160 likes | 362 Views
Computing Security. Paul Wagner Department of Computer Science. Messages. Security as a multi-faceted sub-discipline of computer science System security Client security Server security Application security Network security Database security Social engineering Others….
E N D
Computing Security Paul Wagner Department of Computer Science
Messages • Security as a multi-faceted sub-discipline of computer science • System security • Client security • Server security • Application security • Network security • Database security • Social engineering • Others…. • There are many interesting issues in each of these areas
Overview • Not just viruses and worms • Understanding security issues • Applying other areas of computer science (networking, operating systems) • Understanding and applying overall security principles • Using tools • Developing a security frame of mind
System Security • Probably single most important area • Multitude of sub-issues and tools • Information gathering • Packet sniffing (e.g. ethereal) • Port scanning (e.g. nmap) • Vulnerability assessment (e.g. nessus) • Intrusion detection (e.g. snort) • Applicability to client and server systems
System Security – Client-Side • Viruses, worms, trojan horses • Spyware • Spam • Patching • Human awareness
System Security – Server-Side • Client issues plus more • Servers are points for possibly harmful access • Program interaction • Parameters passed in • Data passed in • Often running multiple applications • Web server, file server, mail server, …
Application Security • Secure transmission of information • Protocols (e.g. SSL) • How to securely send information? • How to establish a channel for doing so? • Cryptography • Private key systems • DES (Data Encryption Standard) – older • AES (Advanced Encryption Standard) - current • Public key systems • RSA (Rivest, Shamir, Adelman) • Application security issues • C/C++ - buffer overflow on stack • Java – “sandbox” issues
Network Security • Need • Understanding of network protocols • 7-layer OSI network stack • Issues • Network Topology • Firewalls • Secure Communication on Network • Virtual Private Network (VPN) • Other Network Security Approaches • E.g. Network Address Translation (NAT)
Database Security • Issues • Security of data • Security of transmission of data • Problems • SQL Injection • Vulnerabilities in DBMS systems code • Primarily buffer overflows • Data passed insecurely • E.g. from web pages
Web Security • Many Issues • Parameter Passing Issues • Cross-Site Scripting • Expose information • Introduce vulnerabilities • Web Server Configuration
Operating System Security • General Issues • How can an OS be made more secure? • How can an OS protect applications? • Examples • Windows • Heavy usage means more attempts • Linux • Attacks starting (e.g. Luppi worm, PHP, XML-RPC) • Mac • Relatively rare
Social Engineering • Technological security isn’t enough • Best technology isn’t helpful if you can convince someone to turn it off, mis-configure it, tell you how it works… • Many incidents throughout the years • Best example: Kevin Mitnick • “The Art of Deception”, 2002
Ethical, Privacy, Legal Issues • Not just technology • Certain Sony CDs install root-kit on computer • Using a port-scanner against unknown systems from campus can get your system disconnected from network • Violation of security guidelines can lead to court action (Oregon vs. Schwartz) • Important to study computer security in an ethical, legal way that doesn’t interfere with anyone’s privacy
Other Areas • Honeypots and Honeynets • Artificial Intelligence and Security • Physical Security • Computer Forensics
Employment Opportunities • Systems administrator • Network administrator • Security engineer • Security architect • Security officer (CSO)
Courses at UW-Eau Claire • CS 255 – “Distributed OO Programming in Java” • Java Security (SSL, basic crypto) • CS 370 – Computer Security • System security • Area security (e.g. database, web, operating systems) • Theory and tools • Cyberwar exercise – defense and investigation • CS 491 (special topic – Cryptography and Network Security) • Cryptography, including use in applications • Network applications (e.g. email) • MIS 365 (proposed) – Security Policy Management