Prospectus for Security for Networked Systems for Spring 2015, including policies, grading, and goals.
Some topics have a corresponding laboratory exercise. Please expect ten laboratory exercises which will be started during the discussion sessions in the security laboratory in Informatics. In order to make certain that you will have all-hours access, please make sure we have a record of you as in the course. Sessions with no lab allow you to catch up, there will be an AI available during discussion time in the lab every week.
Goals, policies, struture and syllabus. Discussion of goals to ensure the goals fit the class. What topic is missing, is too lightly covered, or is too heavily considered in the following readings? Syllabus provided in class. We will discuss a recent attack, one that has occurred shortly before the semester begins.
Confidentialy, integrity, availability, survivability, and their interactions.
Requirements, Bell-LaPadula, Biba integriy
Basics of symmetric encryption, issues of key exchange.
Goals, structure, purpose, and why you should keep closely to the standard.
Understanding the use of certificates in TLS
Fast SSL and other bad ideas, weaknesses in TLS authentication software
Early denial of service attacks and defenses
DDoS, Applification attacks, botnets
Mobile threats, permissions
iPhone and Android malware identification
Something you know, something you have, something you are and emerging authentication mechanisms
Anonymity, pseudonymity, and the interaction of authentication and anonymity
traditional malware, early malware
emergent malware
Recent trends in malware and malware defense
Foundations, rule-based, statistical and machine learning approaches
Security mechanisms, tools, and their interdependencies
Security mechanisms, tools, and their interdependencies
Network security, OSI Model
BGP security, leaks and hijacks
spam, its use in attacks, and prevention
Anonymous communications, trade-offs and mechanics
Basic usable security
Social engineering
Focus on BGP and the rejected standards, economics of CAs. May be replaced with presentations depending on class participants.
First set of short in-class presentations. , may be extended to discussion sections for time. Sign up is first come, first served.