lec-01 - 8/31/10 UB Fall 2010 CSE565: S. Upadhyaya Lec 1.1...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 8/31/10 UB Fall 2010 CSE565: S. Upadhyaya Lec 1.1 8/31/10 CSE565: S. Upadhyaya Lec 1.1 UB Fall 2010 CSE565: S. Upadhyaya Lec 1.1 CSE565: Computer Security Shambhu Upadhyaya Computer Science & Eng. University at Buffalo Buffalo, New York, 14260 8/31/10 UB Fall 2010 CSE565: S. Upadhyaya Lec 1.2 CSE565: S. Upadhyaya Lec 1.2 CSE565: S. Upadhyaya Lec 1.2 Overview Lecture 1 August 31, 2010 Introduction and Motivation (15 minutes) Course Contents, Organization (10 minutes) Course Style, Philosophy and Discussion (5 min) Security - What, How and Who? (10 min) lecture slides: http://www.cse.buffalo.edu/faculty/shambhu/cse56510/ Copyright: UB Fall 2010 8/31/10 UB Fall 2010 CSE565: S. Upadhyaya Lec 1.3 CSE565: S. Upadhyaya Lec 1.3 CSE565: S. Upadhyaya Lec 1.3 NSA Center of Excellence 8/31/10 UB Fall 2010 CSE565: S. Upadhyaya Lec 1.4 CSE565: S. Upadhyaya Lec 1.4 CSE565: S. Upadhyaya Lec 1.4 Motivation Motivation This is the age of universal electronic connectivity Explosive growth in computer systems and their interconnections via networks Dependency on computers by organizations and individuals This heightened awareness of the need to protect data Most impact on DoD systems Viruses, hackers, electronic eavesdropping, electronic fraud, etc. 8/31/10 UB Fall 2010 CSE565: S. Upadhyaya Lec 1.5 Key Documents The National Strategy to Secure Cyber Space, Februray 2003 (76 pages) Cyberspace touches practically everything and everyone Leadership from the top Cyber Space Policy Review President Obama presented the Cyberspace Policy Review on May 29, 2009 Beginning of the way forward towards a reliable, resilient, trustworthy digital infrastructure for the future CSE565: S. Upadhyaya Lec 1.5 8/31/10 UB Fall 2010 CSE565: S. Upadhyaya Lec 1.6 Most Recent High Profile Attack Google Hack attack was ultra sophisticated (Operation Aurora) Happened in January 2010 Unprecedented tactics that combined encryption, stealth programming and an unknown hole in Internet Explorer malicious programs opened a remote backdoor to the computer, establishing an encrypted covert channel that masqueraded as an SSL connection to avoid detection Attacked some 34 companies Hackers had stolen IP and sought access to the Gmail accounts of human rights activists Attack was traced to China Previous attacks were on critical infrastructures but recent focus is on corporate networks 8/31/10 UB Fall 2010 CSE565: S. Upadhyaya Lec 1.7 CSE565: S. Upadhyaya Lec 1.7 Computer Security Incident 1 8/31/10 UB Fall 2010 CSE565: S. Upadhyaya Lec 1.8 CSE565: S. Upadhyaya Lec 1.8 Wall Street Journal, April 21, 2009 Computer Spies Breach Pentagonss Fighter-Jet Project Hackers broke into DoD computers and downloaded terabytes of data containing design information about the Joint Strike Fighter, a $300 billion stealth fighter currently under development 8/31/10 UB Fall 2010 CSE565: S. Upadhyaya Lec 1.9Lec 1....
View Full Document

Page1 / 16

lec-01 - 8/31/10 UB Fall 2010 CSE565: S. Upadhyaya Lec 1.1...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online