0% found this document useful (0 votes)
183 views25 pages

CSE 477: Introduction To Computer Security: Lecture - 1

This document outlines an introduction to computer security course, including motivations for computer security such as the growth of internet users and e-commerce as well as a timeline of important security events from password protection in the 1960s to recent computer worms and data breaches. The course will cover basic security concepts, properties, attacks, failures, and solutions through lectures on topics like information, web, network, physical, and device security.

Uploaded by

GOLAP HOSSAIN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
183 views25 pages

CSE 477: Introduction To Computer Security: Lecture - 1

This document outlines an introduction to computer security course, including motivations for computer security such as the growth of internet users and e-commerce as well as a timeline of important security events from password protection in the 1960s to recent computer worms and data breaches. The course will cover basic security concepts, properties, attacks, failures, and solutions through lectures on topics like information, web, network, physical, and device security.

Uploaded by

GOLAP HOSSAIN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

CSE 477: Introduction to

Computer Security
Lecture – 1

Course Teacher: Dr. Md Sadek Ferdous


Assistant Professor, CSE, SUST
E-mail: [email protected]
Outline
• Motivations
• Course Information
• Basic concepts
Outline
• Motivations
• Course Information
• Basic concepts
• Security properties
• Security attacks
• Security failure & secure solutions
Motivations
• Currently around 4.77 billions of mobiles and increasing
• Around 4 billions of Internet users
• Around 320 millions of domain names
• Around $2300 billions of retail e-commerce sales and growing
• Almost all spheres of our lives are somehow dependent on the
Internet and different web services
• Mostly in developed countries, developing nations are catching up
• This trend will continue to grow
Motivations
Motivations
Motivations
Motivations
Motivations
Mirai Botnet

https://www.corero.com/img/Diagrams/mirai-botnet-ddos-attack.jpg https://www.incapsula.com/blog/wp-content/uploads/2016/10/mirai-botnet-map.png
Motivations

Source:
Source: https://i1.wp.com/securityaffairs.co/wordpress/wp-
https://storify.com/services/proxy/2/WJZ_9tf1AVAiKovh3
content/uploads/2014/04/heartbleed-SSL-scan-results.jpg
3lUA/http/pbs.twimg.com/media/Bk7vrLqIgAArRrS.jpg
Motivations

Source: http://www.asuamaytinh.com/wp-content/uploads/2017/05/virus-
wanna-cry-la-gi-cach-phong-chong-ra-sao-1888-660x330.jpg
Historical timeline - 1
Security timeline, part 1 Security timeline, part 2
Security attacks begin in 1950s and security 1975 Unix-Unix copy protocol (UUCP) and mail
mechanisms were designed for operating systems since trapdoors
the beginning. Early attackers were near the machines. 1976 Public-key cryptography and digital signatures
Now the Internet allows millions of anonymous 1978 RSA public-key cryptosystem.
attackers to target any connected system. “White-hats” 1978 First vulnerability study of passwords
and “black-hats” are in an arms race... (intelligent search).
1960 Memory protection hardware: partitioning, 1978 E-cash protocols invented by David Chaum.
virtual memory. 1983 Distributed domain naming system (DNS),
1962 File access controls in multiple-access systems. vulnerable to spoofing.
1967 One-way functions to protect passwords. 1984 Viruses receive attention of researchers.
1968 Multics security kernel (BLP model) 1985 Advanced password schemes.
1969–89 ARPANET † Internet; TCP/IP in 1977. 1986 Wily hacker attack (Clifford Stoll’s “Stalking...”)
Infamously, ARPANET was built to withstand nuclear 1988 Internet Worm: 6,000 computers (10% of
attack but was nearly crippled in 1988 by the Morris Internet).
Internet Worm. ARPANET assumed centralised 1988 Distributed authentication realised in Kerberos.
administration which no longer applies in the Internet: 1989 Pretty Good Privacy (PGP) and Privacy
a dramatic example of a change in environment Enhanced Mail (PEM).
invalidating security.

Source: http://www.inf.ed.ac.uk/teaching/courses/cs/0910/lecs/intro.pdf
Security timeline, part 3
Historical timeline - 2
1990 Anonymous remailers (protocols prevent
tracing).
1993 Packet spoofing; firewalls; network sniffing.
1994 Netscape designs SSL v1.0 (revised 1995).
1996 SYN flooding. Java exploits. Web-site hacking.
1997 DNSSec security extension for DNS proposed.
1998 Script kiddies’ scanner tools. IPSec proposals.
1999 First DDoS attacks. DVD encryption broken
2000 VBscript worm ILOVEYOU (0.5 – 8 million
infections). Cult of the Dead Cow’s Back Orifice
2000 Trojan.
Source: http://www.inf.ed.ac.uk/teaching/courses/cs/0910/lecs/intro.pdf
Historical timeline
Security - 34
timeline, part
2001 Code Red, Nimbda worm infects Microsoft IIS.
2002 Palladium; chipped XBox blocked from online
play.
2003 W32/Blaster worm. Debian and FSF are cracked.
2004 First mobile phone virus Cabir
2005 Flaws in SHA-1. Sony’s “rootkit” with broken
DRM.
2006 RFID cracks.
Microsoft Vista released; vulnerabilities
discovered.
2007 Data breaches: TJX Inc (94m), UK HMRC (24m).
iPhone released & cracked.
2008 Kaminsky discovers major DNS flaws. CIA
reports power utility cyber-extortion. Oyster
Cards cloned and UK e-passports faked.

