Lecture #01
Simson L. Garfinkel
CS G256
May 4th, 2004
- Introductions
- Teacher
- Class
backgrounds & expectations
- Handouts:
- Syllabus
- Sign-up
sheet (name, email, year)
- Fair
Information Practices
- Mechanics
of the class
- Website
http://www.ccs.neu.edu/course/csg256/
- (Also
http://www.simson.net/csg256/)
- Quizzes,
problem sets, and final projects
- Online
component
- Brief
History of Computer Security
- 1930s - Turing
- 1940s
� Cracking codes
- 1950s
� Interactive computing, time sharing
- 1960s
� Remote terminals.
- 1971s
� First reports of �hacking�
- RFC
602
- 1983
� WarGames
- 1986
� The Cuckoo�s Egg
- 1980s
� Emergence of the hacker underground
- January
15, 1990 � AT&T network crash
- Operation
Sun Devil (www.mit.edu/hacker/hacker.html)
- Goals
of Computer Security:
- Availability
� Make sure you can use your system
- Confidentiality
� Keep your things secret!
- Data
integrity � Prevent others from modifying your things
- Consistency
� Make sure that the system behaves as expected for authorized users
- Control
� Regulate the use of your system
- Audit
� What happened, how do we undo it?
- Secure,
Unsecured, Insecure, and Trust
- Assignment
#1:
- Part
1 � Your own definition of security
- Part
2 � A 950-word essay describing a security incident
- Submit
both on the class website before 4pm, May 6th
- Photographs
of Students (at end of class)