Lecture #01
Simson L. Garfinkel
CS G256
May 4th, 2004
- Introductions
- Teacher
- Class
backgrounds & expectations
- Handouts:
- Syllabus
- Sign-up
sheet (name, email, year)
- Fair
Information Practices
- Mechanics
of the class
- Website
http://www.ccs.neu.edu/course/csg256/
- (Also
http://www.simson.net/csg256/)
- Quizzes,
problem sets, and final projects
- Online
component
- Brief
History of Computer Security
- 1930s - Turing
- 1940s
Ð Cracking codes
- 1950s
Ð Interactive computing, time sharing
- 1960s
Ð Remote terminals.
- 1971s
Ð First reports of ÒhackingÓ
- RFC
602
- 1983
Ð WarGames
- 1986
Ð The CuckooÕs Egg
- 1980s
Ð Emergence of the hacker underground
- January
15, 1990 Ð AT&T network crash
- Operation
Sun Devil (www.mit.edu/hacker/hacker.html)
- Goals
of Computer Security:
- Availability
Ð Make sure you can use your system
- Confidentiality
Ð Keep your things secret!
- Data
integrity Ð Prevent others from modifying your things
- Consistency
Ð Make sure that the system behaves as expected for authorized users
- Control
Ð Regulate the use of your system
- Audit
Ð What happened, how do we undo it?
- Secure,
Unsecured, Insecure, and Trust
- Assignment
#1:
- Part
1 Ð Your own definition of security
- Part
2 Ð A 950-word essay describing a security incident
- Submit
both on the class website before 4pm, May 6th
- Photographs
of Students (at end of class)