01 Intro
01 Intro
A warm welcome!
§ Who we are
§ Organizational matters
§ Content of this lecture
1
3761
§ Contact: [email protected]
3
3761
§ Contact: [email protected]
4
3761
§ Contact: [email protected]
5
3761
§ Contact: [email protected]
6
3761
Organizational Matters
3761
Lectures
§ No lectures
- November 28 (ACM CCS, many CISPA people will attend the conference)
- First week of January 2024 (Christmas break)
§ Regularly check the course webpage for updates
- https://cms.cispa.saarland/sec2324/
- There is [email protected] - subscribe via
https://lists.cispa.saarland/listinfo/teaching-announce
9
3761
Lecture Schedule
Mitigations and
Web Security (GP) Summary + Q&A
Hardening
2 lectures 1 lecture
2 lectures
https://cms.cispa.saarland/sec2324/4/Lecture_Schedule 10
3761
Exercises
11
3761
Tutorials
§ Once you are assigned to a tutor, feel free to contact them with questions (or
use Askbot)
12
3761
Askbot
13
3761
14
3761
Exam Preparation
§ There will be a final exam (and re-exam) that determines 100% of your
grade
- Passing 50% of exercise points is necessary, but likely not sufficient to pass
the exam
Lecture Recordings
§ Watching lecture videos and reading the books does not mean that you
should not attend the lecture
- Studies have shown that attendance is a key to better understanding
16
3761
Course Books
17
3761
Further Reading
18
3761
Quizzes
19
3761
Quiz time!
B: Robert Morris
C: Beto O’Rourke
20
3761
Quiz time!
Source:
https://en.wikipedia.org/wiki/Robert_Tappan_Morris
21
3761
22
3761
Dislike something?
23
3761
Office Hours
24
3761
Motivation
25
3761
27
3761
https://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
28
3761
29
3761
What is Security?
3761
What is Security?
§ Proof by falsification
- Security can only be proven with respect to an attacker model
- Security can only be falsified by finding a successful attack
§ In practice …
- Security is not a binary value, but also other factors need to be taken into
account
- Threat models that are considered relevant by designers of security
technology are often different to those that matter in reality
3761
What is Privacy?
32
3761
What is Privacy?
§ Privacy is …
- “the ability of an individual to shield themselves (or information about
themselves) and thereby selectively express themselves”
- a human right
- a cultural/societal/legal/political concept (and not so much only a technical
one)
33
3761
What is Anonymity?
34
3761
What is Anonymity?
§ Anonymity != Privacy
§ Identity cannot be identified
35
3761
What is Hacking?
3761
What is Hacking?
Ethics
§ Use your skills responsibly – just because you are capable of doing
something, it does not mean that you should
§ As a computer scientist, please be aware of the societal implications of …
- the technology you build (exploits, ML/AI, autonomous systems, …)
- the damage you are causing when attacking a system (cf. ransomware in
hospitals)
38
3761
https://www.ccc.de/en/hackerethics
39
3761
40
3761
Legal Aspects
Topics
3761
Software Security
3761
Secure Communications
3761
Authentication
3761
Anti-Censorship
47
3761