Introduction and Security Principles
CS 161 - Lecture 1
Computer Science 161
Today
2
Computer Science 161
Introductions
3
Computer Science 161
Who Am I? Nicholas
4
Computer Science 161
Who Am I? Peyrin
5
Actual real picture of me.
Computer Science 161
And a team of talented TAs and readers!
6
Sid Bansal
he/him
Prachi Deo
Jinan Jiang
he/him
Fuzail Shakir
he/him
Jun Hee Han
he/him
Solomon Joseph
he/him
Kenneth Lien
he/him
vron
they/them or ey/em
EvanBot
any/all
TAs
Readers
Computer Science 161
Course Logistics
7
Computer Science 161
Learning Objectives
8
Computer Science 161
Course Outline
9
Computer Science 161
Course Outline
10
Computer Science 161
Extra Tools and Skills
11
Computer Science 161
Prerequisites
12
Computer Science 161
Course Structure
13
Computer Science 161
Resources
14
Least
Helpful
Most
Helpful
Spring 2021 survey: How helpful was the textbook?
Computer Science 161
Platforms
15
Computer Science 161
Platforms
16
Computer Science 161
Grading Structure
17
Computer Science 161
Class Policies: Submission Policy
18
Computer Science 161
Class Policies: Collaboration
19
Computer Science 161
Class Policies: Academic Honesty
20
Computer Science 161
Class Policies: Exam Proctoring
21
Computer Science 161
Class Policies: DSP and Extenuating Circumstances
22
Computer Science 161
Stress Management and Mental Health
Your health is more important than this course
23
Computer Science 161
Ethics
24
Computer Science 161
Case Studies and Blue Slides
25
Computer Science 161
What is security?
26
Computer Science 161
What is security?
27
Computer Science 161
Why is security important?
28
Computer Science 161
Why is security important?
29
| |
FBI probe of alleged plane hack sparks worries over flight safety | |
Drew Harwell | May 18, 2015 |
| |
Pacemaker hack can kill via laptop | |
Jeremy Kirk | October 21, 2012 |
Computer Science 161
Why is security important?
30
In 2018, there were over 1,200 breaches, totalling 450,000,000 records compromised!
| |
91 Percent of Healthcare Organizations Suffered Data Breaches in the Past Two Years | |
Jeff Goldman | May 12, 2015 |
| |
Data Breach Tracker: All the Major Companies That Have Been Hacked | |
Karavbrandeisky | October 30, 2014 |
Computer Science 161
Why is security important?
31
| |
Inside the Cunning, Unprecedented Hack of Ukraine's Power Grid | |
Kim Zetter | March 3, 2016 |
| |
A Cyber-Weapon Warhead Test | |
Nicholas Weaver | June 14, 2017 |
Computer Science 161
What is hackable?
32
| |
For the First Time, Hackers Have Used a Refrigerator to Attack Businesses | |
Julie Bort | January 17, 2014 |
Computer Science 161
Security Principles
33
Computer Science 161
The Parable of the Bear Race
“I don’t have to outrun the bear. I just have to outrun you.”�Takeaway: You often just need to have “good enough” defense to make attackers turn somewhere else.
34
Computer Science 161
Security Principle: Know Your Threat Model
35
Computer Science 161
Security Principle: Know Your Threat Model
36
Computer Science 161
The National Security Agency (NSA)
37
Computer Science 161
Threat Model: Common Assumptions for Attackers
38
Computer Science 161
Trusted Computing Base
39
Computer Science 161
Warning Dialogs
40
Computer Science 161
Warning Dialogs
41
Computer Science 161
Warning Dialogs
42
Computer Science 161
Warning Dialogs
Takeaway: Consider human factors
43
Computer Science 161
Security Principle: Consider Human Factors
44
Physical security keys use the fact that humans are trained to safeguard keys
Computer Science 161
Physical Safes
Takeaway: Security is economics
45
TL-15 ($3,000)�15 minutes with common tools
TL-30 ($4,500)�30 minutes with common tools
TRTL-30 ($10,000)�30 minutes with common tools and a cutting torch
TXTL-60 (>$50,000)�60 minutes with common tools, a cutting torch, and up to 4 oz of explosives
Computer Science 161
Security Principle: Security is Economics
46
Computer Science 161
Burglar Alarms
47
Computer Science 161
Security Principle: Detect if You Can’t Prevent
48
Computer Science 161
Response: Mitigation and Recovery
49
Computer Science 161
Detection but no Response
50
| |
Hacked Bitcoin Exchange Says Users May Share $68 Million Loss | |
Lulu Yilun Chen and Yuji Nakamura | August 5, 2016 |
Computer Science 161
The Theodosian Walls of Constantinople
51
Computer Science 161
Security Principle: Defense in Depth
52
Computer Science 161
uTorrent
53
Computer Science 161
uTorrent
54
Computer Science 161
uTorrent
55
Computer Science 161
uTorrent
56
Computer Science 161
uTorrent
57
Computer Science 161
Security Principle: Least Privilege
58
Computer Science 161
Welcome to a Nuclear Bunker
59
Computer Science 161
Welcome to a Movie Theater
60
Computer Science 161
Security Principle: Separation of Responsibility
61
Computer Science 161
Spot the Issue
62
Computer Science 161
Security Principle: Ensure Complete Mediation
63
The cars drove around the barrier
Computer Science 161
Time-of-Check to Time-of-Use
64
procedure withdrawal(w)
// contact central server to get balance
1. let b := balance
2. if b < w, abort
// contact server to set balance
3. set balance := b - w
4. give w dollars to user
Suppose you have $5 in your account. How can you trick this system into giving you more than $5?
Computer Science 161
Time-of-Check to Time-of-Use
withdrawal(4)�1. let b := balance�2. if b < w, abort
��withdrawal(4)�1. let b := balance�2. if b < w, abort�
// contact server to set balance�3. set balance := b - w��4. give w dollars to user
65
// contact server to set balance�3. set balance := b - w��4. give w dollars to user
The machine gives you $8!
Computer Science 161
Accident on Motorway
66
Here’s the hidden computer inside the sign.
Here’s a highway sign.
Here’s the control panel. The user manual says you can reset the password by entering DIPY.
Computer Science 161
Caution! Zombies Ahead!!!
Note: Do not ever do this. Yes, some former CS 161 students did it once.
67
Computer Science 161
Trapped in Sign Factory! Send Help!
Takeaway: Shannon’s maxim/Don’t rely on security through obscurity
68
Computer Science 161
Security Principle: Shannon’s Maxim
69
Assume the attacker knows where the “secret” control panel is located, and has read the manual with instructions on resetting the password.
Computer Science 161
Soda Hall
70
Computer Science 161
Security Principle: Use Fail-Safe Defaults
71
Computer Science 161
Security Principle: Design in Security from the Start
72
Computer Science 161
Security Principles: Summary
73
Computer Science 161