Lecture #01

Simson L. Garfinkel

CS G256

May 4th, 2004

 

  1. Introductions
    1. Teacher
    2. Class backgrounds & expectations
  2. Handouts:
    1. Syllabus
    2. Sign-up sheet (name, email, year)
    3. Fair Information Practices
  3. Mechanics of the class
    1. Website http://www.ccs.neu.edu/course/csg256/
    2. (Also http://www.simson.net/csg256/)
    3. Quizzes, problem sets, and final projects
    4. Online component
  4. Brief History of Computer Security
    1. 1930s  - Turing
    2. 1940s – Cracking codes
    3. 1950s – Interactive computing, time sharing
    4. 1960s – Remote terminals.
    5. 1971s – First reports of “hacking”
    6. RFC 602
    7. 1983 – WarGames
    8. 1986 – The Cuckoo’s Egg
    9. 1980s – Emergence of the hacker underground
    10. January 15, 1990 – AT&T network crash
    11. Operation Sun Devil (www.mit.edu/hacker/hacker.html)
  5. Goals of Computer Security:
    1. Availability – Make sure you can use your system
    2. Confidentiality – Keep your things secret!
    3. Data integrity – Prevent others from modifying your things
    4. Consistency – Make sure that the system behaves as expected for authorized users
    5. Control – Regulate the use of your system
    6. Audit – What happened, how do we undo it?
  6. Secure, Unsecured, Insecure, and Trust
  7. Assignment #1:
    1. Part 1 – Your own definition of security
    2. Part 2 – A 950-word essay describing a security incident
    3. Submit both on the class website before 4pm, May 6th
  8. Photographs of Students (at end of class)