Computer Security DD2395 - KTH€¦ · Learning Outcomes The students should be able to: •...

30
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/DD2395/dasakh11/ Fall 2011 Sonja Buchegger [email protected] Lecture 14, Dec. 7, 2011 Final Lecture 12/7/11 1 Computer Security, Sonja Buchegger

Transcript of Computer Security DD2395 - KTH€¦ · Learning Outcomes The students should be able to: •...

Page 1: Computer Security DD2395 - KTH€¦ · Learning Outcomes The students should be able to: • recognize threats to confidentiality, integrity, and availability of systems; explain

Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/DD2395/dasakh11/

Fall 2011 Sonja Buchegger

[email protected]

Lecture 14, Dec. 7, 2011 Final Lecture

12/7/11 1 Computer Security, Sonja Buchegger

Page 2: Computer Security DD2395 - KTH€¦ · Learning Outcomes The students should be able to: • recognize threats to confidentiality, integrity, and availability of systems; explain

12/7/11 Computer Security, Sonja Buchegger 2

Outline for Today

l  About the course: recap, goals, topics, exam, next steps

l  Questions from the first survey l  Relevance in the future

Page 3: Computer Security DD2395 - KTH€¦ · Learning Outcomes The students should be able to: • recognize threats to confidentiality, integrity, and availability of systems; explain

12/7/11 Computer Security, Sonja Buchegger 3

General Goals

l  Learn about security concepts l  Have tools and methods to reason about

security l  Spot threats, vulnerabilities l  Know and propose counter-measures l  Present concepts to others

Page 4: Computer Security DD2395 - KTH€¦ · Learning Outcomes The students should be able to: • recognize threats to confidentiality, integrity, and availability of systems; explain

12/7/11 Computer Security, Sonja Buchegger 4

Learning Outcomes

The students should be able to: •  recognize threats to confidentiality, integrity, and availability of systems; explain the

basic computer security terminology and concepts and use them correctly

•  Throughout + principles

•  find and apply documentation of security-related problems and tools Labs

•  analyze small pieces of code or system descriptions in terms of their security, identify vulnerabilities of such code or descriptions and predict their corresponding threats

•  Labs, buffer overflows, viruses

•  select counter-measures to identified threats and argue their effectiveness, compare counter-measures and evaluate their side-effects; present and explain their reasoning to others, in class e.g. IDS, FW, SW Eng., seminars, labs

Page 5: Computer Security DD2395 - KTH€¦ · Learning Outcomes The students should be able to: • recognize threats to confidentiality, integrity, and availability of systems; explain

12/7/11 Computer Security, Sonja Buchegger 5

Syllabus: Lectures Content

l  L1: intro, admin l  L2: cryptography l  L3: authentication l  L4: access control l  L5: web attacks l  L6: malware l  L7: DoS

l  L8: firewalls, MLS l  L9: social engineering l  L10: buffer overflows l  L11: models, MLS l  L12: audits l  L13: programming l  L14: recap

Page 6: Computer Security DD2395 - KTH€¦ · Learning Outcomes The students should be able to: • recognize threats to confidentiality, integrity, and availability of systems; explain

12/7/11 Computer Security, Sonja Buchegger 6

Syllabus: Lectures Content

l  Concepts: intro, principles l  Prevention:

l  cryptography l  authentication l  access control l  web attacks l  firewalls, MLS l  buffer overflows l  secure programming

l  Detection: l  DoS l  intrusion detection l  malware l  audits

l  Response l  human factors, policies l  more prevention

Page 7: Computer Security DD2395 - KTH€¦ · Learning Outcomes The students should be able to: • recognize threats to confidentiality, integrity, and availability of systems; explain

12/7/11 Computer Security, Sonja Buchegger 7

Syllabus: Lab Exercises

l  PERIOD 3 FOR BACHELOR’S STUDENTS l  See timeedit schema for times and rooms l  4 different exercises, similar to p2, some

changes -  1st: on GnuPG, remote or at CSC -  2nd: on iptables/firewalls, at CSC -  3rd: on web attacks, remote or at CSC -  4th: presentation at CSC, report, assess

Page 8: Computer Security DD2395 - KTH€¦ · Learning Outcomes The students should be able to: • recognize threats to confidentiality, integrity, and availability of systems; explain

12/7/11 Computer Security, Sonja Buchegger 8

Exercise 4

l  Presentation and demo on computer security topic in a seminar

l  Groups of 2-3 students l  Topic distribution on web site l  Group seminars, schedule in schema, signup

on course website

Page 9: Computer Security DD2395 - KTH€¦ · Learning Outcomes The students should be able to: • recognize threats to confidentiality, integrity, and availability of systems; explain

