SlideShare a Scribd company logo
1 of 9
Download to read offline
Introducing Computer
Security
What is computer security?
• Most developers and operators are concerned with
correctness: achieving desired behavior
• A working banking web site, word processor, blog, …
• Security is concerned with preventing undesired
behavior
• Considers an enemy/opponent/hacker/adversary who
is actively and maliciously trying to circumvent any
protective measures you put in place
Kinds of undesired behavior
• Stealing information:
• Corporate secrets (product plans, source code, …)
• Personal information (credit card numbers, SSNs, …)
• Modifying information or functionality:
• Installing unwanted software (spyware, botnet client, …)
• Destroying records (accounts, logs, plans, …)
• Denying access:
• Unable to purchase products
• Unable to access banking information
confidentiality
integrity
availability
Significant security breaches
• RSA, March 2011
• stole tokens that permitted subsequent compromise of
customers using RSA SecureID devices
• Adobe, October 2013
• stole source code, 130 million customer records
(including passwords)
• Target, November 2013
• stole around 40 million credit and debit cards
• … and many others!
Defects and Vulnerabilities
• Many breaches begin by exploiting a vulnerability
• This is a security-relevant software defect that can be
exploited to effect an undesired behavior
• A software defect is present when the software
behaves incorrectly, i.e., it fails to meet its
requirements
• Defects occur in the software’s design and its
implementation
• A flaw is a defect in the design
• A bug is a defect in the implementation
Example: RSA 2011 breach
• Exploited an Adobe Flash player vulnerability
!
1. A carefully crafted Flash program, when run by the
vulnerable Flash player, allows the attacker to execute
arbitrary code on the running machine
2. This program could be embedded in an Excel
spreadsheet, and run automatically when the
spreadsheet is opened
3. The spreadsheet could be attached to an e-mail
masquerading to be from a trusted party (spear
phishing)
Considering Correctness
• The Flash vulnerability is an implementation bug!
• All software is buggy. So what?
• A normal user never sees most bugs, or works
around them
• Most (post-deployment) bugs due to rare feature
interactions or failure to handle edge cases
• Assessment: Would be too expensive to fix every
bug before deploying
• So companies only fix the ones most likely to affect
normal users
Key difference:
An adversary is not a normal user!
!
• The adversary will actively attempt to find
defects in rare feature interactions and edge cases
• For a typical user, (accidentally) finding a bug will
result in a crash, which he will now try to avoid
• An adversary will work to find a bug and exploit it to
achieve his goals
Considering Security
!
To ensure security, we must
eliminate bugs and design
flaws, and/or
make them harder to exploit

More Related Content

Similar to introduction to security coursera slides.pdf

Similar to introduction to security coursera slides.pdf (20)

N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
 
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
Owasp Mobile Risk Series : M4 : Unintended Data LeakageOwasp Mobile Risk Series : M4 : Unintended Data Leakage
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSec
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
What are various types of cyber attacks
What are various types of cyber attacksWhat are various types of cyber attacks
What are various types of cyber attacks
 
Ethical hacking - Skills.pptx
Ethical hacking - Skills.pptxEthical hacking - Skills.pptx
Ethical hacking - Skills.pptx
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security Management
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Security testing
Security testingSecurity testing
Security testing
 
Chapter 9 system penetration [compatibility mode]
Chapter 9 system penetration [compatibility mode]Chapter 9 system penetration [compatibility mode]
Chapter 9 system penetration [compatibility mode]
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
PoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail IndustryPoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail Industry
 
Sql securitytesting
Sql  securitytestingSql  securitytesting
Sql securitytesting
 
Your internet-exposure-that-makes-you-vulnerable
Your internet-exposure-that-makes-you-vulnerableYour internet-exposure-that-makes-you-vulnerable
Your internet-exposure-that-makes-you-vulnerable
 
Whittaker How To Break Software Security - SoftTest Ireland
Whittaker How To Break Software Security - SoftTest IrelandWhittaker How To Break Software Security - SoftTest Ireland
Whittaker How To Break Software Security - SoftTest Ireland
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
iOS Application Security.pdf
iOS Application Security.pdfiOS Application Security.pdf
iOS Application Security.pdf
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entities
 
