ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang Syllabus • See handout – Homework will usually have 4-5 questions and due in one week. It is due at the time that the class begins. – Late homework and term paper • Within 24 hours: 50% of full score • After that: 0% – Project/term paper • Individual effort – Conduct some hands-on experiments – Or choose a security problem and write a survey paper – A reference question list will be provided – Midterm and final exam – Misc: eating, drinking, and cell phone (text & twitter) Before class • An interesting question – Two companies each has some private data. They need to jointly calculate some result without disclosing their information. • Secure multiparty computation • Is this solution useful? – Zero knowledge proof: • Can I prove to you that I know a secret without telling you anything? (practically) – Car key remote jammer Perfect Storm of Social Networks • By September 2012, Facebook announced they had surpassed 1.01 Billion active users. Twitter claims 500M registered users (1 year ago, only 175M). • Almost 68% of all Internet traffic is social media or search • Facebook is the 4th largest website in the world. Having grown 157% between 2008 and 2009 – 1,928% in the US alone • Social media marketing will grow from $714M in 2009 to $3.1B by 2014 • Attacks on social media sites is up 240% from phishing attacks alone Attacks Are On The Rise Spam, phishing and malware attacks through social media are growing: • 70% rise in firms encountering spam and malware attacks via social networks in 2009 Organizations that have been victims of attack through social networking sites ‒ Over 50% received spam via social networks ‒ Over 33% received malware via social networks 5 Examples in real life • Attack on Twitter – Hack into the victim’s email account – DDoS to paralyze Twitter, facebook, etc • Data mining attacks on public database – In NJ, a newspaper generates a database about all residents that have CCW permits. – In CA, there is a webpage listing all people that donate to Proposition 8 ballot measure – Groupon, Google Offer, and Amazon Local Examples in real life • • • • Worm attack on smart grid Use social network to detect disease breakout Remotely control insulin pump of a patient Code during the war – Navajo Code in WWII – http://www.imdb.com/gallery/ss/0245562/W-266R.jpg • Node impersonation attack: easier than you think – Computers have controlled our lives • Medical, ATM, banking, business • Air traffic control Security overview • Risks – Why there are risks • Adversaries – Smart and dedicated – Many of them, considering the high unemployment rate – Hiding in the dark – From fun to profit (worm self-changing botnet target at specific systems) Security overview • Physical security is not enough (can you be sure that your physical security methods are sound and enough? Example in Las Vegas, supply chain attacks, ATM machine, hotel doors) • Networked computers can be accessed remotely Security overview • What can go wrong – Trojan war story (trojan horse): USB keys – Corrupted internal worker – Vulnerabilities of protocols or security mechanisms (security patch has problems too) – By-passing protection walls – Backdoors for systems (Linux password) – Known attacks ignored (push and poll) Information security • Encryption – You can read the information only when you know the key • Authentication – You are who you claim you are • Authorization – The role and the right Information security • Information integrity – The data has never been changed or changed in an inappropriate way • Non-repudiation – Cannot deny your words (digital cash example) • Privacy – Who should know, how much, how to use the information • Your cell phone or medical records • RFID • Traffic cameras in Minnesota Security overview • Defending methods – Prevention • • • • Prevent (password, salt, private salt, searching) Deter: raising the bar (password guessing, login slow) Deflect: making other target more attractive Diversify – Detection • • • • Monitoring (who, what, and how) Intrusion detection (signature based, anomaly based) IP telephony track Authenticity of the evidence (digital media) Security Overview • Recovery – Recover data (check point) – Identify the damage – Forensics – Confinement • Tolerance – Maintain a decent service quality – Automatically degrade video quality while reserving bandwidth for voice
© Copyright 2026 Paperzz