Security Basics and Course
Security Basics and Course
Overview
Introduction and overview
What is computer/network security? Why is it
important?
Course philosophy and goals
Course organization and information
High-level overview of topics
Strong cryptography
Firewalls, intrusion detection, virus scanners
Buffer overflow detection/prevention
User education
Really??!
Security incidents (reported)
Philosophy of this course
We are not going to be able to cover everything
– We are not going to be able to even mention everything
Main
Yougoals
will not be a security expert after this class
– A sampling
(after thisofclass,
manyyou shouldaspects
different realizeof
why it
security
would be
– The security dangerous to think you are)
“mindset”
– Become familiar with basic acronyms (RSA, SSL, PGP,
etc.), and “buzzwords” (phishing, …)
You should have a better appreciation of security
– Become an educated security
issues after this consumer
class
– Try to keep it interesting with real-world examples and
“hacking” projects
Course Organization
Administrative
Me
TA
Contact information, office hours, listed on course
webpage
Course webpage
http://www.cs.umd.edu/~jkatz/security/f09
Syllabus
– Subject to change…
– Slides will be posted for convenience, but they are not
a substitute for attending lecture
– Assigned readings
Homeworks distributed from the course webpage
Check frequently for announcements
Course blog
http://cmsc414.wordpress.com
I will post after each lecture
– Students can post questions/comments about the lecture
– Today: post a “hello” message, and answer the
question: “What do you hope to get from the course?”
I will post for each homework
– Students can post questions
I will post links to interesting news articles,
papers, etc.
Textbook
Recommended text:
– “Network Security…” by Kaufman, Perlman, and
Speciner (most recent edition)
Class participation and readings
Research papers and news articles will be posted
on the course webpage
– Read these before class and come prepared to discuss
Material from these readings is fair game for the
exams, even if not covered in class
password
In reality…
Where does security end?
password
forgot password?
One good attack
Use public records to figure out someone’s
password
– Or, e.g., their SSN, so can answer security question…
The problem is not (necessarily) that SSNs are
public
The problem is that we “overload” SSNs, and use
them for more than they were intended