25
Outline Highlights Data Breaches Defenses CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 1 August 30, 2017 Slide credits: Mariana Raykova, Tom Ristenpart, Stefano Tessaro, as well as the teaching slides for Introduction to Security by Goodrich, Tamassia CPSC 467, Lecture 1 1/25

CPSC 467: Cryptography and Computer Securityzoo.cs.yale.edu/classes/cs467/2017f/course/lectures/ln01.pdf · 2017-09-01 · Outline Highlights Data Breaches Defenses CPSC 467: Cryptography

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CPSC 467: Cryptography and Computer Securityzoo.cs.yale.edu/classes/cs467/2017f/course/lectures/ln01.pdf · 2017-09-01 · Outline Highlights Data Breaches Defenses CPSC 467: Cryptography

Outline Highlights Data Breaches Defenses

CPSC 467: Cryptography and Computer Security

Michael J. Fischer

Lecture 1August 30, 2017

Slide credits: Mariana Raykova, Tom Ristenpart, Stefano Tessaro, as well as theteaching slides for Introduction to Security by Goodrich, Tamassia

CPSC 467, Lecture 1 1/25

Page 2: CPSC 467: Cryptography and Computer Securityzoo.cs.yale.edu/classes/cs467/2017f/course/lectures/ln01.pdf · 2017-09-01 · Outline Highlights Data Breaches Defenses CPSC 467: Cryptography

Outline Highlights Data Breaches Defenses

Highlights from Syllabus

Data Breaches

Defending Against Attacks

CPSC 467, Lecture 1 2/25

Page 3: CPSC 467: Cryptography and Computer Securityzoo.cs.yale.edu/classes/cs467/2017f/course/lectures/ln01.pdf · 2017-09-01 · Outline Highlights Data Breaches Defenses CPSC 467: Cryptography

Outline Highlights Data Breaches Defenses

Highlights from Syllabus

CPSC 467, Lecture 1 3/25

Page 4: CPSC 467: Cryptography and Computer Securityzoo.cs.yale.edu/classes/cs467/2017f/course/lectures/ln01.pdf · 2017-09-01 · Outline Highlights Data Breaches Defenses CPSC 467: Cryptography

Outline Highlights Data Breaches Defenses

Expectations

Read the syllabus! Some highlights:

I Pay attention to policies on plagiarism, submitting your work,and electronics in class.

I Teaching assistant is Senia Sheydvasser.

I The midterm and final exam are both scheduled. Keep thosedates clear.

I You will use the Zoo for programming and Canvas forhomework submissions.

I Do problem set 1!

CPSC 467, Lecture 1 4/25

Page 5: CPSC 467: Cryptography and Computer Securityzoo.cs.yale.edu/classes/cs467/2017f/course/lectures/ln01.pdf · 2017-09-01 · Outline Highlights Data Breaches Defenses CPSC 467: Cryptography

Outline Highlights Data Breaches Defenses

Class attendance

Class attendance and class participation are required. Why?

I I say things that don’t find their way into the lecture notes.

I Your questions help me pace my lectures and address theneeds of the class.

I I like teaching much better than lecturing to an empty room.

I If you’re confused, others are likely confused too and might bebrave enough to ask for clarification. You can learn fromthem.

Please always feel free to ask questions.

Also, please let me know in case you have to miss class.

CPSC 467, Lecture 1 5/25

Page 6: CPSC 467: Cryptography and Computer Securityzoo.cs.yale.edu/classes/cs467/2017f/course/lectures/ln01.pdf · 2017-09-01 · Outline Highlights Data Breaches Defenses CPSC 467: Cryptography

Outline Highlights Data Breaches Defenses

Electronics during class

You may use laptops, smart phones, and other electronic devicesfor purposes related to the lecture only.

Permitted:

I Taking notes.

I Looking briefly at lecture-related materials on the web.

Not permitted:

I Reading email.

I Visiting Facebook, Twitter, and other social media sites.

I Texting/messaging your friends.

If you must answer a call or engage in a not-permitted activity,please step out of the room so as to not disrupt class.

CPSC 467, Lecture 1 6/25

Page 7: CPSC 467: Cryptography and Computer Securityzoo.cs.yale.edu/classes/cs467/2017f/course/lectures/ln01.pdf · 2017-09-01 · Outline Highlights Data Breaches Defenses CPSC 467: Cryptography

Outline Highlights Data Breaches Defenses

Data Breaches

CPSC 467, Lecture 1 7/25

Page 8: CPSC 467: Cryptography and Computer Securityzoo.cs.yale.edu/classes/cs467/2017f/course/lectures/ln01.pdf · 2017-09-01 · Outline Highlights Data Breaches Defenses CPSC 467: Cryptography

Outline Highlights Data Breaches Defenses

Protecting information in the real world

Massive security breaches are disclosed almost daily.

