: 10.1007/978-3-319-11212-1_9. url:
http://dx.doi.org/10.1007/978-3-319-11212-1_9.
[54] Mohammad Alaggan, Sébastien Gambs and Anne-Marie Kermarrec. ‘Private
Similarity Computation in Distributed Systems: From Cryptography to
Differential Privacy’. In: Principles of Distributed Systems - 15th Inter-
national Conference, OPODIS 2011, Toulouse, France, December 13-16,
2011. Proceedings. 2011, pp. 357–377. doi: 10.1007/978-3-642-25873-
2_25. url: http://dx.doi.org/10.1007/978-3-642-25873-2_25.
[55] Mohammad Alaggan, Sébastien Gambs and Anne-Marie Kermarrec. ‘BLIP:
Non-interactive Differentially-Private Similarity Computation on Bloom
filters’. In: Stabilization, Safety, and Security of Distributed Systems - 14th
International Symposium, SSS 2012, Toronto, Canada, October 1-4, 2012.
Proceedings. 2012, pp. 202–216. doi: 10.1007/978-3-642-33536-5_20.
url: http://dx.doi.org/10.1007/978-3-642-33536-5_20.
[56] Úlfar Erlingsson, Vasyl Pihur and Aleksandra Korolova. ‘RAPPOR: Ran-
domized Aggregatable Privacy-Preserving Ordinal Response’. In: Proceed-
ings of the 2014 ACM SIGSAC Conference on Computer and Communica-
tions Security. CCS ’14. Scottsdale, Arizona, USA: ACM, 2014, pp. 1054–
1067. isbn: 978-1-4503-2957-6. doi: 10 . 1145 / 2660267 . 2660348. url:
http://doi.acm.org/10.1145/2660267.2660348.

19
[57] Giulia Fanti, Vasyl Pihur and Úlfar Erlingsson. ‘Building a RAPPOR
with the unknown: Privacy-preserving learning of associations and data
dictionaries’. In: Proceedings on Privacy Enhancing Technologies 2016.3
(2016), pp. 41–61.
[58] G. McGraw. ‘Four Software Security Findings’. In: Computer 49.1 (Jan.
2016), pp. 84–87. issn: 0018-9162. doi: 10.1109/MC.2016.30.
[59] Daniel Genkin, Itamar Pipman and Eran Tromer. ‘Get your hands off my
laptop: physical side-channel key-extraction attacks on PCs’. In: Journal
of Cryptographic Engineering 5.2 (June 2015), pp. 95–112. issn: 2190-
8516. doi: 10.1007/s13389-015-0100-7.
[60] Daniel Genkin, Adi Shamir and Eran Tromer. ‘RSA Key Extraction via
Low-Bandwidth Acoustic Cryptanalysis’. In: Advances in Cryptology –
CRYPTO 2014. Ed. by JuanA. Garay and Rosario Gennaro. Vol. 8616.
Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2014,
pp. 444–461. isbn: 978-3-662-44370-5. doi: 10.1007/978-3-662-44371-
2_25. url: http://dx.doi.org/10.1007/978-3-662-44371-2_25.
[61] Daniel Genkin, Lev Pachmanov, Itamar Pipman and Eran Tromer. ‘Steal-
ing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on
Windowed Exponentiation’. In: Cryptographic Hardware and Embedded
Systems – CHES 2015. Ed. by Tim Güneysu and Helena Handschuh. Ber-
lin, Heidelberg: Springer Berlin Heidelberg, 2015, pp. 207–228. isbn: 978-
3-662-48324-4.
[62] D Graffox. IEEE Citation Reference. Sept. 2009. url: http://www.ieee.
org/documents/ieeecitationref.pdf.
[63] Joshua M. Paiz, Elizabeth Angeli, Jodi Wagner, Elena Lawrick, Kristen
Moore, Michael Anderson, Lars Soderlund, Allen Brizee and Russell Keck.
In-Text Citations: The Basics. Nov. 2013. url: https://owl.english.
purdue.edu/owl/owlprint/560/.

20

You might also like