Skip to content

Xiaorui-Huang/ece568_notes

Repository files navigation

ECE568 Computer Security - 2023 Fall

My Notes for Computer Security Course

What is Security?

  • Goal vs. Adversary

    • Objective of security measures against potential threats.
  • Security Policies

    • Confidentiality: Ensuring that information is accessible only to those authorized to have access.
    • Integrity: Maintaining and assuring the accuracy and consistency of data over its entire life-cycle.
    • Availability: Ensuring that authorized users have access to information and associated resources when required.

Threat Model

  • Assumptions about the adversary

    • Understanding what the adversary knows, their capabilities, and intentions.
  • Attacker’s motivation

    • Economics: Profit-driven motives.
    • Fun & Profit: Personal gains and amusement.
    • Vulnerability Marketplace: Platforms or forums where vulnerabilities are sold or discussed.

Security Mechanism

  • How to help uphold a security policy

    • Permission system: Defines who can access what.
    • Encryption: Process of converting information or data into a code to prevent unauthorized access.
    • Hardware protection: Physical safeguards for data and devices.
  • Security goal vs. Security mechanism

    • The defined security objectives don't dictate the methods used to achieve them.

Why is Security Hard?

  • Assuming the threat model

    • Working on real-life scenarios.
    • Adapting to changing environments.
  • Challenges

    • Enumerating all possible ways to attack: Identifying every potential vulnerability or threat.
    • Weakest link matters: The strength of a system is determined by its most vulnerable point.
    • Hardware changing: Need to adapt to evolving hardware technologies.
    • Human errors: Mistakes made by people that can lead to breaches or vulnerabilities.

What Can We Trust?

  • Trust Issues

    • Nothing can be trusted: Constant skepticism in the security realm.
    • But we still need to work something out: Necessity to devise some trust model.
  • Assuming TCB: Trusted Computing Base

    • The minimal part of the system is not compromised: Fundamental system components that need to be secure.
    • All secure systems built on top of that: Building additional layers of security based on the TCB.

Future: Data Privacy

  • Data Privacy: Involves the governance of how data is collected, shared, and used, ensuring compliance with data protection laws and regulations.
  • Data Security: Focuses on protecting data from both internal and external threats. Emphasizes on measures taken by organizations to prevent unauthorized third-party access.

Future: Artificial Intelligence

  • The concept and scope of AI may undergo changes in terms of adversaries and defenders.
  • Legal frameworks and regulations may need adjustments to accommodate AI advancements.

Future: Internet of Things (IoT)

  • Shortcomings in IoT Systems: They often lack a secure update system, physical barriers, privacy protection, and effective network services.
  • Other Concerns: Legacy liabilities and components that are either insecure or outdated.
  • Statistics: Presents the share of security issues among various IoT devices with Medical Imaging Systems leading at 51%.

Future: Cybercrime

  • Emphasizes on the prevention of cybercrimes and bolstering security measures.
  • Mentions a "Mysterious guest lecturer" in relation to the topic.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published