I Identity theft.

I Industrial espionage.

I Cyberwarfare.

I Denial-of-service.

I Surveillance.

I Misuse of personal data.

CPSC 467, Lecture 1 8/25

Page 9: CPSC 467: Cryptography and Computer Securityzoo.cs.yale.edu/classes/cs467/2017f/course/lectures/ln01.pdf · 2017-09-01 · Outline Highlights Data Breaches Defenses CPSC 467: Cryptography

Outline Highlights Data Breaches Defenses

Credit card numbers stolen

CPSC 467, Lecture 1 9/25

Page 10: CPSC 467: Cryptography and Computer Securityzoo.cs.yale.edu/classes/cs467/2017f/course/lectures/ln01.pdf · 2017-09-01 · Outline Highlights Data Breaches Defenses CPSC 467: Cryptography

Outline Highlights Data Breaches Defenses

08/27/2017 5Cryptography & Computer Security, CPSC 467/567

CPSC 467, Lecture 1 10/25

Page 11: CPSC 467: Cryptography and Computer Securityzoo.cs.yale.edu/classes/cs467/2017f/course/lectures/ln01.pdf · 2017-09-01 · Outline Highlights Data Breaches Defenses CPSC 467: Cryptography

Outline Highlights Data Breaches Defenses

CPSC 467, Lecture 1 11/25

Page 12: CPSC 467: Cryptography and Computer Securityzoo.cs.yale.edu/classes/cs467/2017f/course/lectures/ln01.pdf · 2017-09-01 · Outline Highlights Data Breaches Defenses CPSC 467: Cryptography

Outline Highlights Data Breaches Defenses

Interactive visualization

The previous images came from the Information is Beautifulinteractive web site,http://www.informationisbeautiful.net/visualizations/

worlds-biggest-data-breaches-hacks.

Click here to try it for yourself.

CPSC 467, Lecture 1 12/25

Page 13: CPSC 467: Cryptography and Computer Securityzoo.cs.yale.edu/classes/cs467/2017f/course/lectures/ln01.pdf · 2017-09-01 · Outline Highlights Data Breaches Defenses CPSC 467: Cryptography

Outline Highlights Data Breaches Defenses

Round 2 of the crypto wars

08/27/2017 6CPSC 467, Lecture 1 13/25

Page 14: CPSC 467: Cryptography and Computer Securityzoo.cs.yale.edu/classes/cs467/2017f/course/lectures/ln01.pdf · 2017-09-01 · Outline Highlights Data Breaches Defenses CPSC 467: Cryptography

Outline Highlights Data Breaches Defenses

Cyberwarfare

08/27/2017 7Cryptography & Computer Security, CPSC 467/567

CPSC 467, Lecture 1 14/25

Page 15: CPSC 467: Cryptography and Computer Securityzoo.cs.yale.edu/classes/cs467/2017f/course/lectures/ln01.pdf · 2017-09-01 · Outline Highlights Data Breaches Defenses CPSC 467: Cryptography

Outline Highlights Data Breaches Defenses

Even the NSA can’t protect its secrets

17 January 2014 US & Canada

Edward Snowden: Leaks that exposedUS spy programme

Edward Snowden, a former contractor for the CIA, left the US inlate May after leaking to the media details of extensive internetand phone surveillance by American intelligence. Mr Snowden,who has been granted temporary asylum in Russia, facesespionage charges over his actions.

As the scandal widens, BBC News looks at the leaks that brought USspying activities to light.

US spy agency 'collects phone records'

The scandal broke in early J une 2013when the Guardian newspaper reportedthat the US National Security Agency (NSA)was collecting the telephone records of tensof millions of Americans.

Edward Snowden: Leaks that exposed US spy programme - BBC... http://www.bbc.com/news/world-us-canada-23123964

1 of 11 3/27/16, 10:41 PM

CPSC 467, Lecture 1 15/25

Page 16: CPSC 467: Cryptography and Computer Securityzoo.cs.yale.edu/classes/cs467/2017f/course/lectures/ln01.pdf · 2017-09-01 · Outline Highlights Data Breaches Defenses CPSC 467: Cryptography

Outline Highlights Data Breaches Defenses

Security software bugs can be exploited

CPSC 467, Lecture 1 16/25

Page 17: CPSC 467: Cryptography and Computer Securityzoo.cs.yale.edu/classes/cs467/2017f/course/lectures/ln01.pdf · 2017-09-01 · Outline Highlights Data Breaches Defenses CPSC 467: Cryptography

Outline Highlights Data Breaches Defenses

Network configuration errors

08/27/2017 10Cryptography & Computer Security, CPSC 467/567CPSC 467, Lecture 1 17/25

