Lecture #01

Simson L. Garfinkel

CS G256

May 4th, 2004

 

  1. Introductions
    1. Teacher
    2. Class backgrounds & expectations
  2. Handouts:
    1. Syllabus
    2. Sign-up sheet (name, email, year)
    3. Fair Information Practices
  3. Mechanics of the class
    1. Website http://www.ccs.neu.edu/course/csg256/
    2. (Also http://www.simson.net/csg256/)
    3. Quizzes, problem sets, and final projects
    4. Online component
  4. Brief History of Computer Security
    1. 1930s  - Turing
    2. 1940s Ð Cracking codes
    3. 1950s Ð Interactive computing, time sharing
    4. 1960s Ð Remote terminals.
    5. 1971s Ð First reports of ÒhackingÓ
    6. RFC 602
    7. 1983 Ð WarGames
    8. 1986 Ð The CuckooÕs Egg
    9. 1980s Ð Emergence of the hacker underground
    10. January 15, 1990 Ð AT&T network crash
    11. Operation Sun Devil (www.mit.edu/hacker/hacker.html)
  5. Goals of Computer Security:
    1. Availability Ð Make sure you can use your system
    2. Confidentiality Ð Keep your things secret!
    3. Data integrity Ð Prevent others from modifying your things
    4. Consistency Ð Make sure that the system behaves as expected for authorized users
    5. Control Ð Regulate the use of your system
    6. Audit Ð What happened, how do we undo it?
  6. Secure, Unsecured, Insecure, and Trust
  7. Assignment #1:
    1. Part 1 Ð Your own definition of security
    2. Part 2 Ð A 950-word essay describing a security incident
    3. Submit both on the class website before 4pm, May 6th
  8. Photographs of Students (at end of class)