CSCI 620 Lecture1
CSCI 620 Lecture1
CSCI-620: M02
Instructor: Qian Wang
Office hour: EGGC 802, Friday 10:30 am11:00am
Email: [email protected]
Lecture 1: 9/9/2016
Introduction:
Course Direction
Operating System Security is a broad topic
Which directly we go in is largely up to you!
Focus on OS principles with emphasis on security?
Focus on security with discussion of OS applications?
How many people have studied OS?
How many people have studied security?
How many people have worked with research
literature?
Course Details
To the syllabus!
It is your responsibility to understand
the requirements and policies of the
course and NYIT
If you have any questions, dont
hesitate to ask!
Note on Attendance
Students may only sign in during the
first 15 minutes of class
Anyone arriving later will be marked
absent
No retroactive sign-ins allowed
Statement on Academic
Integrity
There will be absolutely no exceptions from
the integrity policy
0 on assignment for first violation
Each subsequent violation reduces maximum letter grade
for course
Second offense: Maximum grade is a B+
Third offense: Maximum grade is a B
Fourth offense: Maximum grade is a C+
Fifth offense: Maximum grade is a C
Sixth offense: Failure in the course
All incidents will be referred to Student Affairs
A Digression on References
As researchers, we stand on the shoulders of giants!
Research is rarely the act of one individual, but
rather the gradual
accumulation of knowledge over time
It is critical to properly acknowledge the
contributions of others
Give credit where its due
Contextualize your own contribution
There are serious professional repercussions for not
doing so
A Digression on References
What is security?
Difficult to define
Defending computer resources from bad stuff
What this means is largely dependent on the
context!
Threat modeling is crucial
Broadly, prevent unauthorized people/systems
from:
Gaining access to information they shouldnt be able to
Altering information they shouldnt be able to
Stopping others from accessing information they
shouldnt be able to
Levels of a Secure System
Physical
Protect access to sensitive areas
Prevent tampering with equipment
Human
Make sure users are trustworthy
Prevent social engineering attacks
Operating System
Prevent exploitation of OS resources
Network
Prevent misuse of communication resources
Computer Security: Why it is important?
Confidentiality: prevention of
unauthorized disclosure of information
Integrity: prevention of unauthorized
modification of information
Availability: ability to withstand
unauthorized withholding of information
or resources
Computer Security Evolving Definitions