Page 18: CPSC 467: Cryptography and Computer Securityzoo.cs.yale.edu/classes/cs467/2017f/course/lectures/ln01.pdf · 2017-09-01 · Outline Highlights Data Breaches Defenses CPSC 467: Cryptography

Outline Highlights Data Breaches Defenses

Personal info can be compromised despite anonymization

CPSC 467, Lecture 1 18/25

Page 19: CPSC 467: Cryptography and Computer Securityzoo.cs.yale.edu/classes/cs467/2017f/course/lectures/ln01.pdf · 2017-09-01 · Outline Highlights Data Breaches Defenses CPSC 467: Cryptography

Outline Highlights Data Breaches Defenses

WannaCry Ransomware1

Criminals go where the money is, and cybercriminals are no exception.

And right now, the money is in ransomware.

It’s a simple scam. Encrypt the victim’s hard drive, then extract a fee todecrypt it. The scammers can’t charge too much, because they want thevictim to pay rather than give up on the data. But they can chargeindividuals a few hundred dollars, and they can charge institutions likehospitals a few thousand. Do it at scale, and it’s a profitable business.

1Notes by Bruce Schneier, Crypto-Gram, June 15, 2017.

CPSC 467, Lecture 1 19/25

Page 20: CPSC 467: Cryptography and Computer Securityzoo.cs.yale.edu/classes/cs467/2017f/course/lectures/ln01.pdf · 2017-09-01 · Outline Highlights Data Breaches Defenses CPSC 467: Cryptography

Outline Highlights Data Breaches Defenses

WannaCry Ransomware (cont.)

And scale is how ransomware works. Computers are infectedautomatically, with viruses that spread over the internet. Payment is nomore difficult than buying something online – and payable in untraceablebitcoin – with some ransomware makers offering tech support to thoseunsure of how to buy or transfer bitcoin. Customer service is important;people need to know they’ll get their files back once they pay.

And they want you to pay. If they’re lucky, they’ve encrypted yourirreplaceable family photos, or the documents of a project you’ve beenworking on for weeks. Or maybe your company’s accounts receivable filesor your hospital’s patient records. The more you need what they’vestolen, the better.

The particular ransomware making headlines is called WannaCry, and it’sinfected some pretty serious organizations.

CPSC 467, Lecture 1 20/25

Page 21: CPSC 467: Cryptography and Computer Securityzoo.cs.yale.edu/classes/cs467/2017f/course/lectures/ln01.pdf · 2017-09-01 · Outline Highlights Data Breaches Defenses CPSC 467: Cryptography

Outline Highlights Data Breaches Defenses

Defending Against Attacks

CPSC 467, Lecture 1 21/25

Page 22: CPSC 467: Cryptography and Computer Securityzoo.cs.yale.edu/classes/cs467/2017f/course/lectures/ln01.pdf · 2017-09-01 · Outline Highlights Data Breaches Defenses CPSC 467: Cryptography

Outline Highlights Data Breaches Defenses

The Digital Landscape

CPSC 467, Lecture 1 22/25

Page 23: CPSC 467: Cryptography and Computer Securityzoo.cs.yale.edu/classes/cs467/2017f/course/lectures/ln01.pdf · 2017-09-01 · Outline Highlights Data Breaches Defenses CPSC 467: Cryptography

Outline Highlights Data Breaches Defenses

Computer Security

Computer Security

Computer Security

Operating Systems

Networks

Mathematics / Theoretical CS

Social sciences

Computer architecture

Economics

Psychology

Law and policy

Crime science / forensics

CPSC 467, Lecture 1 23/25

Page 24: CPSC 467: Cryptography and Computer Securityzoo.cs.yale.edu/classes/cs467/2017f/course/lectures/ln01.pdf · 2017-09-01 · Outline Highlights Data Breaches Defenses CPSC 467: Cryptography

Outline Highlights Data Breaches Defenses

How is security achieved in the real world?

I Prevention: Physical barriers, access controls, encryption,firewalls, human awareness, etc.

I Detection: Audits, checks and balances.

I Legal means: Laws, patents, trademarks, copyrights,sanctions against wrongdoers.

I Concealment: Camouflage, steganography.

CPSC 467, Lecture 1 24/25

Page 25: CPSC 467: Cryptography and Computer Securityzoo.cs.yale.edu/classes/cs467/2017f/course/lectures/ln01.pdf · 2017-09-01 · Outline Highlights Data Breaches Defenses CPSC 467: Cryptography

Outline Highlights Data Breaches Defenses

Different stakeholders have differing interests

Consider an on-line banking web site.

I What are the interests of the customer?

I What are the interests of the bank?

I What are the interests of possible intruders?

I Can the bank trust the customer? Why or why not?

I Can the customer trust the bank? Why or why not?

CPSC 467, Lecture 1 25/25