130 likes | 328 Views
Computer Security 1 [COMPGA01]. Nicolas T. Courtois - U niversity C ollege L ondon. CompSec at UCL. COMPGA01 Computer Security 1 Dr. Nicolas Courtois optional modules *COMPGA02 Computer Security 2 *COMPGZ03 Distributed Systems * COMPM028 Language Based Security
E N D
Computer Security 1[COMPGA01] Nicolas T. Courtois - University College London
CompSec at UCL • COMPGA01 Computer Security 1Dr. Nicolas Courtois optional modules • *COMPGA02 Computer Security 2 • *COMPGZ03 Distributed Systems • *COMPM028Language Based Security • *COMPGA14 InfoSec Management • not covered: • database sec • critical infrastructures • hiding, covert channels, • flow control • distributed systems Nicolas T. Courtois, January 2009
About GA01 • 30 hours. Nicolas T. Courtois, January 2009
CompSec1 [COMPGA01] Summary page: http://www.cs.ucl.ac.uk/students/syllabus/mscisec/ga01_computer_security_1/ Nicolas T. Courtois, January 2009
Slides *All slides marked with an asterisk can be omitted. Or are repeated elsewhere. **Two asterisks: even less important. Text in white: on purpose. You should consider it does not exist. It is almost like saying, this is marked as being out of scope. Nicolas T. Courtois, January 2009
Assessment • 85 % = written exam (May exam session) • 2.5 hours. • “closed book”, • NO calculators allowed, • no mobile phones • 15 % = Coursework = Nicolas T. Courtois, January 2009
Written Exam Content • multiple choice questions + • possibly also problems to solve, • either rather questions of understanding.. • or small “theory” exercises • your key weapons are: • common sense • real world connection, practice vs. theory, things in perspective • basic knowledge: vocabulary, definitions, key concepts • The exam CAN contain things about which YOU never heard. • YES there will be things you did a lot of revisions on and not on the exam… Too bad. Nicolas T. Courtois, January 2009
Remark Part01 - all the “PRINCIPLES” we learn… • Exam is not a philosophy essay. • Part 01 is NOT the most important part of this course. • Abstract notions and principles should appear in reference to the clear real world context. • Focus on fundamental technical knowledge and understanding of it. Nicolas T. Courtois, January 2009
References 1) *M. Bishop, Computer Security. • out of date, yet everything is there! • Computer Security: by Dieter Gollmann +Unix&Wndows alike +read in any order, +compact explanations-timid on recommendations • Ross Anderson Security Engineering [Cambridge] only some partshttp://www.cl.cam.ac.uk/~rja14/book.html Nicolas T. Courtois, January 2009
Major Themes in CompSec 1 • Engineering principles, vocabulary, fancy acronyms like C.I.A. - 30 % • Access control, theory and practice - 30 % • Security helped by hardware - 10 % • Malware attacks and defences - 25% • Protocols and applied cryptography - 30 % • Security given the social and industrial context - 10 % The sum is much more than 100%? Yes, because these major points have lots of intersection. Nicolas T. Courtois, January 2009
CompSec 1 – Learning Outcomes What’s Wrong? Threats Vulnerabilities • Fix It? • Defensive • Techniques What’s There? Industrial Standards Life Facts Attack Methods Hacking Techniques ..“ALL MAJOR AREAS”… Nicolas T. Courtois, January 2009
Content • Intro 20s, • Principles, part01 70s • Sets, relations, Security policies, Ref. Monitor, part02a 60s • DAC, OS Access Control, Unix part04(a) 60 s • Unix/Windows in part04(b) +60 s, • Decidability: part02b 20s, revisions on Lattices, 02a/c • MAC, Confidentiality, BLP[Biba] part02c 70s, • Hardware and Low Level CompSec part03 100s • Integrity, business-oriented policies part02d 90s Nicolas T. Courtois, January 2009
Content • Exploits against software and defenses part10, 60 s • Software - Malware, Attacks – Defences, part07 + 80 s • Basic Network Security and Firewalls 80s • Crypto, Authentication, Passwords, part05, Crypto Protocols, Key Est. Kerberos, SSL, PGP part06 Nicolas T. Courtois, January 2009