DOC PREVIEW
USC CSCI 530 - usc-csci530-f10-part2

This preview shows page 1-2-3-4-5-6-7-8-9-10-11-12-13-14-15-16-17-120-121-122-123-124-125-126-127-128-129-130-131-132-133-134-135-136-240-241-242-243-244-245-246-247-248-249-250-251-252-253-254-255-256 out of 256 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 256 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

USC CSci530 Computer Security Systems Lecture notes Fall 2010CSci530: Security Systems Lecture 7, October 8, 2010 (Following Mid-term exam) Introduction to Malicious CodeClasses of Malicious CodeSlide 4Activities of Malicious CodeDefenses to Malicious CodeCSci530: Security Systems Lecture 8, October 15 2010 Malicious CodeTrojan HorsesSlide 9VirusesSlide 11Slide 12Recent Viruses Spread by EmailViruses PhasesAnalogy to Real VirusesHow Viruses HideMacro VirusesWormsDelayed EffectZombies/BotsSpywareSome Spyware LocalTheory of Malicious CodeSlide 24Slide 25Root KitsBest Detection is from the OutsideEconomics of Malicious CodeEconomics of Adware and SpamCSci530: Security Systems Lecture 9 – October 22, 2010 CountermeasuresIntrusion EverythingArchitecture: A first stepWhat is to be protectedClasses of DataClasses of UsersExampleOther PracticesHow to think of Firewalled NetworkFirewallsPacket FilterNetwork Address TranslationApplication FW or ProxiesHost Based FirewallsVirtual Private NetworksIPSecAttack PathsDefense in DepthProtecting the InsideVirus CheckingCSci530: Computer Security Systems Lecture 10 – 29 October 2010 Intrusion DetectionIntrusion TypesAttack StagesIntrusion DetectionIDS typesComponents of ID systemsAdvanced IDS modelsIntrusion ResponsePossible ResponsesPhase of Response (Bishop)PREPARATIONIDENTIFICATIONCONTAINMENTERADICATIONRECOVERYFOLLOWUPLimitations of Monolithic IDSharing InformationSharing Intrusion InformationCIDFCISLSlide 71Slide 72CISL: RolesCISL: VerbsLessons from CISLWorm and DDOS DetectionReacting to AttacksCSci530: Security Systems Lecture 11 – November 5, 2010 The Human ElementThe Human is the Weak PointThe Human is the Weak Point(2)Some AttacksAddressing the LimitationsSocial EngineeringTotal Security / not quiteSix TendenciesSlide 86Slide 87Slide 88Steps of Social EngineeringContext Sensitive Certificate Verification and Specific Password WarningsCSci530: Security Systems Lecture 12 – November 12 2010 Trusted ComputingTrusted vs. TrustworthyA Controversial IssueWhat is Trusted ComputingSeparation of Security DomainsTrusted PathCommunicated AssuranceThe Landscape – Early WorkThe Landscape – IndustryThe Landscape – ApplicationsDiscussion - RisksDiscussion - BenefitsDiscussion – What’s missingTrusted BaggageEqual Opportunity for DiscriminationEqual Opportunity for Discrimination(2)Is Trusted Computing EvilWhat can we do with TC?Mediating Programs TodayCorporate IT Departments Solve thisThe next stepRed / Green Networks (1)Red / Green Networks (2)Somewhere over the RainbowA Financial Virtual SystemHow Many Virtual SystemsDigital Rights ManagementPrivacy and Anti-Trust ConcernsTrusted Computing Cuts Both WaysWhat do we need for TCPrivacy of Trusted HardwareThe Key to your Trusted HardwareNon-Maskable InterruptsThe Hardware BasisHardware TopicsTrusted Platform ModuleTrusted Platform Module (TPM)?Why Use A TPM?Endorsement KeyUsing Encryption for AtestationSecure StorageOS Support for Trusted Computing (1)OS Support for Trusted Computing (2)Disk Layout & Key StorageBitLocker™ Architecture Static Root of Trust Measurement of early boot componentsVista co-existenceMid-Term Exam DiscussionSlide 