Network Security and Privacy
Oliver Jensen
https://www.cs.utexas.edu/~ojensen/courses/cs361s/
Who’s Who?
I’m a Graduate Student
Prerequisites
Course Logistics
�UTCS Code of Conduct will be strictly enforced.
No makeup or substitute exams!
If you are not sure you will be able to take the exams in class on the assigned dates,
do not take this course
Late Submission Policy
Additional Policies
Course Materials
Other Helpful Books
Main Themes of the Course
What This Course is Not About
What this is all about
https://
Terms of Use
YOU ACKNOWLEDGE THAT NEITHER WELLS FARGO, ITS AFFILIATES, NOR ANY OF THEIR RESPECTIVE EMPLOYEES, AGENTS, THIRD PARTY CONTENT PROVIDERS, OR LICENSORS WARRANT THAT THE SERVICES OR THE SITE WILL BE UNINTERRUPTED OR ERROR FREE; NOR DO THEY MAKE ANY WARRANTY AS TO THE RESULTS THAT MAY BE OBTAINED FROM USE OF THE SERVICES OR THE SITE, OR AS TO THE TIMELINESS, SEQUENCE, ACCURACY, RELIABILITY, COMPLETENESS, OR CONTENT OF ANY INFORMATION, SERVICE, OR MERCHANDISE PROVIDED THROUGH THE SERVICES AND THE SITE.
Translation:
“Did we just transfer all your money to some random dude?
...Oops.”
What do you think?
What do you think should be included in
“privacy and security” for an e-commerce website?
?
Desirable Security Properties
…
Syllabus (1): Security Mechanisms
Syllabus (2): Attacks and Defenses
Peek at the Dark Side
We look at attack techniques to learn how to build better defenses.
You’re over 18 now - exploiting a system is a great way to end up in jail.
“Exploiting a system” is defined very loosely in the USA
A Security Engineer’s Mindset
[Bruce Schneier]
Ken Thompson
ACM Turing Award, 1983
“Reflections on Trusting Trust”
“Reflections on Trusting Trust”
“Reflections on Trusting Trust”
compiler(S) {
if (match(S, "login-pattern")) {
compile (login-backdoor)
return
}
if (match(S, "compiler-pattern")) {
compile (compiler-backdoor)
return
}
.... /* compile as usual */
}
“Reflections on Trusting Trust”
“The moral is obvious. You can't trust code that
you did not totally create yourself. (Especially
code from companies that employ people like me.)”
Network Stack
people
application
session
transport
network
data link
physical
email, Web, NFS
RPC
TCP
IP
802.11
RF
phishing attacks, usability
Sendmail, FTP, NFS bugs, chosen- protocol and version-rollback attacks
RPC worms, portmapper exploits
SYN flooding, RIP attacks, sequence number prediction
IP smurfing and other address spoofing attacks
WEP attacks
RF fingerprinting, DOS
Only as secure as the single weakest layer… or interconnection between layers
Network Defenses
Cryptographic Primitives
Protocols and Policies
Implementations
End Uses
people
systems
blueprints
building
blocks
Password managers,
company policies...
Firewalls, intrusion detection...
TLS, IPsec, access control...
RSA, DSS, SHA-1...
All defense mechanisms must work correctly and securely
Correctness versus Security
What Drives the Attackers?
Marketplace for Vulnerabilities
It’s a Business
Marketplace for Stolen Data
Prices dropped since 2011, indicating supply glut
[Dell SecureWorks, 2013]
Marketplace for Victims
[Trend Micro, “Russian Underground 101”, 2012]
Bad News
Better News
Reading Assignment