CSE4303 Introduction to Computer Security (Lecture 1)
Course introduction and security fundamentals
Computer Security Ethics
In this course, you will learn about tools and techniques that cna be used to violate privacy, cause harm, or undermine trust.
“The difference between a professional and a threat actor is not the technique — it’s intent, restraint, and accountability.” — ChatGPT
Intent:
Am I doing this for good or for bad?
Restraint:
Just because I can, should I?
Accountability:
Am I willing to take responsibility for my actions, even when my name isn’t on them? If my actions cause unintended harm, are my actions defensible?
Strive to be the good guy
Disclaimer: If you choose to experiment on systems you do not own, do not have permission to test, or engage in illegal activity, that is a personal choice—not a course activity. In those cases, you should not expect support, protection, or advocacy from the instructional staff or the university.
What is there to gain?
- Access to systems
Trust and reputation are critical in cybersecurity. If you do not have a strong reputation as a professional, no one will trust you with access to their systems!
Course learning objectives
- Understand principles of security analysis
- Explain key security concepts such as confidentiality
- Explain the root causes of current security problems
- Produce clear and concise descriptions of security problems on real world systems
- Analyze systems for potential vulnerabilities
Slides contain material from Computer Security lectures taught by
- Prof. Dan Boneh from Stanford
- Prof. Wenke Lee from Georgia Tech
- Prof. Wenliang (Kevin) Du from Syracuse
- Profs. Zhang and Cole
These sources will be used for slides throughout the course
Defining security
How would you define security?
- informal: protecting something (information, system) against stealing, changing, destroying, forging etc.
- Slightly more formal:
- Ensuring that assets
- Can be accessed by those with authority to do so
- Cannot be accessed by those without it
- Ensuring that assets
The security of a system, application, or protocol is always relative to
- A set of desired properties
- anonymity, confidentiality, authenticity, and more
- An adversary with specific capabilities (“threat model”)
- I put the pizza on top of the fridge so the dog couldn’t reach it. I forgot about the cat
Key security concepts
Confidentiality: no unauthorized disclosure of information
- Tools to achieve it
- Encryption
- Access control
- Authentication (passwords, biometrics, etc.)
Integrity: information is not altered from original content in unauthorized way
- Tools to achieve it:
- Backups (hot and cold, on-site and off-site)
- Checksums and hash functions
Availability: information and resources are accessible to those authorized to have it
-
Threats:
- Resource (e.g. website): Denial of Service (DoS or DDoS) attack
- Example: Murai botnet makes popular websites unavailable (2016)
- Video: Murai in 100 seconds
- Example: DDoS attacks increase in work-from-home COVID-19environment
- Resource (e.g. website): Denial of Service (DoS or DDoS) attack
-
Complexity attacks
-
Data: ransomware
- Example: WannaCry caused billions of $$ in damage 2017
- One of fastest-growing attack types: payments and number on the rise
-
Tools to achieve it:
- backup power
- isolated networks (“air-gapped systems”)
- no single point of data storage (e.g. RAID)
- data backups
- robust server infrastructure
Other security goals
Authenticity: identity of an entity (issuer of info/message) is verified
Anonymity: identity of an entity remains unknown
Non-repudiation: messages can’t be denied or taken back (e.g. online transaction commitments)