Top Banner
1 Binghamton University History of Computer Security CS 458/558: Introduc1on to Computer Security 1 st Lecture Instructor: Guanhua Yan
42

Lecture 1 - History of Computer Security

Nov 10, 2015

Download

Documents

wsanders2

Computer Security Lecture Slides - binghamton university, Prof Guanhua Yan
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 1

    Binghamton University

    History of Computer Security CS 458/558: Introduc1on to Computer Security 1st Lecture

    Instructor: Guanhua Yan

  • 2

    Binghamton University

    Thanks for showing up in class!

  • 3

    Binghamton University

    Survey

  • 4

    Binghamton University

    Lets be honest What have you heard about this class from the students taking this class last fall? A: Boring B: Interes1ng C: Dicult to get a high grade D: Easy to get a high grade E: Too much work F: Too liMle work G: Professor too tough H: Professor too nice I: No comment J:

  • 5

    Binghamton University

    Programming language

    How many of you are familiar with C?

    How many of you are familiar with C++?

    How many of you are familiar with Java?

    How many of you are familiar with Python?

  • 6

    Binghamton University

    Opera1ng Systems

    How many of you have taken the Opera1ng System class before?

    How many of you prefer to program on Linux?

    How many of you prefer to program on Mac?

    How many of you prefer to program on Windows?

    How many of you are familiar with virtual machines?

  • 7

    Binghamton University

    Interests

    How many of you would like math (or theory) beMer than systems?

    How many of you would like systems beMer than math (or theory)?

    vs.

  • 8

    Binghamton University

    Why take the computer security class?

    I just want to earn my credit towards my degree

    I want to protect my informa>on on the Internet

    I want to do research on computer security later

    I want to work in the computer security industry later

    I want to be a hacker, and make money out of it

  • 9

    Binghamton University

    Self Introduc1on

  • 10

    Binghamton University

    Overview

    Survey A ashback of computer security history Syllabus

    Secrets of ge^ng a high grade from this class

  • 11

    Binghamton University

    Overview

    Survey A ashback of computer security history Syllabus

    Secrets of ge^ng a high grade from this class

    I dont expect you to know all the details in the history part; otherwise, you probably dont have to take the course J

  • 12

    Binghamton University

    Quotes

    "Those who cannot learn from history are doomed to repeat it.

    -- George Santayana

  • 13

    Binghamton University

    Used to be 1ghtly government-controlled

  • 14

    Binghamton University

    What is this? Electro-mechanical rotor cipher machines used in the 20th century for enciphering and deciphering secret messages

    Invented by a German engineering at the end of World War I, and used during World War II by Nazi Germany

    Many messages encrypted by the Enigma machine were deciphered by the Allied cryptologists

    Shortened the European war by two years

    Enigma machine

  • 15

    Binghamton University

    News on Slashdot Today

  • 16

    Binghamton University

    NSA (Na1onal Security Agency) Formed in 1952 as a US intelligence agency (nicknamed as No Such Agency)

    Played an important role in the history of computer security Product types Type 1: Classied or sensi1ve US Gov. informa1on (top Secret) Type 2: Na1onal Security Informa1on

    Device unclassied, but algorithms and keys are Type 3: Unclassied sensi1ve US Government or commercial informa1on Sensi1ve, But Unclassied (SBU); used on non-na1onal security systems. Include DES, 3DES, AES, DSA and SHA.

    Type 4: Unevaluated commercial cryptographic equipment

  • 17

    Binghamton University

    Morris Worm

    The rst Internet worm was wriMen by Robert Morris, who then was a student at Cornell University, and whose father worked at NSA, and launched on November 2, 1988, from MIT

    Infected 6000 major UNIX computers, about 10% of the computers aMached to the Internet then.

