lec-01 - CSE565: Computer Security Shambhu Upadhyaya...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
1 CSE565: Computer Security Shambhu Upadhyaya Computer Science & Eng. 9/01/09 UB Fall 2009 CSE565: S. Upadhyaya Lec 1.1 University at Buffalo Buffalo, New York, 14260 Overview – Lecture 1 ± September 1, 2009 ± Introduction and Motivation (15 minutes) ± Course Contents, Organization (10 minutes) ± Course Style, Philosophy and Discussion (5 min) ± Security - What, How and Who? (10 min) ± lecture slides: http://www.cse.buffalo.edu/faculty/shambhu/compsec- 2009 9/01/09 UB Fall 2009 CSE565: S. Upadhyaya Lec 1.2 2009/ ± Copyright: UB Fall 2009
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 NSA Center of Excellence 9/01/09 UB Fall 2009 CSE565: S. Upadhyaya Lec 1.3 Motivation ± This is the age of universal electronic connectivity ± Explosive growth in computer systems and their interconnections via networks ± Dependency on computers by organizations and individuals ± This heightened awareness of the need to protect data 9/01/09 UB Fall 2009 CSE565: S. Upadhyaya Lec 1.4 ± Most impact on DoD systems ± Viruses, hackers, electronic eavesdropping, electronic fraud, etc.
Background image of page 2
3 Key Documents ± The National Strategy to Secure Cyber Space, Februray 2003 (76 pages) ± Cyberspace touches practically everything and everyone ± Leadership from the top ± Cyber Space Policy Review ± President Obama presented the Cyberspace Policy Review on May 29, 2009 ± Beginning of the way forward towards a reliable, resilient, trustworthy digital infrastructure for the future 9/01/09 CSE565: S. Upadhyaya Lec 1.5 UB Fall 2009 Computer Security Incident 1 9/01/09 UB Fall 2009 CSE565: S. Upadhyaya Lec 1.6
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 Wall Street Journal, April 21, 2009 ± Computer Spies Breach Pentagons’s Fi ht JtP j t Fighter-Jet Project ± Hackers broke into DoD computers and downloaded terabytes of data containing design information about the Joint Strike Fighter, a $300 billion stealth fighter currently under development 9/01/09 UB Fall 2009 CSE565: S. Upadhyaya Lec 1.7 Computer Security Incident 2 9/01/09 UB Fall 2009 CSE565: S. Upadhyaya Lec 1.8
Background image of page 4
5 Wall Street Journal, April 8, 2009 ± Electricity Grid in U.S. Penetrated By Spies ± Cyberspies have penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system, according to current and former national-security officials 9/01/09 UB Fall 2009 CSE565: S. Upadhyaya Lec 1.9 The Good Guys 9/01/09 UB Fall 2009 CSE565: S. Upadhyaya Lec 1.10 ± Claude Shannon (Information Theorist) ± Shannon's 1949 paper entitled Communication Theory of Secrecy Systems ± Credited with transforming cryptography from an art to a science ± Courtesy: Bell Labs
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 The Bad Guys ± Robert Hanssen (Notorious Insider) 9/01/09 UB Fall 2009 CSE565: S. Upadhyaya Lec 1.11 ± Caught selling American secrets to Moscow for $1.4 million in cash and diamonds over a 15-year period ± Sentenced for life in prison without the ability for parole in 2002 ± Photo Courtesy: USA Today ± Have you watched the movie – Breach?
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 15

lec-01 - CSE565: Computer Security Shambhu Upadhyaya...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online