CS 88S Safety in the Cloud - Frank Chen · 2020. 7. 23. · CS 88S Safety in the Cloud An...
Transcript of CS 88S Safety in the Cloud - Frank Chen · 2020. 7. 23. · CS 88S Safety in the Cloud An...
Frank Chen | Spring 2017
CS 88S
Safety in the CloudAn Introduction to Cybersecurity
Frank Chen | Spring 2017
Agenda● Introductions● Icebreaker Activity● Administrative ● Myths & Realities● Computers, Networks, Paradigms of
Cybersecurity
Frank Chen | Spring 2017
Agenda● Introductions● Icebreaker Activity● Administrative ● Myths & Realities● Computers, Networks, Paradigms of
Cybersecurity
Frank Chen | Spring 2017
Who am I?I’m Canadian! I love poutine.
4th year @ UCLAExcited to graduate!
Resident Assistant @ UCLA Residential Life
Computer Science B.S.
CS 136: Computer Security
Incoming PM @ Microsoft Information Security
Frank Chen
Frank Chen | Spring 2017
ASK ME ANYTHING,ANYTIME.
Frank Chen | Spring 2017
Agenda● Introductions● Icebreaker Activity● Administrative ● Myths & Realities● Computers, Networks, Paradigms of
Cybersecurity
Frank Chen | Spring 2017
Why CS 88S?Activity:
NameIntended Area of Study
Your "hidden hemisphere"Why CS 88S?
Frank Chen | Spring 2017
The Five Why’s
Why Why Why Why Why
Frank Chen | Spring 2017
Why Why Why Why Why
Why am I taking CS 88S?
Because I want to learn about cybersecurity.
Frank Chen | Spring 2017
Why Why Why Why Why
Why am I taking CS 88S?
Because I want to learn about cybersecurity.
Frank Chen | Spring 2017
Why Why Why Why Why
Why do I want to learn about cybersecurity? Because I want to protect myself on the Internet.
Frank Chen | Spring 2017
Why Why Why Why Why
Why do I want to learn about cybersecurity? Because I want to protect myself on the Internet.
Frank Chen | Spring 2017
Why Why Why Why Why
Why do I want to protect myself on the Internet?Because I don’t want a malicious individual to hack me.
Frank Chen | Spring 2017
Why Why Why Why Why
Why do I want to protect myself on the Internet?Because I don’t want a malicious individual to hack me.
Frank Chen | Spring 2017
Why Why Why Why Why
Why don’t I want to be hacked?
Because I have a lot of personal information online that should remain private.
Frank Chen | Spring 2017
Why Why Why Why Why
Why don’t I want to be hacked?
Because I have a lot of personal information online that should remain private.
Frank Chen | Spring 2017
Why Why Why Why Why
ISPs vs. Google/Amazon/Facebook
http://tcrn.ch/2nhnAI1
"Not only are users unable to control what traffic the ISP sees, but frequently they have no alternative; no Protonmail, no DuckDuckGo, no Signal. Much of the population gets to choose between two or three providers if they have any choice at all. This lack of choice puts ISPs in a different category from edge providers."
Frank Chen | Spring 2017
Why Why Why Why Why
Why should my personal information remain private?Because my personal information gives me access to my money, my personal contacts, my identification, and I don’t want that to be taken advantage of.
Frank Chen | Spring 2017
Why Why Why Why Why
Why should my personal information remain private?Because my personal information gives me access to my money, my personal contacts, my identification, and I don’t want that to be taken advantage of.
Frank Chen | Spring 2017
cybersecurity
protect myself
hack
privacy
money, personal contact, identification
extra (ex. security in IoT devices)
In Summary~ 2 weeks
~ 4 weeks
~ 2 weeks
~ 2 weeks
Frank Chen | Spring 2017
Agenda● Introductions● Icebreaker Activity● Administrative ● Myths & Realities● Computers, Networks, Paradigms of
Cybersecurity
Frank Chen | Spring 2017
Course Website!http://kfrankc.me/cs88s
Frank Chen | Spring 2017
A Note on “Homework”
Frank Chen | Spring 2017
Grading Scheme → Grade
Frank Chen | Spring 2017
<10Hours
Frank Chen | Spring 2017
“Being right keeps you in place. Being wrong forces you to explore.”
Steven JohnsonWhere Good Ideas Come From
Frank Chen | Spring 2017
ASK ME ANYTHING,ANYTIME.
Frank Chen | Spring 2017
Agenda● Introductions● Icebreaker Activity● Administrative ● Myths & Realities● Computers, Networks, Paradigms of
Cybersecurity
Frank Chen | Spring 2017
Myths vs. Reality
Frank Chen | Spring 2017
Common Myths● “No one cares about my computer.”
● “I have nothing worth stealing.”
● “Who would go through the effort of targeting me?”
● “It would be obvious if my computer was
compromised.”
Frank Chen | Spring 2017
The Reality● “No one cares about my computer.”
● Attacks are easily automated
○ For example: Spam & Phishing
Frank Chen | Spring 2017
The Reality● “I have nothing worth stealing.”
● There are billions to be made off of insecure
computers
○ Stolen money, but also: identities, accounts etc.
Frank Chen | Spring 2017
The Reality● Who would go through the effort of targeting me?”
● Many of you are valuable targets
○ Credit cards, shopping accounts, research lab data,
corporate data etc.
Frank Chen | Spring 2017
The Reality● “It would be obvious if my computer was
compromised.”
● When someone wants to take advantage of your
information, they do NOT want you to discover them.
Frank Chen | Spring 2017
“Nothing is more important to a democracy than a well-informed electorate.”
Will McAvoyThe Newsroom
Frank Chen | Spring 2017
Nothing is more important to the success of cybersecurity than a
cybersecurity-aware population.
Frank Chen | Spring 2017
ASK ME ANYTHING,ANYTIME.
Frank Chen | Spring 2017
Agenda● Introductions● Icebreaker Activity● Administrative ● Myths & Realities● Computers, Internet, Paradigms of
Cybersecurity
Frank Chen | Spring 2017
Computers
Computers deal with data.
Computers are deterministic
Frank Chen | Spring 2017
Internet
Internet brings everyone together.
Internet is nondeterministic.
Frank Chen | Spring 2017
The CIA PrincipleC
I
A
Confidentiality
Integrity
Accessibility
Frank Chen | Spring 2017
ConfidentialityC
I
A
Def: ability to hide information from those people unauthorised to view it.
Frank Chen | Spring 2017
ConfidentialityC
I
A
Frank Chen | Spring 2017
IntegrityC
I
A
Def: ability to ensure that data is an accurate and unchanged representation of the original secure information.
Frank Chen | Spring 2017
IntegrityC
I
A$1000.00
Frank Chen | Spring 2017
AccessibilityC
I
A
Def: ability to ensure that the information concerned is readily accessible to the authorised viewer at all times
Frank Chen | Spring 2017
AccessibilityC
I
Ahttp://tcrn.ch/2dt8sHy
Frank Chen | Spring 2017
In SummaryC
I
A
Confidentiality
Integrity
Accessibility
Frank Chen | Spring 2017
S f C T
http://r29.co/2doFCmR
Always perform system update
Frank Chen | Spring 2017
Mr. Robot, an Emmy Award-winning TV drama starring a vigilante hacker
Next Week...