Systems and Network Security CSE
628/628A
Sandeep K. Shukla
Indian Institute of Technology Kanpur
Module 0.1: Introduction
Introduction to the context
and landscape
Acknowledgements
Dan Boneh (Stanford University)
John C. Mitchell (Stanford University)
Nicolai Zeldovich (MIT)
Jungmin Park (Virginia Tech)
Patrick Schaumont (Virginia Tech)
Web Resources
The computer security
Two factors: problem
Lots of buggy software (and gullible users)
Money can be made from finding and exploiting
vulns.
1. Marketplace for vulnerabilities
2. Marketplace for owned machines (PPI)
3. Many methods to profit from owned client machines
current state of computer security
Vulnerabilities Galore
Zero Day Vulnerabilities in last 3 yearsFor real time map
https://cybermap.kaspersky.com
Data: http://cve.mitre.org/
Source: Symantec Report
Mobile malware (Nov. 2013 Oct. 2014)
date
he rise of mobile banking Trojans (Kaspersky Security Bulletin 201
% in Mobile OS targeted by Financial Malware
2015 vs 2016