Professional Documents
Culture Documents
Outline
Administrative Issues Class Overview Information Assurance Overview
Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational Issues Human Issues
Reading
For this lecture:
First Chapter of Computer Security: Art and Science
Administrivia
Instructor
Nikita Borisov
Communications
Class web page http://www.cs.uiuc.edu/class/sp07/cs498ia Newsgroup class.cs498ia
Office Hours:
TBA
Grades
2 midterms 1 final approx. bi-weekly homeworks extra project for graduate students taking IA4
Grading Scheme
IA3 Midterms Final Homeworks Project 20% each 40% 20% N/A IA4 15% each 30% 15% 25%
Cryptography
Math 595/ECE 559
Reading Group
Listed as CS591rhc Student lead group. Reads and discusses current security research papers.
Write on Card
1. Your name & netid 2. Your year (if undergrad) or advisor (if grad) 3. 400- & 500- level courses youve taken 4. Why youre interested in computer security
Time Lag
Internet is 35 years old
Was designed without security provisions
Important Events
Morris worm - 1988
Brought down a large fraction of the Internet Academic interest in network security
Class Topics
Introduction and motivation Security Policies: Access Control Matrix, Confidentiality and integrity policies Trusted Operating Systems Risk Analysis Legislation and security Applied Cryptography: basic crypto, key management, cipher techniques, authentication Network security mechanisms Legal and ethical issues in security Security design principles, assurance techniques, Auditing System evaluation Code vulnerabilities and malicious programs Physical security EMSEC Hardware-enforced security
Basic Components
Confidentiality
Keeping data and resources hidden
Integrity
Data integrity (integrity) Origin integrity (authentication)
Availability
Enabling access to data and resources
Classes of Threats
Disclosure
Snooping
Deception
Modification, spoofing, repudiation of origin, denial of receipt
Disruption
Modification
Usurpation
Modification, spoofing, delay, denial of service
Types of Attackers
Unskilled hacker (script-kiddie) Skilled hacker Organized crime Nation-states
Goals of Security
Prevention
Prevent attackers from violating security policy
Detection
Detect attackers violation of security policy
Recovery
Stop attack, assess and repair damage Continue to function correctly even if attack succeeds
Mechanisms
Assumed to enforce policy Support mechanisms work correctly
Login Program
check_password(user, pass) { if (user = ken and password = xyzzy) { return OK } ... }
Compiler Program
compile(source) { if (match(source, check_password)) { insert(source, A) } ... }
Compiler Program
B
Compiler Program
compile(source) { if (match(source, check_password)) { insert(source, A) } B if (match(source, compile)) { insert(source, B); } ... }
Types of Mechanisms
secure
precise
broad
Assurance
Specification
Requirements analysis Statement of desired functionality
Design
How system will meet specification
Implementation
Programs/systems that carry out design
Operational Issues
Cost-Benefit Analysis
Is it cheaper to prevent or recover?
Risk Analysis
Should we protect something? How much should we protect this thing?
Human Issues
Organizational Problems
Power and responsibility Financial benefits
People problems
Outsiders and insiders Social engineering
Tying Together
Threats Policy Specification Design Implementation Operation Information
Key Points
Policy defines security, and mechanisms enforce security
Confidentiality Integrity Availability