Source: http://www.inf.ed.ac.uk/teaching/courses/cs/0910/lecs/intro.pdf
HistoricalSecurity
timeline - 4part 5
timeline,

2009 Conficker virus


iPhone worm
DoS attacks on social networks (Twitter,
Facebook)
Numerous data breaches
Hacktivism
TJX Hacker indicted
BT & Phorm
“Privacy” at Facebook, Google, . . .
Cloud computing
...

Source: http://www.inf.ed.ac.uk/teaching/courses/cs/0910/lecs/intro.pdf
Outline
• Motivations
• Course Information
• Basic concepts
• Security properties
• Security attacks
• Security failure & secure solutions
What is computer security?
• Computer security is the protection of computer systems
• operating in adversarial environments
• with possible adversaries
• Protection aims to:
• allow intended use
• prevent unintended use
What is computer security?
The security problem
The security problem
• Confidentiality
• Integrity
|tries to break |in
• Availability
|= having
|= security properties
• Authenticity
• Anonymity
• Personal motivation • ….
I - security policy I - security policy
(Ex e.g.
spouse/employee)
confidentiality, integrity, availability, authenticity,
e.g. confidentiality, anonymity,
integrity, availability, ...
authenticity, anonymity, . . .

• Financial
I
motivation
I system
- computer - computer system
• Political motivation
I I
- attacker model - attacker model
e.g personal motivation
e.g(spouse or motivation
personal boss), financial motivation
(spouse or boss), financial motivation

• In this course
(pharmaceutical, credit(pharmaceutical,
activists), . . .
card theft), political
activists), . . .
credit card theft),(governments,
motivation political motivation (governments,

• why systems are insecure?


9 / 19 9 / 19

• how to make them secure?


Course Information
Security

Physical Device
Information Web Network
Security Security

Source: https://d2gg9evh47fn9z.cloudfront.net/800px_COLOURBOX18770823.jpg
Source: http://itak.iaitam.org/wp-content/uploads/sites/2/2015/06/Can-Mega-Data-Breaches-
be-Prevented-%E2%80%93-What-ITAM-Can-Learn-from-Target-and-Home-Depot.jpg
Course Information
• Brief introduction to Computer Security
• Physical Security
• Operating System Security
• Basic crypto & Security Protocols
• Internet and network security
• Web and email security
• Malware
• Bitcoin (if time permits)
• Will not cover
• Deep mathematical study of modern cryptography
• However, basic cryptography will be covered
Assessment (tentative)
• Class Attendance: 10%
• Homework + Assignment: 5%
• Term Test: 15%
• Final exam: 70%
Resources
• Textbook
• Introduction to Computer Security - Michael Goodrich & Roberto Tamassia,
First Edition
• Additional Resources:
• Introduction to Computer Security – Matt Bishop
• Handbook of Applied Cryptography - Alfred J. Menezes, Paul C. van Oorschot
and Scott A. Vanstone. http://cacr.uwaterloo.ca/hac/
• Additional research papers will be supplied throughout the course
Advisory: Ethical code of conduct
• With great power comes great responsibility!
• Course materials and knowledge gained in this course should not be considered
as an incitement to crack!
• Breaking into system to demonstrate security problems might cause irreversible
damages to many innocent users and might lead to prosecution!
• If you spot a security hole in a running system, don’t exploit it, instead consider
contacting the relevant administrators confidentially
• Sysadmins might not act quickly as it is difficult to keep up with latest security
patches
• Especially true in the university setting:
• traditional approach: open access above security,
• resources for sysadmin are very tight
Advisory: Ethical code of conduct
• If you want to experiment with security holes, play with your own machine,
in your own private network of machines.
• e.g. using a form of virtualisation: e.g., VMWare, Virtual Box, etc.
• If you discover a new security hole in a standard and popular application,
or operating system
• consider contacting the vendor of the software/OS in the first case
• consider suggesting a fix, if you can
• You might also raise the issue in a security forum for discussion
• without providing complete details of the hole
• The software vendor or other security experts will be able to confirm or
deny, and work can begin on fixing the problem
Google classroom code

You might also like