Note-7

Note-7 - CSE 467/598 Data and Information Security Prof....

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
CSE 467/598 Data and Information Security Prof. Gail-Joon Ahn IMPORTANT DATES ! Project: ! Phase I: 11:59PM, February 22, 2011 ! Phase II: TBA ! Phase III: TBA ! Phase IV: TBA ! Exam #1 (Midterm): Mar 8, 2011 ! Spring Break: Mar 15 & 17, 2011 (no class) ! Class Presentation : ! Session 1: April 19, 2011 ! Session 2: April 21, 2011 ! Session 3: April 26, 2011 ! Session 4: April 28, 2011 ! Exam #2 (Final): May 10, 2011 (12:00PM – 2:00 PM) 2
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Cyber Gazette ! Hackers breach Nasdaq; trading systems not affected ! Hackers have infiltrated the computer systems of the company that operates the Nasdaq stock exchange . Nasdaq OMX, a New York- based public company that owns and operates the Nasdaq, as well as seven European stock exchanges, said it detected suspicious files on its U.S.-based servers and immediately conducted an investigation that included outside forensic firms and U.S. federal law enforcement. The suspicious files have been removed, and there is no evidence that any customer information was accessed or acquired by hackers. ! The part of the system that handles trades was not affected by the breach , the company . ! An investigation determined that a web-based dashboard application, called Directors Desk, which is used by corporate executives to share confidential documents, was potentially affected . 3 Based on the slides for "Computer Security: Art and Science" 4 Foundational Results Reading: Chapter 3
Background image of page 2
Based on the slides for "Computer Security: Art and Science" 5 Questions ! How can we determine if a computer system is secure? ! Why is it important? Based on the slides for "Computer Security: Art and Science" 6 What Is “Secure”? ! Adding a (generic) right “ r” where there does not exist one before is called “ leaking ! If a system S , beginning in initial state s 0 , can never leak right “ r” , it is “ safe ” with respect to the right “r” . ! If a system S , beginning in initial state s 0 , can leak right “ r” , it is “ unsafe ” with respect to the right “r” .
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Based on the slides for "Computer Security: Art and Science" 7 Safety Question ! Does there exist an algorithm for determining ! whether a protection system S with initial state s 0 is safe with respect to a (generic) right “
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/09/2011 for the course CSE 497 taught by Professor Ahn during the Spring '11 term at ASU.

Page1 / 14

Note-7 - CSE 467/598 Data and Information Security Prof....

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online