eecs 588: ctcomputer andd network security · start thinking about your course project; form a...
TRANSCRIPT
![Page 1: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/1.jpg)
EECS 588:C t d Computer and Network SecurityyIntroductionJanuary 13, 2014January 13, 2014
![Page 2: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/2.jpg)
Today’s Classoday s C ass
Welcome! Goals for the course
h Topics, what interests you? Introduction to security research
f d Components of your grade Legal and ethical concerns
![Page 3: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/3.jpg)
Who am I?o a
J Ale HaldermanJ. Alex HaldermanCSE Prof.Princeton Ph.D.Web: https://jhalderm.comp j
Email: [email protected]
Office: 4717 BBB47 7Hours: TuTh 3:30‐4:30
or by appointmenty ppMobile: 609‐558‐2312
![Page 4: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/4.jpg)
How I spent my winter vacationo spe t y te acat o
![Page 5: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/5.jpg)
How I spent my winter vacationo spe t y te acat o
![Page 6: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/6.jpg)
How I spent my winter vacationo spe t y te acat o
![Page 7: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/7.jpg)
How I spent my winter vacationo spe t y te acat o
![Page 8: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/8.jpg)
![Page 9: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/9.jpg)
![Page 10: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/10.jpg)
![Page 11: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/11.jpg)
How I spent my winter vacationo spe t y te acat o
![Page 12: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/12.jpg)
![Page 13: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/13.jpg)
![Page 14: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/14.jpg)
![Page 15: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/15.jpg)
![Page 16: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/16.jpg)
My Work – Electronic Votingy o ect o c ot g
![Page 17: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/17.jpg)
Alex’s Work – Electronic Votinge s o ect o c ot g
![Page 18: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/18.jpg)
My Work – Disk Encryptiony o s c ypt o
![Page 19: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/19.jpg)
My Work –Anticensorshipy o t ce so s p
![Page 20: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/20.jpg)
My Work – Internet Measurementy
![Page 21: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/21.jpg)
My Work – HTTPSy o S
![Page 22: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/22.jpg)
Goals for this CourseGoa s o t s Cou se
G i h d i Gain hands‐on experienceBuilding secure systemsE l ti t itEvaluating system security
Prepare for researchComputer security subfieldSecurity‐related issues in other areas
Generally, improve research, writing, and presentation skills
Learn to be a 1337 hax0r, but an ethical one!
![Page 23: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/23.jpg)
Getting In, Getting an AGett g , Gett g a
Waitlist?
Prereqs: EECS482 or EECS489 or grad standing
We’ll grant everybody overrides, but can’t h d k ll bguarantee hard work will bring success,
unless you have the prerequisites.
![Page 24: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/24.jpg)
Building BlocksThe security mindset, thinking like an attacker, reasoning about risk, research ethicsSymmetric ciphers, hash functions, message authentication codes, pseudorandom generatorsKey exchange, public‐key cryptography, key management, the SSL protocol
Software SecurityExploitable bugs: buffer overflows and other common vulnerabilities – attacks and defensesMalware: viruses, spyware, rootkits – operation and detectionAutomated security testing and tools for writing secure codeVirtualization, sandboxing, and OS‐level defenses
Web SecurityThe browser security modelWeb site attacks and defenses: cross‐site scripting, SQL injection, cross‐site reference forgeryInternet crime: spam, phishing, botnets – technical and nontechnical responses
Network SecurityNetwork protocols security: TCP and DNS – attacks and defensesPolicing packets: Firewalls, VPNs, intrusion detectionDenial of service attacks and defensesData privacy, anonymity, censorship, surveillance
Advanced Topics
Not a crypto
Hardware security – attacks and defensesTrusted computing and digital rights managementElectronic voting – vulnerabilities, cryptographic voting protocols
course
![Page 25: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/25.jpg)
Getting to Know YouGett g to o ou
Who are you?
Wh t t i i t t ? What topics interest you?
What would you like to learn in this course?y
![Page 26: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/26.jpg)
What is Computer Security?at s Co pute Secu ty
Math?
Engineering?
Philosophy?Philosophy?
Natural Natural Sciences?
![Page 27: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/27.jpg)
What is Security Research?at s Secu ty esea c
f“The study of how systems behave in the presence of p
an adversary*.”
* An intelligence that actively tries to cause the system to misbehave.
![Page 28: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/28.jpg)
What’s the Difference?at s t e e e ce
![Page 29: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/29.jpg)
Why is Security its own Area of CS?y y
![Page 30: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/30.jpg)
Who does Security Research?o does Secu ty esea c
Academia Industry
l Military Hobbyists
Bad guys…
![Page 31: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/31.jpg)
“Insecurity”?secu ty
HierarchyLevel‐2 Problem: “Weakness”
Factors that predispose systems to vulnerability
Level‐1 Problem: “Vulnerability”Specific errors that could be exploited in an assault.
“Attack”l
p p
Level‐0 Problem: “Assault”
Assault recipe,vulnerabilities are ingredients
Actual malicious attempt to cause harm.
![Page 32: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/32.jpg)
High‐Level Approachesg e e pp oac es
Attacks Defenses
![Page 33: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/33.jpg)
Why Study Attacks?y Study ttac s
f f f Identify flaws so they can be fixed Pressure vendors to be more careful
b l f h Learn about new classes of threats Motivate new research on defenses Determine what we need to defend against Help designers build better threat models Help users more accurately evaluate risk
Identify false design assumptionsImprove models used for proof of security
![Page 34: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/34.jpg)
Thinking Like an Attackerg e a ttac e
k f k l k k Look for weakest links – easiest to attack Insider attacks, social engineering
Thi k t id th b t t i d b t Think outside the box – not constrained by system designer’s worldview Side channel attacks (TEMPEST power analysis) Side‐channel attacks (TEMPEST, power analysis)
Identify assumptions that security depends Practice thinking like an attacker: that security depends on – are they false? e.g. cold‐boot attacks
Practice thinking like an attacker: For every system you interact with,think about what it means for it to b d i h it ld
gbe secure, and image how it could
be exploited by an attacker.
![Page 35: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/35.jpg)
Exercisese c ses
Breaking into the CSE building
![Page 36: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/36.jpg)
Exercisese c ses
Stealing an election
![Page 37: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/37.jpg)
Exercisese c ses
Stealing my password
![Page 38: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/38.jpg)
Exercisese c ses
What are some security systems you interact with in everyday life?
![Page 39: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/39.jpg)
Thinking Like a Defenderg e a e e de
S it li Security policy What properties are we trying to enforce?
Threat model Threat model What kind of attack are we trying to prevent? Who are the attackers? Capabilities? Motivations?
Risk assessment What will successful attacks cost us? How likely? How likely?
Countermeasures Costs vs. benefits?
Challenge is to think rationally and
l b k Technical vs. nontechnical? rigorously about risks.
Controlled paranoia.
![Page 40: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/40.jpg)
Exercisese c ses
f Using a credit card safely
![Page 41: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/41.jpg)
Exercisese c ses
Should you lock your door?
![Page 42: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/42.jpg)
Spotting Security Snake‐Oil?Spott g Secu ty S a e O
ff Kerckhoffs’s principleShould be secure even if everything about the d i i bli t f th t kdesign is public—except for the secret keys
Roll‐Your‐Own EncryptionJ t b ’t b k it d ’t it’ Just because you can’t break it doesn’t mean it’s hard to break – look for AES, SHA‐2, etc.
![Page 44: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/44.jpg)
Recall Course Goalseca Cou seGoa s
G i h d i Gain hands‐on experienceBuilding secure systemsE l ti t itEvaluating system security
Prepare for researchComputer security subfieldSecurity‐related issues in other areas
Generally, improve research and communication skills
Learn to be a 1337 hax0r, but an ethical one!
![Page 45: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/45.jpg)
GradingG ad g
Class Participation (5%)
Paper Responses (15%)
Attack Presentation (30%)
Research Project (50%)
N bl t !
Research Project (50%)
No exams, no problem sets!
![Page 46: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/46.jpg)
Class Participation (5%)C ass a t c pat o (5%)
f ~2 required papers for discussion in each session (other readings optional but recommended)
d b Come prepared to contribute! Full points for speaking up and contributing
b l dsubstantial ideas Lose points for being silent, frequently missing
l f b kclass, facebook, etc.
![Page 47: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/47.jpg)
Paper Responses (15%)ape espo ses ( 5%)
B i f itt t h ( d )Brief written response to each paper (~400 words)
In the first paragraph:In the first paragraph: State the problem that the paper tries to solve; and Summarize the main contributions.
In one or more additional paragraphs: Evaluate the paper's strengths and weaknesses; Discuss something you would have done differently if you had written the paper; and
Suggest interesting open problems on related topics Suggest interesting open problems on related topics.
![Page 48: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/48.jpg)
Attack Presentation (30%)ttac ese tat o (30%)
h h f k f With a partner, choose a specific attack from recent research and implement a demonstration
Give a 15 minute presentation:(1) describe the attack(2) talk about how you implemented it, give a demo(3) discuss possible defenses
Course schedule will list topics later today Each group send me ratings for each choice by 5pm
dFriday
![Page 49: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/49.jpg)
Research Project (50%)esea c oject (50%)
fIn groups, investigate new attack/defense/toolAim for a publishable workshop paper.
Components (more detail on website): Preproposal presentation
l Project proposal Project checkpoint Workshop style presentation in class Workshop‐style presentation in class Final workshop‐style report
![Page 50: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/50.jpg)
CommunicationCo u cat o
C W b SitCourse Web Sitehttp://www.eecs.umich.edu/courses/eecs588/h d l dischedule, readings
PiazzaPiazzaannouncements, discussion
Email [email protected] @suggestions, questions, concerns
![Page 51: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/51.jpg)
Law and Ethicsa a d t cs
D ’t b il! Don’t be evil! Ethics requires you to refrain from doing harm Always respect privacy and property rights Always respect privacy and property rights Otherwise you will fail the course
Federal and state laws criminalize computer Federal and state laws criminalize computer intrusion and wiretapping e.g. Computer Fraud and Abuse Act (CFAA) You can be sued or go to jail
University policies prohibit tampering with campus systemscampus systems You can be disciplined, even expelled
![Page 52: EECS 588: CtComputer andd Network Security · Start thinking about your course project; Form a group, present topiic idea FbFebruary 266. Title: Microsoft PowerPoint - 588-w15-Intro.pptx](https://reader034.vdocuments.net/reader034/viewer/2022052023/60388f34811caf35f84332fd/html5/thumbnails/52.jpg)
Your Assignments…ou ss g e ts
First paper discussion Tuesday (2 MD5 papers)See course site for required reading
b dRemember to send written responses
Find a partner and rate the topics for your Find a partner and rate the topics for your attack presentation;email topic ratings by 5pm this Fridayemail topic ratings by 5pm this Friday
Start thinking about your course project;F i id F b 6Form a group, present topic idea February 26