    Boston Museum of Science

  • 18

    Binghamton University

    DOS virus: early 90s (my own experience)

    5 oppy disks were used to boot the computer Every student was concerned that the disks were infected by DOS virus: Brain, Jerusalem, Ping-Pong, Koko,

    Once a oppy disk was detected to be infected, we would have tried to remove the virus, or more oren, the disk would need to be reformaMed

  • 19

    Binghamton University

    Hacking conven1ons: Def Con & Black Hat

    The rst Def Con held in Las Vegas in 1993, founded by Je Mose In 2010, over 10,000 people aMended DEF CON 18 Capture the Flag (CTF): a hacking compe11on where teams of crackers aMempt to aMack and defend computers and networks using certain sorware and network structures.

    Black Hat was founded by Je Mose in 1997 Oriented towards corporate, business security professionals

  • 20

    Binghamton University

    Website defacement

    In 1996, Hackers altered Web sites of the United States Department of Jus1ce (August), the CIA (October), and the US Air Force (December)

    The most common method of defacement is using SQL injec1ons which allows gaining administra1ve access

  • 21

    Binghamton University

    DDoS (Distributed Denial of Service) aMacks

    February 2000: Maaboy Vs. Yahoo, CNN, eBay, Dell, & Amazon "Maaboy," a Canadian 15-year-old Michael Calce

    August 2008: DDoS aMacks during the Georgia-Russia war; mostly TCP SYN ooding aMacks

    March 2013: DDoS aMacks against Spamhaus, in which aMack trac peaked at 300Gbps. Used DNS reec1on aMacks.

    Feb. 2014: DDoS aMacks against a Hong Kong movement website, Popvote.hk. Used NTP reec1on aMacks. Record rate: 400Gbps.

  • 22

    Binghamton University

    Resurgence of Computer Worms Code Red I: July 2001 (buer overow) Code Red II: August 2001 (buer overow)

    Slammer: 2003 (buer overow on Microsor SQL Sever), caused global Internet slowdown

    Blaster: 2003. Spread by buer overow on the Microsor DCOM RPC Service. Target Bill Gates, Billy Gates why do you make this possible ? Stop making money and x your soCware!!

    Code Red

    Blaster

  • 23

    Binghamton University

    Stuxnet

    The rst computer worm that targeted industrial PLCs (Programmable Logic Controllers) in SCADA systems

    Was rst discovered in June 2010 Ruined almost one-rh of Iran's nuclear centrifuges Specula1on that the development of Stuxnet was state-sponsored

    Siemens Simatic S7-300 PLC CPU with three I/O modules attached

  • 24

    Binghamton University

    Botnets Botnets became a major challenge to cyber security First gen.: IRC chat channel Second gen.: P2P as its C&C control mechanism

    Storm botnet (2007): infected 1~50 million computers, once sent 20% all spam on the Internet

    Zeus botnet (Zbot): infected 3.6 million PCs in US alone. First iden1ed in July 2007 when it was used to steal informa1on from the US Department of Transporta1on, and became widespread in 2009.

    Zeus

  • 25

    Binghamton University

    Mobile Malware

    The rst proof-of-concept worm on mobile cell phones called Cabir was developed to infect Symbian mobile devices in 2004

    Cabir used Bluetooth to spread itself as .sis les; its variant, Mabir, could use both Bluetooth and MMS to spread the worm

    Android took 87% of the global mobile market in 2013, and 97% of mobile malware is on the Android devices

  • 26

    Binghamton University

    Target data breach

    The number of customers whose personal informa1on was stolen in a widespread data breach during the holiday season of 2013 was reported to be within the range of 70 million to 110 million people.

    Es1mated loss: $148 million

  • 27

    Binghamton University

    Sony Pictures Hack Released data on November 24, 2014 Personal informa1on about Sony Pictures employees and their families

    Emails between employes Execu1ve salaries Copies of unreleased Sony movies, including The Interview

    Terrorist threats surrounding the movie The Interview New York City premiere at Sunshine Cinema on 12/18/2014 Sony withdrew the lm due to terrorist threat Obama cri1cized Sony for doing that on 12/19/2014 in his end-of-year press speech

    USA aSributed the aSack to North Korea, but the laSer declined

  • 28

    Binghamton University

    Lessons learned for computer security

    It has become increasingly important Computer security used to be for fun, e.g., overnight fame Computer security is now driven by prot, and some1mes carries poli1cal inten1ons

