100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
College aantekeningen

College aantekeningen Security (NWI-IPC021)

Beoordeling
-
Verkocht
6
Pagina's
128
Geüpload op
17-01-2021
Geschreven in
2020/2021

Aantekeningen en samenvatting van de lessen Security van de Radboud Universiteit.

Instelling
Vak











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
Studie
Vak

Documentinformatie

Geüpload op
17 januari 2021
Aantal pagina's
128
Geschreven in
2020/2021
Type
College aantekeningen
Docent(en)
Daemen
Bevat
Alle colleges

Onderwerpen

Voorbeeld van de inhoud

Security
Chantal Banga, s4545176
December 2020


Lecture 1 - Intro
Security
Freedom from, or resilience against, potential harm or unwanted coercive (ged-
wongen) change caused by others.

Beneficiaries of security
• Individual persons
• Social groups

• Objects and institutions
• Ecosystems

Security vs. Safety
• Safety: against (unintentional) accidents or disasters
– Anticipate what can go wrong
– Also the unexpected
– Forces of nature: tsunamis, fire, biohazard, flood, polar bears, etc.
– Bad things happening: nuclear accidents, panic, power outage, traf-
fic, etc.
– Providing safety is hard
• Security: against malicious activities by people

– Anticipate war, terrorism, fraud, theft, abuse, etc.
– Also the unexpected
– Providing security is harder
– Because the harm is intentional



1

,Computer security
The protection of computer systems from theft or damage to their hardware,
software of electronic data, as well as from disruption or misdirection of the
services they provide

• Computer security: Security involving (modern) information technol-
ogy (IT)
• It’s about access
– Preventing unauthorized access to:
∗ Accounts
∗ Personal data
∗ Computing resources
∗ Media content
∗ Communication resources
– Ensuring authorized access:
∗ Protection against denial of service
• It’s also about harmful use of IT
– Stealing:
∗ Vehicles, exploiting car key weaknesses
∗ Burglary, using collected info, key weaknesses
∗ Cryptocurrency mining on other people’s bill
– Identity theft: for harassment, stalking, etc.
– Blackmail, using:
∗ Ransomware: keeping data hostage
∗ Threats to take away resources/services
– Misinformation
∗ Website defacement
∗ Fake news to manipulate public opining, ...

• IT makes eavesdropping easier
– Hackers can exploit protocol weaknesses to get cleartext
– Numerous other examples: WIFI’s WPA2, TLS, ...

• Systematic eavesdropping on all: mass surveillance
By organizations that claim to be legitimate
– For profit: Google, Facebook, device vendors, etc.
– For law enforcement: governments


2

, – Using smartphone, TV, smart speakers
• IT leading to very powerful weapons
– Botnets: army of malware-infected computers
∗ For denial of service: terrorism, blackmail
∗ For cryptocurrency mining: theft
∗ For selling CPU power
∗ For password guessing
∗ Etc.
– In cyberterrorism and cyberwarfare
∗ We’re at war ethics
∗ Mass manipulation with propaganda, fake news, etc.
∗ Sabotage of enemy (IT) infrastructure
∗ Destabilization by fake news, election manipulation, etc.
– Computer viuses, worms, trojans, ...




3

, Lecture 2 - Intro
Problems implementing security
• Products are often not designed with security in mind

– Many products are quickly thrown together and shipped
∗ Especially web pages, apps, IoT, ...
∗ Using code that is mostly found and googled together
∗ Very minimal testing
∗ Security only as an after-thought (if any)
– For some the security was good initially ...
∗ The Internet in the 1980’s
∗ Linux OS - developed in the 1970’s
1. Discretionary access control (DAC) that allows the users to
decide on the access of their files
2. SeLinux, Qubes - attempts at OSs built to be secure
• Products evolve very fast
– Their usage expands or changes
∗ Virtualization of servers, the cloud ...
∗ Mobile phones becoming our banking devices
– New challenges for security

• Products have high complexity
– Moore’s Law:
– Software products have high complexity too
∗ Windows 10: estimates 50M lines of code (LOC)
∗ Linux kernel: 10K in 1991, 311K in 1995, 20M in 2015
– Security: understanding possible attack paths, vulnerabilities
∗ Complexity introduces vulnerabilities, well after deployment
· Example: side-channel attacks, speculative execution
∗ Security becomes a break and patch game
– Security assurance: closed vs. open source
∗ ”Public scrutiny (onderzoek) makes open source high-assurance”
∗ In theory yes, but only if small code base
∗ High assurance: smart cards with tiny cpu and 20K LOC
• Business is not focused on security
– Business landscape in IT is very competitive


4

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
chantalbanga Radboud Universiteit Nijmegen
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
24
Lid sinds
4 jaar
Aantal volgers
20
Documenten
7
Laatst verkocht
1 jaar geleden

3.7

3 beoordelingen

5
0
4
2
3
1
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen