computer security --- part 1: introduction · security 1: introduction dusko pavlovic preamble...

59
Security 1: Introduction Dusko Pavlovic Preamble Examples Security? Structure Computer Security — Part 1: Introduction Dusko Pavlovic Oxford Michaelmas Term 2008

Upload: others

Post on 22-Jul-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

Examples

Security?

Structure

Computer Security — Part 1:Introduction

Dusko Pavlovic

OxfordMichaelmas Term 2008

Page 2: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

Examples

Security?

Structure

Outline

Preamble

Security examples

What is computer security?

Structure of the course

Page 3: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

Examples

Security?

Structure

Outline

Preamble

Security examples

What is computer security?

Structure of the course

Page 4: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

Examples

Security?

Structure

Contact

I Dusko Pavlovic

I email: [email protected]

I mailing list: [email protected]

I phone: 273 883

I office: 305

I office hours: after class or email for appointment

Page 5: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

Examples

Security?

Structure

Announcements

I sign up sheets for classesI timetable tweaks:

I weeks 1–2: 3 lecturesI week 4: no lectures

Page 6: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

Examples

Security?

Structure

Announcements

I sign up sheets for classesI timetable tweaks:

I weeks 1–3: 3 lecturesI week 4: no lecturesI November 19: no lecture

Page 7: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

Examples

Security?

Structure

Course

I What do we expect from the course?

I Why security?

I What is security?

Page 8: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

Examples

Security?

Structure

Course

I What do we expect from the course?

I Why security?

I What is security?

Page 9: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

Examples

Security?

Structure

Course

I What do we expect from the course?

I Why security?

I What is security?

Page 10: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

Outline

Preamble

Security examples

Securing resources: authorization

Securing information: secrecy

Securing information: authenticity

Securing social interactions and networks

What is computer security?

Structure of the course

Page 11: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

Securing resources: authorization

Digital Rights Management (DRM)

I

Page 12: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

Securing resources: authorization

Digital Rights Management (DRM)

I art used to be bound to an artistI music was available only from a musicianI a story from a storytellerI a painting could only be seen in one place

Page 13: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

Securing resources: authorization

Digital Rights Management (DRM)

I mass reproduction bound art to copiable mediaI copying technologies led to copyright-based marketsI artists could sell lots of books and recordsI Copyright Management: branding, celebrities

Page 14: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

Securing resources: authorization

Digital Rights Management (DRM)

I digital networks freed art (science, religion. . . )from physical tokens (books, CDs. . . )

I copying of digital content is essentially costlessI Copyright Management becomes unviableI Digital Rights Management: seeks to

I prevent (sandboxing, Vista. . . )I detect (watermarking . . . )I deter (lawyers . . . )

unauthorized copying of digital content

Page 15: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

Securing information: secrecy

Task: Fair deal of virtual cards

Design a P2P application for mobile devices to dealvirtual cards.

Page 16: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

Securing information: secrecy

Problem

The players mistrust each other’s device. The dealingdevice must not see the cards that it is dealing.

Hint

Each device can encrypt messages, i.e. make themunreadable for others. Encryptions can be removed inany order.

Page 17: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

Securing information: secrecy

Problem

The players mistrust each other’s device. The dealingdevice must not see the cards that it is dealing.

Hint

Each device can encrypt messages, i.e. make themunreadable for others.

Encryptions can be removed inany order.

Page 18: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

Securing information: secrecy

Problem

The players mistrust each other’s device. The dealingdevice must not see the cards that it is dealing.

Hint

Each device can encrypt messages, i.e. make themunreadable for others. Encryptions can be removed inany order.

Page 19: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

Securing social computation

Special case: Virtual coin flipping

Flip a virtual coin (without using a physical coin).

Variations: Millionaires’ Problem

Two millionaires need to truthfully find out which one isricher, without telling how rich they are.

Page 20: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

Securing social computation

Special case: Virtual coin flipping

Flip a virtual coin (without using a physical coin).

Variations: Millionaires’ Problem

Two millionaires need to truthfully find out which one isricher, without telling how rich they are.

Page 21: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

Securing information: authenticity

Task

Spammers need lots of webmail accounts. They writebots who visit Hotmail, Yahoo! etc, to open disposableaccounts, to distribute spam.

Design a protocol for setting up a webmail account whichwill be able to tell apart bots from humans.

Page 22: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

First computer

Page 23: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

First authentication protocol

Page 24: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

First authentication protocol

Page 25: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

First authentication protocol

Page 26: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

CAPTCHA

Page 27: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

CAPTCHA

Page 28: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

CAPTCHA

Page 29: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

CAPTCHA

Page 30: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

CAPTCHA

Page 31: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

Agent Bot Smith in the Middle

Page 32: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

Agent Bot Smith in the Middle

Page 33: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

Agent Bot Smith in the Middle

Page 34: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

Agent Bot Smith in the Middle

Page 35: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

ProblemSmart card relay attacks

This becomes much easier with NFC phones!

Page 36: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

ProblemSmart card relay attacks

This becomes much easier with NFC phones!

Page 37: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

Securing social interactions and networks

Task

There are 11 voters and 3 candidates A, B and C. Thevoters need to elect one candidate. They have differentpreferences.

Describe a method to elect the candidate which satisfiesmost voters.

Page 38: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

Securing social interactions and networksProblem

Suppose the preferences are distributed as follows:

voters preference

3 A � B � C2 A � C � B2 B � C � A4 C � B � A

I If each voter casts 1 vote, then the tally is5:4:2 for A � C � B.

I If each voter casts 1+1 votes, then the tally is9:8:5 for B � C � A.

I If each voter casts 2+1 votes, then the tally is12:11:10 for C � B � A

Page 39: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

Securing social interactions and networksProblem

Suppose the preferences are distributed as follows:

voters preference

3 A � B � C2 A � C � B2 B � C � A4 C � B � A

I If each voter casts 1 vote, then the tally is5:4:2 for A � C � B.

I If each voter casts 1+1 votes, then the tally is9:8:5 for B � C � A.

I If each voter casts 2+1 votes, then the tally is12:11:10 for C � B � A

Page 40: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

Securing social interactions and networksProblem

Suppose the preferences are distributed as follows:

voters preference

3 A � B � C2 A � C � B2 B � C � A4 C � B � A

I If each voter casts 1 vote, then the tally is5:4:2 for A � C � B.

I If each voter casts 1+1 votes, then the tally is9:8:5 for B � C � A.

I If each voter casts 2+1 votes, then the tally is12:11:10 for C � B � A

Page 41: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

Securing social interactions and networksProblem

Suppose the preferences are distributed as follows:

voters preference

3 A � B � C2 A � C � B2 B � C � A4 C � B � A

I If each voter casts 1 vote, then the tally is5:4:2 for A � C � B.

I If each voter casts 1+1 votes, then the tally is9:8:5 for B � C � A.

I If each voter casts 2+1 votes, then the tally is12:11:10 for C � B � A

Page 42: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

ExamplesAuthorization

Secrecy

Authentication

Voting

Security?

Structure

Securing social interactions and networksProblem

Suppose the preferences are distributed as follows:

voters preference

3 A � B � C2 A � C � B2 B � C � A4 C � B � A

I If each voter casts 1 vote, then the tally is5:4:2 for A � C � B.

I If each voter casts 1+1 votes, then the tally is9:8:5 for B � C � A.

I If each voter casts 2+1 votes, then the tally is12:11:10 for C � B � A

Page 43: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

Examples

Security?What is a computer?

What is security

Structure

Outline

Preamble

Security examples

What is computer security?

What is a computer?

What is security

Structure of the course

Page 44: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

Examples

Security?What is a computer?

What is security

Structure

What is a computer?

A computer performs computation:

I computation as calculation:I data processing through language, symbols,

calculators. . .

I computation as communication:I data processing with other people, other computers,

web. . .

Computation is

I data processing (thinking, gene activation. . . )

I using tools (laptops, networks, tRNA. . . ).

Page 45: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

Examples

Security?What is a computer?

What is security

Structure

What is a computer?

A computer performs computation

:

I computation as calculation:I data processing through language, symbols,

calculators. . .

I computation as communication:I data processing with other people, other computers,

web. . .

Computation is

I data processing (thinking, gene activation. . . )

I using tools (laptops, networks, tRNA. . . ).

Page 46: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

Examples

Security?What is a computer?

What is security

Structure

What is a computer?

A computer performs computation:

I computation as calculation:I data processing through language, symbols,

calculators. . .

I computation as communication:I data processing with other people, other computers,

web. . .

Computation is

I data processing (thinking, gene activation. . . )

I using tools (laptops, networks, tRNA. . . ).

Page 47: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

Examples

Security?What is a computer?

What is security

Structure

What is a computer?

A computer performs computation:

I computation as calculation:I data processing through language, symbols,

calculators. . .

I computation as communication:I data processing with other people, other computers,

web. . .

Computation is

I data processing (thinking, gene activation. . . )

I using tools (laptops, networks, tRNA. . . ).

Page 48: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

Examples

Security?What is a computer?

What is security

Structure

What is a computer?

A computer performs computation:

I computation as calculation:I data processing through language, symbols,

calculators. . .

I computation as communication:I data processing with other people, other computers,

web. . .

Computation is

I data processing (thinking, gene activation. . . )

I using tools (laptops, networks, tRNA. . . ).

Page 49: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

Examples

Security?What is a computer?

What is security

Structure

What is a computer?

Examples of computers

I pocket calculator, brake stabilizer, flight controller

I laptop, desktop, mainframe

I Google cluster, StormWorm botnet

I the Web

I networks: cell, tissue, organism

I social groups and networks. . .

They all have their

I security requirements

I vulnerabilities

I attackers and adversaries

Page 50: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

Examples

Security?What is a computer?

What is security

Structure

What is a computer?

Examples of computers

I pocket calculator, brake stabilizer, flight controller

I laptop, desktop, mainframe

I Google cluster, StormWorm botnet

I the Web

I networks: cell, tissue, organism

I social groups and networks. . .

They all have their

I security requirements

I vulnerabilities

I attackers and adversaries

Page 51: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

Examples

Security?What is a computer?

What is security

Structure

Software engineering

Program dependability

I safety: "bad things (actions) don’t happen"

I liveness: "good things (actions) do happen"

Page 52: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

Examples

Security?What is a computer?

What is security

Structure

Software engineering

Program dependability

I safety: "bad things (actions) don’t happen"

I liveness: "good things (actions) do happen"

In sequential computation

I all first order constraints are dependability properties

Page 53: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

Examples

Security?What is a computer?

What is security

Structure

Security engineering: Systems

Resource security (access control)

I authorization: "bad resource calls don’t happen"

I availability: "good resource calls do happen"

In an operating or a computer system

I all resource constraints are security properties

Page 54: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

Examples

Security?What is a computer?

What is security

Structure

Security engineering: Systems

Information security

I secrecy: "bad information flows don’t happen"

I authenticity: "good information flows do happen"

In network computation

I all information flow constraints are security properties

Page 55: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

Examples

Security?What is a computer?

What is security

Structure

Security engineering: Networks

Social choice (voting) and market economy

I neutrality: "bad data aggregations don’t happen"

I fairness: "good data aggregations do happen"

In social data processing

I all aggregation constraints are security properties

Page 56: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

Examples

Security?What is a computer?

What is security

Structure

Security vs dependability

processing dependability security

System centralized distributedobservations global local

Environment neutral adversarialthreats accidents attacks

Page 57: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

Examples

Security?What is a computer?

What is security

Structure

Security implementation

Protection and enforcement counter attacks in threephases

I prevention: security properties cannot be breachedI firewalls, cryptography

I detection: security breaches are detectedI intrusion detection, digital forensics

I policy: recovery, penalties, incentivesI legal measures (RIAA, MPAA), economics of security

(cost of an attack must be higher than the expectedprofit of success)

Page 58: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

Examples

Security?

Structure

Outline

Preamble

Security examples

What is computer security?

Structure of the course

Page 59: Computer Security --- Part 1: Introduction · Security 1: Introduction Dusko Pavlovic Preamble Examples Authorization Secrecy Authentication Voting Security? Structure Outline Preamble

Security 1:Introduction

Dusko Pavlovic

Preamble

Examples

Security?

Structure

Structure of the course

Security

xxqqqqqqqqqq

&&NNNNNNNNNNN

Systems sec.

��

Networks sec.

�� &&LLLLLLLLLLL

Resource sec.Part 2 Information sec.

yyttttttttttt

��

Social sec.Part 7

CryptographyPart 3

ProtocolsPart 4

yyttttttttt

%%KKKKKKKKKK

Web sec.Part 5

Pervasive sec.Part 6