Computer Security
Computer Security
Course Introduction
Pavel Laskov
Wilhelm Schickard Institute for Computer Science
Computer security in headlines
Motivation for security abuse
Motivation for security abuse
NewNeuer Schadcode
malicious pro observed
code samples Jahr (Symantec)
(Symantec)
3.000.000
2.250.000
1.500.000
750.000
0
2002 2003 2004 2005 2006 2007 2008 2009
Technische Universität B
Why are computer systems insecure?
Why are computer systems insecure?
Reaction
Detection
Prevention
Prevention instruments
Goals:
Understand the root causes of successful attacks.
Update prevention mechanisms.
Real-time response, autonomous decisions.
Examples:
Computer forensics: investigation of infected systems.
Malware collection and analysis.
Intelligent firewalls.
Limitations:
Even larger latency, “post-mortem” operation.
Significant risk of real-time response.
What will you learn?
Lectures:
Wed, 14:00 (ct) – 16:00, A301
Formalities:
Credit hours (diploma): 2 SWS (lectures) + 1 SWS (exercises)
Credit points (B.Sc.): 3 LP (lectures) + 1 LP (exercises)
Exams and grading:
diploma: oral exam by appointment, graded certificate for
exercises
B.Sc: written exam at the end of semester, 30% of the final
grade from exercises
Office hours: by appointment
Course web page:
http://www.cogsys.cs.uni-tuebingen.de/lehre/ws12/it sicherheit.html
Homework assignments
Meetings:
Thu, 14:00 (ct) – 16:00, F122, on selected dates
First meeting: 08.11
3 written homework assignments
2 lab meetings and practical assignments
Teaching assistant: Nedim Šrndić
Evaluation and grade:
diploma: a grade reflects the percentage of points acquired.
B.Sc.: a grade contributes 30% to the final grade.
Bibliography
Dieter Gollmann.
Computer Security. 3rd edition.
Wiley & Sons, 2010.
Ross Anderson.
Security Engineering.
Wiley & Sons, 2001.
Bruce Schneier.
Secrets and Lies: Digital Security in a Networked World.
Wiley & Sons, 2004. (fun to read)
A typical web application
Legitimate user
Internet
Browser
Webserver
Attack: interception of communication
Legitimate user
Internet
Browser
Webserver
Attacker
Security goal: confidentiality
Legitimate user
Internet
Browser
Webserver
Attack: identity spoofing
Legitimate user
Internet
Browser
Webserver
Attacker
Fake webserver
Security goal: authentication
Legitimate user
Internet
Browser
Webserver
Attack: injection of malicious code
Legitimate user
Internet
Malware
Browser XSS
Webserver attack
Attacker
Security goal: integrity
Legitimate user
Internet
Browser
Webserver
Attack: server overload
Server overloaded
Legitimate user
Internet
Browser
Security goal: availability
Legitimate user
Internet
Browser
Webserver
Attack: transaction denial by a user
Legitimate user
Internet
Browser
Webserver
Transaction cancelled