Login cat tekmonks - v3
Login cat   tekmonks - v3Login cat   tekmonks - v3
Login cat tekmonks - v3
 

Recently uploaded

Financial Accounting IFRS, 3rd Edition-dikompresi.pdf
Financial Accounting IFRS, 3rd Edition-dikompresi.pdfFinancial Accounting IFRS, 3rd Edition-dikompresi.pdf
Financial Accounting IFRS, 3rd Edition-dikompresi.pdf
MinawBelay
 
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
Krashi Coaching
 

Recently uploaded (20)

The Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryThe Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. Henry
 
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
 
Financial Accounting IFRS, 3rd Edition-dikompresi.pdf
Financial Accounting IFRS, 3rd Edition-dikompresi.pdfFinancial Accounting IFRS, 3rd Edition-dikompresi.pdf
Financial Accounting IFRS, 3rd Edition-dikompresi.pdf
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...
 
HVAC System | Audit of HVAC System | Audit and regulatory Comploance.pptx
HVAC System | Audit of HVAC System | Audit and regulatory Comploance.pptxHVAC System | Audit of HVAC System | Audit and regulatory Comploance.pptx
HVAC System | Audit of HVAC System | Audit and regulatory Comploance.pptx
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
 
Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024
 
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Software testing for project report .pdf
Software testing for project report .pdfSoftware testing for project report .pdf
Software testing for project report .pdf
 
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptx
 
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 
II BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING II
II BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING IIII BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING II
II BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING II
 
Word Stress rules esl .pptx
Word Stress rules esl               .pptxWord Stress rules esl               .pptx
Word Stress rules esl .pptx
 
Championnat de France de Tennis de table/
Championnat de France de Tennis de table/Championnat de France de Tennis de table/
Championnat de France de Tennis de table/
 

introduction to security coursera slides.pdf

  • 2. What is computer security? • Most developers and operators are concerned with correctness: achieving desired behavior • A working banking web site, word processor, blog, … • Security is concerned with preventing undesired behavior • Considers an enemy/opponent/hacker/adversary who is actively and maliciously trying to circumvent any protective measures you put in place
  • 3. Kinds of undesired behavior • Stealing information: • Corporate secrets (product plans, source code, …) • Personal information (credit card numbers, SSNs, …) • Modifying information or functionality: • Installing unwanted software (spyware, botnet client, …) • Destroying records (accounts, logs, plans, …) • Denying access: • Unable to purchase products • Unable to access banking information confidentiality integrity availability
  • 4. Significant security breaches • RSA, March 2011 • stole tokens that permitted subsequent compromise of customers using RSA SecureID devices • Adobe, October 2013 • stole source code, 130 million customer records (including passwords) • Target, November 2013 • stole around 40 million credit and debit cards • … and many others!
  • 5. Defects and Vulnerabilities • Many breaches begin by exploiting a vulnerability • This is a security-relevant software defect that can be exploited to effect an undesired behavior • A software defect is present when the software behaves incorrectly, i.e., it fails to meet its requirements • Defects occur in the software’s design and its implementation • A flaw is a defect in the design • A bug is a defect in the implementation
  • 6. Example: RSA 2011 breach • Exploited an Adobe Flash player vulnerability ! 1. A carefully crafted Flash program, when run by the vulnerable Flash player, allows the attacker to execute arbitrary code on the running machine 2. This program could be embedded in an Excel spreadsheet, and run automatically when the spreadsheet is opened 3. The spreadsheet could be attached to an e-mail masquerading to be from a trusted party (spear phishing)
  • 7. Considering Correctness • The Flash vulnerability is an implementation bug! • All software is buggy. So what? • A normal user never sees most bugs, or works around them • Most (post-deployment) bugs due to rare feature interactions or failure to handle edge cases • Assessment: Would be too expensive to fix every bug before deploying • So companies only fix the ones most likely to affect normal users
  • 8. Key difference: An adversary is not a normal user! ! • The adversary will actively attempt to find defects in rare feature interactions and edge cases • For a typical user, (accidentally) finding a bug will result in a crash, which he will now try to avoid • An adversary will work to find a bug and exploit it to achieve his goals Considering Security
  • 9. ! To ensure security, we must eliminate bugs and design flaws, and/or make them harder to exploit