1 Binghamton University History of Computer Security CS 458/558: Introduc1on to Computer Security 1 st Lecture Instructor: Guanhua Yan
Nov 10, 2015
1
Binghamton University
History of Computer Security CS 458/558: Introduc1on to Computer Security 1st Lecture
Instructor: Guanhua Yan
2
Binghamton University
Thanks for showing up in class!
3
Binghamton University
Survey
4
Binghamton University
Lets be honest What have you heard about this class from the students taking this class last fall? A: Boring B: Interes1ng C: Dicult to get a high grade D: Easy to get a high grade E: Too much work F: Too liMle work G: Professor too tough H: Professor too nice I: No comment J:
5
Binghamton University
Programming language
How many of you are familiar with C?
How many of you are familiar with C++?
How many of you are familiar with Java?
How many of you are familiar with Python?
6
Binghamton University
Opera1ng Systems
How many of you have taken the Opera1ng System class before?
How many of you prefer to program on Linux?
How many of you prefer to program on Mac?
How many of you prefer to program on Windows?
How many of you are familiar with virtual machines?
7
Binghamton University
Interests
How many of you would like math (or theory) beMer than systems?
How many of you would like systems beMer than math (or theory)?
vs.
8
Binghamton University
Why take the computer security class?
I just want to earn my credit towards my degree
I want to protect my informa>on on the Internet
I want to do research on computer security later
I want to work in the computer security industry later
I want to be a hacker, and make money out of it
9
Binghamton University
Self Introduc1on
10
Binghamton University
Overview
Survey A ashback of computer security history Syllabus
Secrets of ge^ng a high grade from this class
11
Binghamton University
Overview
Survey A ashback of computer security history Syllabus
Secrets of ge^ng a high grade from this class
I dont expect you to know all the details in the history part; otherwise, you probably dont have to take the course J
12
Binghamton University
Quotes
"Those who cannot learn from history are doomed to repeat it.
-- George Santayana
13
Binghamton University
Used to be 1ghtly government-controlled
14
Binghamton University
What is this? Electro-mechanical rotor cipher machines used in the 20th century for enciphering and deciphering secret messages
Invented by a German engineering at the end of World War I, and used during World War II by Nazi Germany
Many messages encrypted by the Enigma machine were deciphered by the Allied cryptologists
Shortened the European war by two years
Enigma machine
15
Binghamton University
News on Slashdot Today
16
Binghamton University
NSA (Na1onal Security Agency) Formed in 1952 as a US intelligence agency (nicknamed as No Such Agency)
Played an important role in the history of computer security Product types Type 1: Classied or sensi1ve US Gov. informa1on (top Secret) Type 2: Na1onal Security Informa1on
Device unclassied, but algorithms and keys are Type 3: Unclassied sensi1ve US Government or commercial informa1on Sensi1ve, But Unclassied (SBU); used on non-na1onal security systems. Include DES, 3DES, AES, DSA and SHA.
Type 4: Unevaluated commercial cryptographic equipment
17
Binghamton University
Morris Worm
The rst Internet worm was wriMen by Robert Morris, who then was a student at Cornell University, and whose father worked at NSA, and launched on November 2, 1988, from MIT
Infected 6000 major UNIX computers, about 10% of the computers aMached to the Internet then.
Boston Museum of Science
18
Binghamton University
DOS virus: early 90s (my own experience)
5 oppy disks were used to boot the computer Every student was concerned that the disks were infected by DOS virus: Brain, Jerusalem, Ping-Pong, Koko,
Once a oppy disk was detected to be infected, we would have tried to remove the virus, or more oren, the disk would need to be reformaMed
19
Binghamton University
Hacking conven1ons: Def Con & Black Hat
The rst Def Con held in Las Vegas in 1993, founded by Je Mose In 2010, over 10,000 people aMended DEF CON 18 Capture the Flag (CTF): a hacking compe11on where teams of crackers aMempt to aMack and defend computers and networks using certain sorware and network structures.
Black Hat was founded by Je Mose in 1997 Oriented towards corporate, business security professionals
20
Binghamton University
Website defacement
In 1996, Hackers altered Web sites of the United States Department of Jus1ce (August), the CIA (October), and the US Air Force (December)
The most common method of defacement is using SQL injec1ons which allows gaining administra1ve access
21
Binghamton University
DDoS (Distributed Denial of Service) aMacks
February 2000: Maaboy Vs. Yahoo, CNN, eBay, Dell, & Amazon "Maaboy," a Canadian 15-year-old Michael Calce
August 2008: DDoS aMacks during the Georgia-Russia war; mostly TCP SYN ooding aMacks
March 2013: DDoS aMacks against Spamhaus, in which aMack trac peaked at 300Gbps. Used DNS reec1on aMacks.
Feb. 2014: DDoS aMacks against a Hong Kong movement website, Popvote.hk. Used NTP reec1on aMacks. Record rate: 400Gbps.
22
Binghamton University
Resurgence of Computer Worms Code Red I: July 2001 (buer overow) Code Red II: August 2001 (buer overow)
Slammer: 2003 (buer overow on Microsor SQL Sever), caused global Internet slowdown
Blaster: 2003. Spread by buer overow on the Microsor DCOM RPC Service. Target Bill Gates, Billy Gates why do you make this possible ? Stop making money and x your soCware!!
Code Red
Blaster
23
Binghamton University
Stuxnet
The rst computer worm that targeted industrial PLCs (Programmable Logic Controllers) in SCADA systems
Was rst discovered in June 2010 Ruined almost one-rh of Iran's nuclear centrifuges Specula1on that the development of Stuxnet was state-sponsored
Siemens Simatic S7-300 PLC CPU with three I/O modules attached
24
Binghamton University
Botnets Botnets became a major challenge to cyber security First gen.: IRC chat channel Second gen.: P2P as its C&C control mechanism
Storm botnet (2007): infected 1~50 million computers, once sent 20% all spam on the Internet
Zeus botnet (Zbot): infected 3.6 million PCs in US alone. First iden1ed in July 2007 when it was used to steal informa1on from the US Department of Transporta1on, and became widespread in 2009.
Zeus
25
Binghamton University
Mobile Malware
The rst proof-of-concept worm on mobile cell phones called Cabir was developed to infect Symbian mobile devices in 2004
Cabir used Bluetooth to spread itself as .sis les; its variant, Mabir, could use both Bluetooth and MMS to spread the worm
Android took 87% of the global mobile market in 2013, and 97% of mobile malware is on the Android devices
26
Binghamton University
Target data breach
The number of customers whose personal informa1on was stolen in a widespread data breach during the holiday season of 2013 was reported to be within the range of 70 million to 110 million people.
Es1mated loss: $148 million
27
Binghamton University
Sony Pictures Hack Released data on November 24, 2014 Personal informa1on about Sony Pictures employees and their families
Emails between employes Execu1ve salaries Copies of unreleased Sony movies, including The Interview
Terrorist threats surrounding the movie The Interview New York City premiere at Sunshine Cinema on 12/18/2014 Sony withdrew the lm due to terrorist threat Obama cri1cized Sony for doing that on 12/19/2014 in his end-of-year press speech
USA aSributed the aSack to North Korea, but the laSer declined
28
Binghamton University
Lessons learned for computer security
It has become increasingly important Computer security used to be for fun, e.g., overnight fame Computer security is now driven by prot, and some1mes carries poli1cal inten1ons
The problems in computer security change over >me 20 years ago we were concerned with DOS viruses Now the focus shirs to mobile security, cloud security, etc. Fundamentals are important in dealing with new problems
Computer security is a cat-mouse chasing game New theories and techniques are constantly required So there is job security in computer security
29
Binghamton University
Overview
Survey A ashback of computer security history Syllabus
Secrets of ge^ng a high grade from this class
30
Binghamton University
Contents
Principles of computer security: dierent security metrics
Basics of cryptography: symmetric key crypto, public key crypto, hashing
Access control: authen1ca1on, authoriza1on
Protocols: authen1ca1on protocols, real-world security protocols
SoWware: sorware aws, malware, OS security
31
Binghamton University
Course material
Textbook (recommended, but required) Mark Stamp, Informa1on Security: Principles and Prac1ce, 2nd edi1on (Wiley 2011).
A good coverage of computer security fundamentals Full of humors to keep you from falling into sleep when reading it Mark used to work at NSA Another one: Ross Anderson, Security Engineering (hMp://www.cl.cam.ac.uk/~rja14/book.html)
Some research papers that are relevant Computer security is a changing eld No single textbook can cover every possible detail
32
Binghamton University
Teaching sta
Instructor: Guanhua Yan Best way to reach me is by email: [email protected] Oce: Q-11 Engineering building Oce hours posted on class website
Primary TA: Sanket H. Panhale Email: [email protected] Oce hours: TBA
33
Binghamton University
Oce hour vo1ng Monday: Morning or arernoon?
Tuesday Morning or arernoon?
Wednesday Morning or arernoon?
Thursday Morning or arernoon?
Friday: Morning or arernoon?
Sorry: weekend not possible
34
Binghamton University
Components & Grading
WriMen assignments: 20%
Project assignment: 40% Midterm exam: 20%
Final exam: 20%
35
Binghamton University
Ge^ng Help Oce hours: on class website 1:1 Appointments You can schedule 1:1 appointments with any of the teaching sta
Blackboard Class communica1on and for handing in projects
36
Binghamton University
Policies: Assignments And Exams
Unless specied, you must work alone on all assignments
Handins Assignments due at 11:59pm on due date
Appealing grades Within 7 days of comple1on of grading
37
Binghamton University
Timeliness
Lateness penal1es Get penalized 10% per day No handins later than 2 days aWer due date
Catastrophic events Major illness, death in family, Let us know as early as possible Will be dealt with on a case-by-case basis
Advice Once you start running late, its really hard to catch up
38
Binghamton University
Chea1ng
What is chea>ng? Sharing code: by copying, retyping, looking at, or supplying a le Coaching: helping your friend to write a lab, line by line Copying code from previous course or from elsewhere on WWW
What is NOT chea>ng? Explaining how to use systems or tools Helping others with high-level design issues
Penalty for chea>ng: Look at the Watson School Honesty Code
Detec>on of chea>ng: We do check Tools for doing this are much beMer than most cheaters think!
39
Binghamton University
Overview
Survey A ashback of computer security history Syllabus
Secrets of ge[ng a high grade from this class
40
Binghamton University
Secrets you wish that I dont tell your classmates Final grades are curved. Secret 1: dont share your solu1ons with your classmates.
Exams and assignments are based upon lecture slides. Secret 2: dont wait un1l the exam 1me to study the slides.
Penalty to everyone involved if chea1ng is found. Secret 3: you may not want to do that.
Once in a while, I would leak exam ques1ons in class. Secret 4: aMend classes and stay ac1ve.
It is a long march: 5 projects + 3 assignments + 2 exams. Secret 5: always have a chance un1l the class nishes.
41
Binghamton University
Final word: This is your class!
So constant feedback will be greatly appreciated!
42
Binghamton University
End of Lecture 1