100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Class notes

College aantekeningen Security (NWI-IPC021)

Rating
-
Sold
6
Pages
128
Uploaded on
17-01-2021
Written in
2020/2021

Aantekeningen en samenvatting van de lessen Security van de Radboud Universiteit.

Institution
Course











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Study
Course

Document information

Uploaded on
January 17, 2021
Number of pages
128
Written in
2020/2021
Type
Class notes
Professor(s)
Daemen
Contains
All classes

Subjects

Content preview

Security
Chantal Banga, s4545176
December 2020


Lecture 1 - Intro
Security
Freedom from, or resilience against, potential harm or unwanted coercive (ged-
wongen) change caused by others.

Beneficiaries of security
• Individual persons
• Social groups

• Objects and institutions
• Ecosystems

Security vs. Safety
• Safety: against (unintentional) accidents or disasters
– Anticipate what can go wrong
– Also the unexpected
– Forces of nature: tsunamis, fire, biohazard, flood, polar bears, etc.
– Bad things happening: nuclear accidents, panic, power outage, traf-
fic, etc.
– Providing safety is hard
• Security: against malicious activities by people

– Anticipate war, terrorism, fraud, theft, abuse, etc.
– Also the unexpected
– Providing security is harder
– Because the harm is intentional



1

,Computer security
The protection of computer systems from theft or damage to their hardware,
software of electronic data, as well as from disruption or misdirection of the
services they provide

• Computer security: Security involving (modern) information technol-
ogy (IT)
• It’s about access
– Preventing unauthorized access to:
∗ Accounts
∗ Personal data
∗ Computing resources
∗ Media content
∗ Communication resources
– Ensuring authorized access:
∗ Protection against denial of service
• It’s also about harmful use of IT
– Stealing:
∗ Vehicles, exploiting car key weaknesses
∗ Burglary, using collected info, key weaknesses
∗ Cryptocurrency mining on other people’s bill
– Identity theft: for harassment, stalking, etc.
– Blackmail, using:
∗ Ransomware: keeping data hostage
∗ Threats to take away resources/services
– Misinformation
∗ Website defacement
∗ Fake news to manipulate public opining, ...

• IT makes eavesdropping easier
– Hackers can exploit protocol weaknesses to get cleartext
– Numerous other examples: WIFI’s WPA2, TLS, ...

• Systematic eavesdropping on all: mass surveillance
By organizations that claim to be legitimate
– For profit: Google, Facebook, device vendors, etc.
– For law enforcement: governments


2

, – Using smartphone, TV, smart speakers
• IT leading to very powerful weapons
– Botnets: army of malware-infected computers
∗ For denial of service: terrorism, blackmail
∗ For cryptocurrency mining: theft
∗ For selling CPU power
∗ For password guessing
∗ Etc.
– In cyberterrorism and cyberwarfare
∗ We’re at war ethics
∗ Mass manipulation with propaganda, fake news, etc.
∗ Sabotage of enemy (IT) infrastructure
∗ Destabilization by fake news, election manipulation, etc.
– Computer viuses, worms, trojans, ...




3

, Lecture 2 - Intro
Problems implementing security
• Products are often not designed with security in mind

– Many products are quickly thrown together and shipped
∗ Especially web pages, apps, IoT, ...
∗ Using code that is mostly found and googled together
∗ Very minimal testing
∗ Security only as an after-thought (if any)
– For some the security was good initially ...
∗ The Internet in the 1980’s
∗ Linux OS - developed in the 1970’s
1. Discretionary access control (DAC) that allows the users to
decide on the access of their files
2. SeLinux, Qubes - attempts at OSs built to be secure
• Products evolve very fast
– Their usage expands or changes
∗ Virtualization of servers, the cloud ...
∗ Mobile phones becoming our banking devices
– New challenges for security

• Products have high complexity
– Moore’s Law:
– Software products have high complexity too
∗ Windows 10: estimates 50M lines of code (LOC)
∗ Linux kernel: 10K in 1991, 311K in 1995, 20M in 2015
– Security: understanding possible attack paths, vulnerabilities
∗ Complexity introduces vulnerabilities, well after deployment
· Example: side-channel attacks, speculative execution
∗ Security becomes a break and patch game
– Security assurance: closed vs. open source
∗ ”Public scrutiny (onderzoek) makes open source high-assurance”
∗ In theory yes, but only if small code base
∗ High assurance: smart cards with tiny cpu and 20K LOC
• Business is not focused on security
– Business landscape in IT is very competitive


4

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
chantalbanga Radboud Universiteit Nijmegen
Follow You need to be logged in order to follow users or courses
Sold
24
Member since
4 year
Number of followers
20
Documents
7
Last sold
1 year ago

3.7

3 reviews

5
0
4
2
3
1
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions