Lecture 1 - Intro To Software Security
Lecture 1 - Intro To Software Security
damage to reputation
human error
broken process loss of confidence
want to abuse
16
• Confidentiality
• Information about system or its users cannot be
learned by an attacker
• Integrity
• The system continues to operate properly, only
SECURITY reaching states that would occur if there were
no attacker
PROPERTIES
• Availability
• Actions by an attacker do not prevent users
from having access to use of the system
GENERAL PICTURE
System
Alice Attacker
• Security is about
• Honest user (e.g., Alice, Bob, …)
• Dishonest Attacker
• How the Attacker
• Disrupts honest user’s use of the system (Integrity, Availability)
• Learns information intended for Alice only (Confidentiality)
NETWORK SECURITY
Network Attacker
System Intercepts and
controls network
communication
Alice
WEB SECURITY
System
Web Attacker
Alice
OPERATING SYSTEM SECURITY
OS Attacker
Controls malicious
files and applications
Alice
System
Alice Attacker
• CO-FOUNDER OF APPLE
• 1970’S WAS A STUDENT AT BERKLEY & MEMBER OF “CALIFORNIA’S HOMEBREW
COMPUTER CLUB”
• MASS PRODUCED “BLUE BOXES” FOR TWO REASONS
• 2) FASCINATION BEHIND “THE POWER OF IDEAS” “THAT TWO TEENAGERS COULD BUILD A SMALL BOX FOR A
HUNDRED DOLLARS AND CONTROL HUNDRED MILLIONS OF DOLLARS OF PHONE INFRASTRUCTURE
KEVIN MITNIK
KEVIN MITNIK
• STARTED AT AGE 12
• HACKED:
• LA’s BUS PUNCH CARD SYSTEM
• CELL PHONES
• FAST FOOD SPEAKER SYSTEMS
• DEC COMPUTER SYSTEM
• WENT ON TWO AND A HALF YEAR HACKING SPREE ACROSS THE COUNTRY
• CAUGHT BY “CELLULAR FREQUENCY DIRECTION-FINDING ANTENNA HOOKED UP TO A
LAPTOP TO NARROW THE SEARCH TO AN APARTMENT COMPLEX”
• SENTENCED TO FIVE YEARS OF PRISON AND EIGHT MONTHS OF SOLITARY
• OWNS HIS OWN COMPUTER SECURITY CONSULTING COMPANY (MITNIK SECURITY
CONSULTING, LLC)
• NOW CAN LEGALLY HACK INTO SERVERS
• STATED “IF I HAD PERFORMED THE SAME HACKS THAT I HAD DONE IN THE PAST TODAY, I
WOULD MOST LIKELY BE IN GUANTANAMO BAY, CONSIDERING ALL THE SECURITY LAWS
PASSED AFTER 9/11
THANK YOU