139Slide 140CSci530: Security Systems Lecture 13 – November 19, 2010 PrivacyOutline of DiscussionWhat is Privacy?Security v. PrivacyMajor Debate on AttributionPrivacy not Only About PrivacyYou Are Being TrackedMore news - FOIA docs show feds can lojack mobiles without telco help – Ars Technica - Julian Sanchez 10/16/2008Why Should you Care?Old News - Shopper’s Suit Thrown Out Los Angeles Times – 2/11/1999Last year’s current event - New York Times – Miguel Helft – November 11 2008.Aggregation of DataAnonymization of DataTraffic AnalysisInformation Useful for TAObama's cell phone records breached Washington (CNN) 11/21/2008CSci530: Security Systems Lecture 13 – November 19, 2010 Privacy - ContinuedAnnouncementsLinkages – The Trail We LeaveUnlinking the TrailSlide 161Onion RoutingP3P and Privacy StatementsSlide 164Protecting Data in PlaceForensicsSlide 167Privacy – Retention PoliciesThe future of PrivacyCSci530: Security Systems Lecture 13.2 – November 19, 2010 SCADA and Cyber-Physical Systems SecurityTrends in Power SystemsSlide 172Traditional Security and the Smart GridSlide 174Slide 175Modeling Security in the Smart GridUnderstanding Smart Grid SecuritySecuring the Smart GridSome ExamplesHow We Might Get it WrongSecuring The Smart GridCyber Isolation for the Smart GridA Note on SimulationSummary – C-P SecurityCSci530: Security Systems Lecture 14.1 – December 3, 2010 Security in the CloudAnnouncementsDefining The CloudRisks of Cloud ComputingDefining PolicyControlling MigrationEnforcing ConstraintsCloud Security SummaryCSci530: Security Systems Lecture 14.2 – December 3, 2010 Misc TopicsCommon Suggested TopicsEcommerce SecurityEcommerce: Trading PlatformEcommerce: FraudEcommerce: AuctionsEcommerce: PaymentReliabilityScalabilityEfficiencyUnobtrusivenessIntegrationMultiple forms of paymentSecure presentation (and non-secure variant)Customer registrationCredit-debit instrumentsElectronic currencyServer scripDirect transferCollection agentSome representative systemsSecure socket layer (secure presentation)First Virtual (customer registration)CyberCash (customer registration)DigiCash (electronic currency)Secure Electronic Transactions (SET)Open Market (collection agent)Mondex (electronic currency)Slide 222USC/ISI NetCheque® (credit-debit)Slide 224NetCheque representationNetCheque Payment InstrumentNetCheque securityClearing funds through multiple serversUSC/ISI’s NetCashOffloading the risksTechnical solutionsSlide 232Security in RoutingIP TracebackMobile DevicesBattling Bot-netsSecurity For MiddlewareHoneyOutside Looking InSlide 240Review - TopicsGlossary of AttacksSlide 243Slide 244Slide 245Hypothetical Case StudiesElectronic VotingMedical RecordsIntrusion Detection and ResponseSlide 250Security for the DMV - 2008Slide 252Current event – How does this relate to our discussionSlide 254Slide 255Mid-term Discussion Q1 CryptographyMid-term Discussion Q2 Authentication/Key ManagementMid-term Discussion Q3 Design ProblemCopyright © 1995-2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530Computer Security Systems Lecture notesFall 2010Dr. Clifford NeumanUniversity of Southern CaliforniaInformation Sciences InstituteCopyright © 1995-2009 Clifford Neuman - UNIVERSITY OF SOUTHERN


View Full Document

USC CSCI 530 - usc-csci530-f10-part2

Download usc-csci530-f10-part2
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view usc-csci530-f10-part2 and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view usc-csci530-f10-part2 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?