12/7/11 Computer Security, Sonja Buchegger 9

Exam

l  January 10, 2012 l  Re-exam in June 2012 l  No registration needed, just show up

Page 10: Computer Security DD2395 - KTH€¦ · Learning Outcomes The students should be able to: • recognize threats to confidentiality, integrity, and availability of systems; explain

12/7/11 Computer Security, Sonja Buchegger 10

Assessment, Grades

l  6 ECTS in total, that’s about 160 hours of work l  3 ECTS Exam: A-F l  3 ECTS Labs:

-  pass/fail, no grades -  bonus points for overall grade (exam points) when

handed in early, see lab descriptions

Page 11: Computer Security DD2395 - KTH€¦ · Learning Outcomes The students should be able to: • recognize threats to confidentiality, integrity, and availability of systems; explain

12/7/11 Computer Security, Sonja Buchegger 11

Books: Exam-Relevant Chapters

Page 12: Computer Security DD2395 - KTH€¦ · Learning Outcomes The students should be able to: • recognize threats to confidentiality, integrity, and availability of systems; explain

12/7/11 Computer Security, Sonja Buchegger 12

Next Courses

l  Networking Security with Johan Karlander, CSC l  Foundations of Cryptography with Douglas

Wikström, CSC l  Software Security with Dilian Gurov, CSC l  Networking and Systems Security with Panos

Papadimidratos, EES

Page 13: Computer Security DD2395 - KTH€¦ · Learning Outcomes The students should be able to: • recognize threats to confidentiality, integrity, and availability of systems; explain

12/7/11 Computer Security, Sonja Buchegger 13

Course Analysis

l  Questionnaire up after exam results l  Another after labs in p3

Page 14: Computer Security DD2395 - KTH€¦ · Learning Outcomes The students should be able to: • recognize threats to confidentiality, integrity, and availability of systems; explain

12/7/11 Computer Security, Sonja Buchegger 14

Questions for you:

my experience, knowledge

my expectations

My most important question about the course:

My most important question about computer security:

LOW HIGH

HIGH

Page 15: Computer Security DD2395 - KTH€¦ · Learning Outcomes The students should be able to: • recognize threats to confidentiality, integrity, and availability of systems; explain

12/7/11 Computer Security, Sonja Buchegger 15

Questions?

•  How can you be sure that you’ve eliminated every possibility of your program/network/system being hacked?

•  How do I make a WLAN secure? •  Knowing how vulnerabilities are introduced and

exploited so that programmes can avoid making the same mistake.

•  Does it go through modern threats?

Page 16: Computer Security DD2395 - KTH€¦ · Learning Outcomes The students should be able to: • recognize threats to confidentiality, integrity, and availability of systems; explain

12/7/11 Computer Security, Sonja Buchegger 16

Questions II

•  What is the patronus of Comp. Sci.? •  What will this be worth for if I start a small

business? •  How is it practiced in reality? •  How to protect a system •  Can I succeed with the free literature? •  What’s the most dangerous/serious security

problem that computer systems face?

Page 17: Computer Security DD2395 - KTH€¦ · Learning Outcomes The students should be able to: • recognize threats to confidentiality, integrity, and availability of systems; explain

Questions III

•  Web attacks used on existing systems, SQL injects and other basic techniques

•  How do I become Voldemort? •  How secure are most companies that handle

personal information e.g. Sony? •  What signifies a good security system? •  Is there a way to know if your program is 100%

secure?

12/7/11 Computer Security, Sonja Buchegger 17

Page 18: Computer Security DD2395 - KTH€¦ · Learning Outcomes The students should be able to: • recognize threats to confidentiality, integrity, and availability of systems; explain

Questions IV

•  Is it true that AV companies create viruses? •  How do I detect flaws in my own code? •  When does the Narwhale bacon? •  Will the first book cover everything on the

exam? •  Iptables and web security •  Will any of the labs be useful for the exam?

12/7/11 Computer Security, Sonja Buchegger 18

Page 19: Computer Security DD2395 - KTH€¦ · Learning Outcomes The students should be able to: • recognize threats to confidentiality, integrity, and availability of systems; explain

Questions VI

•  Why is everyone ignoring HW security? •  Can we stop quant computers from breaking

in? •  When will you notice that I hacked you while

you held this presentation? •  Will I be able to hack [redacted]? •  Is there a master password for CSC? •  Which are the most common attacks I should

know about? 12/7/11 Computer Security, Sonja Buchegger 19

Page 20: Computer Security DD2395 - KTH€¦ · Learning Outcomes The students should be able to: • recognize threats to confidentiality, integrity, and availability of systems; explain

Relevance for You

•  Which parts of what you learned about computer security in this course do you anticipate to use in the future?

