intro - AN INTRODUCTION TO COMPUTER SECURITY Computer...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
1 1 Overview of Security CS177 2011 AN INTRODUCTION TO COMPUTER SECURITY Richard A. Kemmerer Computer Science Department University of California Santa Barbara, California, U.S.A. Email: [email protected] 2 Overview of Security CS177 2011 Computer Security • What is computer security? – The field of computer science that analyzes the security properties of computer systems – The protection of resources (including data and programs) from accidental or malicious modification, destruction, or disclosure • Why is it important? – Information is power and money – Computer systems manage information and provide mission-critical support for business, government, and financial institutions 3 Overview of Security CS177 2011 How did we get here? • Computer security has existed as long as computer systems existed – Alan Turing was part of the group that worked on breaking the Nazi’s encryption algorithm, Enigma, using automated methods • Every time a new system is introduced new security issues are introduced as well 4 Overview of Security CS177 2011 How did we get here? • Today’s uber-connected, ubiquitous computing exacerbates the problem – Botnets, D-Dos, Viruses, Spoofing, Hackers, Spam, Scams, Brute-forcing, Trojan Horses, Frauds, Rootkits, Web Attacks, Overflow, Scanners, Hijacking, Social Engineering, Password Cracking, Phishing, Eavesdropping, Man-in-the- middle attacks, Identity Theft, Blackmail… 5 Overview of Security CS177 2011 How bad is it? September 2001 - Nimbda worm spread nationwide in less than an hour and attacked 86,000 computers January 2003 – Sapphire/Slammer SQL worm was able to spread nationwide in less than 10 minutes, doubling in size every 8.5 seconds. At its peak (3 minutes after its release) it scanned at over 55 million IP addresses per second, infecting 75,000 victims 6 Overview of Security CS177 2011 How bad is it? Geographic spread of Code Red worm
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 7 Overview of Security CS177 2011 Why is it so bad? Computers are everywhere Computer systems constantly grow in complexity (and size) Today’s networks are very heterogeneous, and critical components are often connected (maybe in indirect ways) to non-critical, poorly managed computer systems People make mistakes in both the development and the deployment of computer systems 8 Overview of Security CS177 2011 Why is it so bad? Home Users Increase Vulnerabilities Today most homes are connected, particularly with the advent of DSL and cable modems Most home users: – are unaware of vulnerabilities – don’t use firewalls – think they have nothing to hide or don’t care if others get their data – don’t realize their systems can serve as jump off points for other attacks ( zombies or bots ) 9 Overview of Security CS177 2011 Why is it so bad? Computer security is reactive
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/27/2011 for the course CMPSC 117 taught by Professor Kemm during the Fall '09 term at UCSB.

Page1 / 15

intro - AN INTRODUCTION TO COMPUTER SECURITY Computer...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online