CS 88S Safety in the Cloud An Introduction to Cybersecurity Frank Chen | Spring 2017
Agenda ● Introductions ● Icebreaker Activity ● Administrative ● Myths & Realities ● Computers, Networks, Paradigms of Cybersecurity Frank Chen | Spring 2017
Agenda ● Introductions ● Icebreaker Activity ● Administrative ● Myths & Realities ● Computers, Networks, Paradigms of Cybersecurity Frank Chen | Spring 2017
Who am I? I’m Canadian! I love Computer Science B.S. poutine. 4 th year @ UCLA CS 136: Computer Security Excited to graduate! Resident Assistant @ Incoming PM @ Microsoft UCLA Residential Life Information Security Frank Chen Frank Chen | Spring 2017
ASK ME ANYTHING, ANYTIME. Frank Chen | Spring 2017
Agenda ● Introductions ● Icebreaker Activity ● Administrative ● Myths & Realities ● Computers, Networks, Paradigms of Cybersecurity Frank Chen | Spring 2017
Activity: Why CS 88S? Name Intended Area of Study Your "hidden hemisphere" Why CS 88S? Frank Chen | Spring 2017
Why Why Why Why Why The Five Why’s Frank Chen | Spring 2017
Why Why Why Why Why Why am I taking CS 88S? Because I want to learn about cybersecurity . Frank Chen | Spring 2017
Why Why Why Why Why Why am I taking CS 88S? Because I want to learn about cybersecurity . Frank Chen | Spring 2017
Why Why Why Why Why Why do I want to learn about cybersecurity? Because I want to protect myself on the Internet. Frank Chen | Spring 2017
Why Why Why Why Why Why do I want to learn about cybersecurity? Because I want to protect myself on the Internet. Frank Chen | Spring 2017
Why Why Why Why Why Why do I want to protect myself on the Internet? Because I don’t want a malicious individual to hack me. Frank Chen | Spring 2017
Why Why Why Why Why Why do I want to protect myself on the Internet? Because I don’t want a malicious individual to hack me. Frank Chen | Spring 2017
Why Why Why Why Why Why don’t I want to be hacked? Because I have a lot of personal information online that should remain private . Frank Chen | Spring 2017
Why Why Why Why Why Why don’t I want to be hacked? Because I have a lot of personal information online that should remain private . Frank Chen | Spring 2017
Why Why Why Why Why ISPs vs. Google/Amazon/Facebook "Not only are users unable to control what traffic the ISP sees, but frequently they have no alternative; no Protonmail , no DuckDuckGo , no Signal . Much of the population gets to choose between two or three providers if they have any choice at all. This lack of choice puts ISPs in a different category from edge providers. " http://tcrn.ch/2nhnAI1 Frank Chen | Spring 2017
Why Why Why Why Why Why should my personal information remain private? Because my personal information gives me access to my money , my personal contacts , my identification , and I don’t want that to be taken advantage of. Frank Chen | Spring 2017
Why Why Why Why Why Why should my personal information remain private? Because my personal information gives me access to my money , my personal contacts , my identification , and I don’t want that to be taken advantage of. Frank Chen | Spring 2017
In Summary cybersecurity ~ 2 weeks protect myself ~ 4 weeks hack privacy ~ 2 weeks money, personal contact, identification ~ 2 weeks extra ( ex. security in IoT devices ) Frank Chen | Spring 2017
Agenda ● Introductions ● Icebreaker Activity ● Administrative ● Myths & Realities ● Computers, Networks, Paradigms of Cybersecurity Frank Chen | Spring 2017
Course Website! http://kfrankc.me/cs88s Frank Chen | Spring 2017
A Note on “Homework” Frank Chen | Spring 2017
Grading Scheme → Grade Frank Chen | Spring 2017
<10 Hours Frank Chen | Spring 2017
“Being right keeps you in place. Being wrong forces you to explore.” Steven Johnson Where Good Ideas Come From Frank Chen | Spring 2017
ASK ME ANYTHING, ANYTIME. Frank Chen | Spring 2017
Agenda ● Introductions ● Icebreaker Activity ● Administrative ● Myths & Realities ● Computers, Networks, Paradigms of Cybersecurity Frank Chen | Spring 2017
Myths vs. Reality Frank Chen | Spring 2017
Common Myths ● “No one cares about my computer.” ● “I have nothing worth stealing.” ● “Who would go through the effort of targeting me?” ● “It would be obvious if my computer was compromised.” Frank Chen | Spring 2017
The Reality ● “No one cares about my computer.” ● Attacks are easily automated ○ For example: Spam & Phishing Frank Chen | Spring 2017
The Reality ● “I have nothing worth stealing.” ● There are billions to be made off of insecure computers ○ Stolen money, but also: identities, accounts etc. Frank Chen | Spring 2017
The Reality ● Who would go through the effort of targeting me?” ● Many of you are valuable targets ○ Credit cards, shopping accounts, research lab data, corporate data etc. Frank Chen | Spring 2017
The Reality ● “It would be obvious if my computer was compromised.” ● When someone wants to take advantage of your information, they do NOT want you to discover them. Frank Chen | Spring 2017
“Nothing is more important to a democracy than a well-informed electorate.” Will McAvoy The Newsroom Frank Chen | Spring 2017
Nothing is more important to the success of cybersecurity than a cybersecurity-aware population. Frank Chen | Spring 2017
ASK ME ANYTHING, ANYTIME. Frank Chen | Spring 2017
Agenda ● Introductions ● Icebreaker Activity ● Administrative ● Myths & Realities ● Computers, Internet, Paradigms of Cybersecurity Frank Chen | Spring 2017
Computers Computers deal with data . Computers are deterministic Frank Chen | Spring 2017
Internet Internet brings everyone together. Internet is nondeterministic . Frank Chen | Spring 2017
The CIA Principle C Confidentiality I Integrity A Accessibility Frank Chen | Spring 2017
Confidentiality C Def: ability to hide information from those people unauthorised I to view it. A Frank Chen | Spring 2017
Confidentiality C I A Frank Chen | Spring 2017
Integrity C Def: ability to ensure that data is an accurate and unchanged representation of the original I secure information. A Frank Chen | Spring 2017
Integrity C I $1000.00 A Frank Chen | Spring 2017
Accessibility C Def: ability to ensure that the information concerned is readily I accessible to the authorised viewer at all times A Frank Chen | Spring 2017
Accessibility C I A Frank Chen | Spring 2017 http://tcrn.ch/2dt8sHy
In Summary C Confidentiality I Integrity A Accessibility Frank Chen | Spring 2017
S�f��� �� ��� C���� T�� Always perform system update http://r29.co/2doFCmR Frank Chen | Spring 2017
Mr. Robot, an Emmy Award-winning TV drama starring a vigilante hacker Next Week... Frank Chen | Spring 2017
Recommend
More recommend