•  What can you use as a private person? •  What about your professional life? •  Any new-years resolutions for security? Think and discuss!

12/7/11 Computer Security, Sonja Buchegger 20

Page 21: Computer Security DD2395 - KTH€¦ · Learning Outcomes The students should be able to: • recognize threats to confidentiality, integrity, and availability of systems; explain

As a User

•  Personally, or in an organization •  Authentication, passwords, roles •  Social engineering •  Policies •  Firewalls, intrusion detection on your own machine •  Online behavior •  Crypto

12/7/11 Computer Security, Sonja Buchegger 21

Page 22: Computer Security DD2395 - KTH€¦ · Learning Outcomes The students should be able to: • recognize threats to confidentiality, integrity, and availability of systems; explain

As System Administrator

•  Or consultant •  Policies •  Placement/configuration of firewalls, IDS, etc. •  Processes •  Audits, logging •  Rights management, AC systems •  User training

12/7/11 Computer Security, Sonja Buchegger 22

Page 23: Computer Security DD2395 - KTH€¦ · Learning Outcomes The students should be able to: • recognize threats to confidentiality, integrity, and availability of systems; explain

As Manager, Entrepreneur

•  Resource allocation, how much to spend on what kind of security

•  Processes/policies •  User training •  Audits, certification •  Client relations, secure data, availability

12/7/11 Computer Security, Sonja Buchegger 23

Page 24: Computer Security DD2395 - KTH€¦ · Learning Outcomes The students should be able to: • recognize threats to confidentiality, integrity, and availability of systems; explain

As Developer

•  Programmer, SW architect, tester, quality assurance •  Operating system specifics •  Programs, web applications •  Principles for design •  Programming language specifics •  Input checking, output checking, libraries, etc. •  Memory management

12/7/11 Computer Security, Sonja Buchegger 24

Page 25: Computer Security DD2395 - KTH€¦ · Learning Outcomes The students should be able to: • recognize threats to confidentiality, integrity, and availability of systems; explain

As Researcher

•  At a university or in industry •  Attacks/defense (e.g. web attacks) •  Usability v. security •  Crypto (new algorithms, cryptanalysis, new

applications) •  Privacy Enhancing Technology •  Computer Forensics

12/7/11 Computer Security, Sonja Buchegger 25

Page 26: Computer Security DD2395 - KTH€¦ · Learning Outcomes The students should be able to: • recognize threats to confidentiality, integrity, and availability of systems; explain

Topics Wishlist

•  What topics would you like to know more about?

•  Think, discuss, call out or e-mail to [email protected]

12/7/11 Computer Security, Sonja Buchegger 26

Page 27: Computer Security DD2395 - KTH€¦ · Learning Outcomes The students should be able to: • recognize threats to confidentiality, integrity, and availability of systems; explain

CSC honor code, plus:

Defense Against the Dark Arts: Do not attack a running system

without the consent of the owner and the users!

12/7/11 Computer Security, Sonja Buchegger 27

Page 28: Computer Security DD2395 - KTH€¦ · Learning Outcomes The students should be able to: • recognize threats to confidentiality, integrity, and availability of systems; explain

12/7/11 Computer Security, Sonja Buchegger 28

More Questions!

l  How hard is it to hack a WPA-2 encrypted WiFi l  How do the AV programs actually block

different types of attacks? l  What will be the biggest security issue in the

future? l  How do I secure remote patching services from

corruption?

Page 29: Computer Security DD2395 - KTH€¦ · Learning Outcomes The students should be able to: • recognize threats to confidentiality, integrity, and availability of systems; explain

12/7/11 Computer Security, Sonja Buchegger 29

Still More Questions!

l  Why does protection feel too irrelevant to people and why to change attitudes

l  Wow would my security knowledge compare to real-world security experts after finishing this course?

l  Is the SSL certificate authority model fundamentally broken?

l  Will legal issues be covered?

Page 30: Computer Security DD2395 - KTH€¦ · Learning Outcomes The students should be able to: • recognize threats to confidentiality, integrity, and availability of systems; explain

12/7/11 Computer Security, Sonja Buchegger 30

Oh, More Questions!

l  What are the necessary settings to adjust for a Linux server connected to the Internet for a long period of time without an external firewall?

l  Will we write an automat designed to launch sequential attacks on a subsystem to cripple the main system or will we primarily perform all attacks manually?

l  Will it blend?