    The problems in computer security change over >me 20 years ago we were concerned with DOS viruses Now the focus shirs to mobile security, cloud security, etc. Fundamentals are important in dealing with new problems

    Computer security is a cat-mouse chasing game New theories and techniques are constantly required So there is job security in computer security

  • 29

    Binghamton University

    Overview

    Survey A ashback of computer security history Syllabus

    Secrets of ge^ng a high grade from this class

  • 30

    Binghamton University

    Contents

    Principles of computer security: dierent security metrics

    Basics of cryptography: symmetric key crypto, public key crypto, hashing

    Access control: authen1ca1on, authoriza1on

    Protocols: authen1ca1on protocols, real-world security protocols

    SoWware: sorware aws, malware, OS security

  • 31

    Binghamton University

    Course material

    Textbook (recommended, but required) Mark Stamp, Informa1on Security: Principles and Prac1ce, 2nd edi1on (Wiley 2011).

    A good coverage of computer security fundamentals Full of humors to keep you from falling into sleep when reading it Mark used to work at NSA Another one: Ross Anderson, Security Engineering (hMp://www.cl.cam.ac.uk/~rja14/book.html)

    Some research papers that are relevant Computer security is a changing eld No single textbook can cover every possible detail

  • 32

    Binghamton University

    Teaching sta

    Instructor: Guanhua Yan Best way to reach me is by email: [email protected] Oce: Q-11 Engineering building Oce hours posted on class website

    Primary TA: Sanket H. Panhale Email: [email protected] Oce hours: TBA

  • 33

    Binghamton University

    Oce hour vo1ng Monday: Morning or arernoon?

    Tuesday Morning or arernoon?

    Wednesday Morning or arernoon?

    Thursday Morning or arernoon?

    Friday: Morning or arernoon?

    Sorry: weekend not possible

  • 34

    Binghamton University

    Components & Grading

    WriMen assignments: 20%

    Project assignment: 40% Midterm exam: 20%

    Final exam: 20%

  • 35

    Binghamton University

    Ge^ng Help Oce hours: on class website 1:1 Appointments You can schedule 1:1 appointments with any of the teaching sta

    Blackboard Class communica1on and for handing in projects

  • 36

    Binghamton University

    Policies: Assignments And Exams

    Unless specied, you must work alone on all assignments

    Handins Assignments due at 11:59pm on due date

    Appealing grades Within 7 days of comple1on of grading

  • 37

    Binghamton University

    Timeliness

    Lateness penal1es Get penalized 10% per day No handins later than 2 days aWer due date

    Catastrophic events Major illness, death in family, Let us know as early as possible Will be dealt with on a case-by-case basis

    Advice Once you start running late, its really hard to catch up

  • 38

    Binghamton University

    Chea1ng

    What is chea>ng? Sharing code: by copying, retyping, looking at, or supplying a le Coaching: helping your friend to write a lab, line by line Copying code from previous course or from elsewhere on WWW

    What is NOT chea>ng? Explaining how to use systems or tools Helping others with high-level design issues

    Penalty for chea>ng: Look at the Watson School Honesty Code

    Detec>on of chea>ng: We do check Tools for doing this are much beMer than most cheaters think!

  • 39

    Binghamton University

    Overview

    Survey A ashback of computer security history Syllabus

    Secrets of ge[ng a high grade from this class

  • 40

    Binghamton University

    Secrets you wish that I dont tell your classmates Final grades are curved. Secret 1: dont share your solu1ons with your classmates.

    Exams and assignments are based upon lecture slides. Secret 2: dont wait un1l the exam 1me to study the slides.

    Penalty to everyone involved if chea1ng is found. Secret 3: you may not want to do that.

    Once in a while, I would leak exam ques1ons in class. Secret 4: aMend classes and stay ac1ve.

    It is a long march: 5 projects + 3 assignments + 2 exams. Secret 5: always have a chance un1l the class nishes.

  • 41

    Binghamton University

    Final word: This is your class!

    So constant feedback will be greatly appreciated!

  • 42

    Binghamton University

    End of Lecture 1