safety in the cloud
play

Safety in the Cloud An Introduction to Cybersecurity Frank Chen | - PowerPoint PPT Presentation

CS 88S Safety in the Cloud An Introduction to Cybersecurity Frank Chen | Spring 2017 Agenda Introductions Icebreaker Activity Administrative Myths & Realities Computers, Networks, Paradigms of Cybersecurity Frank Chen |


  1. CS 88S Safety in the Cloud An Introduction to Cybersecurity Frank Chen | Spring 2017

  2. Agenda ● Introductions ● Icebreaker Activity ● Administrative ● Myths & Realities ● Computers, Networks, Paradigms of Cybersecurity Frank Chen | Spring 2017

  3. Agenda ● Introductions ● Icebreaker Activity ● Administrative ● Myths & Realities ● Computers, Networks, Paradigms of Cybersecurity Frank Chen | Spring 2017

  4. Who am I? I’m Canadian! I love Computer Science B.S. poutine. 4 th year @ UCLA CS 136: Computer Security Excited to graduate! Resident Assistant @ Incoming PM @ Microsoft UCLA Residential Life Information Security Frank Chen Frank Chen | Spring 2017

  5. ASK ME ANYTHING, ANYTIME. Frank Chen | Spring 2017

  6. Agenda ● Introductions ● Icebreaker Activity ● Administrative ● Myths & Realities ● Computers, Networks, Paradigms of Cybersecurity Frank Chen | Spring 2017

  7. Activity: Why CS 88S? Name Intended Area of Study Your "hidden hemisphere" Why CS 88S? Frank Chen | Spring 2017

  8. Why Why Why Why Why The Five Why’s Frank Chen | Spring 2017

  9. Why Why Why Why Why Why am I taking CS 88S? Because I want to learn about cybersecurity . Frank Chen | Spring 2017

  10. Why Why Why Why Why Why am I taking CS 88S? Because I want to learn about cybersecurity . Frank Chen | Spring 2017

  11. Why Why Why Why Why Why do I want to learn about cybersecurity? Because I want to protect myself on the Internet. Frank Chen | Spring 2017

  12. Why Why Why Why Why Why do I want to learn about cybersecurity? Because I want to protect myself on the Internet. Frank Chen | Spring 2017

  13. Why Why Why Why Why Why do I want to protect myself on the Internet? Because I don’t want a malicious individual to hack me. Frank Chen | Spring 2017

  14. Why Why Why Why Why Why do I want to protect myself on the Internet? Because I don’t want a malicious individual to hack me. Frank Chen | Spring 2017

  15. Why Why Why Why Why Why don’t I want to be hacked? Because I have a lot of personal information online that should remain private . Frank Chen | Spring 2017

  16. Why Why Why Why Why Why don’t I want to be hacked? Because I have a lot of personal information online that should remain private . Frank Chen | Spring 2017

  17. Why Why Why Why Why ISPs vs. Google/Amazon/Facebook "Not only are users unable to control what traffic the ISP sees, but frequently they have no alternative; no Protonmail , no DuckDuckGo , no Signal . Much of the population gets to choose between two or three providers if they have any choice at all. This lack of choice puts ISPs in a different category from edge providers. " http://tcrn.ch/2nhnAI1 Frank Chen | Spring 2017

  18. