Class Introduction
CSC 481/681
Principles of Computer Security
Spring 2024
Welcome!!!
First, some introductions….
CSC 481/681
Principles of Computer Security
Class Introduction
Class Background and Context
(a couple of big points...)
Point 1: This class provides foundation for advanced security classes
A few initial comments and observations:
“SEED Labs” optional textbook - doesn’t cover all of our exercises though
CSC 481/681: Principles
CSC 485/685: Cryptography
CSC 487/687: Network security
Topics? Software security, etc.
CSC 481/681
Principles of Computer Security
Class Introduction
Class Administration
(a couple of big points...)
Point 2: Things that are important to know
CSC 481/681
Principles of Computer Security
Class Introduction
Class Administration
(the boring details… syllabus review)
Availability, contacting me, response time, COVID issues/status, …
Class web page: Open web page vs Canvas
Pre-requisites: CSC 330 and CSC 362 - know:
Student Learning Outcomes:
Textbook: Required! Read before in-class discussion!
CSC 481/681
Principles of Computer Security
Class Introduction
Class Administration
(the boring details… syllabus review)
Hands-on exercises: “Labtainers” from Naval Postgraduate School
Classes:
Grading:
Undergraduates | |
Assignments | 50% |
Mid-term Exam | 20% |
Final Exam | 30% |
Graduate Students | |
Assignments | 45% |
Mid-term Exam | 18% |
Final Exam | 27% |
Research readings/project | 10% |
CSC 481/681
Principles of Computer Security
Class Introduction
Class Administration
(the boring details… syllabus review)
Other syllabus details…
Read the syllabus!
CSC 481/681
Principles of Computer Security
Class Introduction
Security Topics - Threats, Vulnerabilities, Controls
(The fun stuff! With stories!)
Much of this course focuses on
identifying threats (who attacks and why),
vulnerabilities (how to they get in),
and controls (how to design systems securely)
CSC 481/681
Principles of Computer Security
Class Introduction
Security Topics - Threats, Vulnerabilities, Controls
(The fun stuff! With stories!)
Threats - Can be kids being kids (still a serious crime!)
CSC 481/681
Principles of Computer Security
Class Introduction
Security Topics - Threats, Vulnerabilities, Controls
(The fun stuff! With stories!)
Threats - Can be nation-state actors
CSC 481/681
Principles of Computer Security
Class Introduction
Security Topics - Threats, Vulnerabilities, Controls
(The fun stuff! With stories!)
Threats - Can be nation-state actors (we allegedly do it too….)
CSC 481/681
Principles of Computer Security
Class Introduction
Security Topics - Threats, Vulnerabilities, Controls
(The fun stuff! With stories!)
Threats - Can be nation-state actors (we allegedly do it too….)
Threat can be an insider…
CSC 481/681
Principles of Computer Security
Class Introduction
Security Topics - Threats, Vulnerabilities, Controls
(The fun stuff! With stories!)
Threats can be financially motivated
An increasing amount of critical infrastructure is now dependent on information/computer systems for basic delivery
CSC 481/681
Principles of Computer Security
Class Introduction
Security Topics - Threats, Vulnerabilities, Controls
(The fun stuff! With stories!)
Threat: Nation-state actor
Increasingly visible vulnerability: Software supply chain
CSC 481/681
Principles of Computer Security
Class Introduction
Security Topics - Threats, Vulnerabilities, Controls
(The fun stuff! With stories!)
Vulnerabilities - Can come from bugs in software (design or implementation)
Used in first widespread Internet worm (the Morris worm in 1988) - and still the biggest problem today!
CSC 481/681
Principles of Computer Security
Class Introduction
Security Topics - Threats, Vulnerabilities, Controls
(The fun stuff! With stories!)
Vulnerabilities - Can come from bugs in software (design or implementation)
Used in first widespread Internet worm (the Morris worm in 1988) - and still the biggest problem today!
Grad student at Cornell said “I wonder what would happen if….” and it got out of control.
Don’t do this!
CSC 481/681
Principles of Computer Security
Class Introduction
Security Topics - Threats, Vulnerabilities, Controls
(The fun stuff! With stories!)
Vulnerabilities - Can come from bad configuration
This is a huge problem!
CSC 481/681
Principles of Computer Security
Class Introduction
Security Topics - Threats, Vulnerabilities, Controls
(The fun stuff! With stories!)
Vulnerabilities - Can come from poorly-trained people
CSC 481/681
Principles of Computer Security
Class Introduction
Security Topics - Threats, Vulnerabilities, Controls
(The fun stuff! With stories!)
Controls - How to protect your systems/information
Controls we’ll learn about in this class:
CSC 481/681
Principles of Computer Security
Class Introduction
For Next Time...
Read sections 1.1 and 1.4 from the textbook
Start on Section 1.2 if you have time!
CSC 481/681
Principles of Computer Security
Class Introduction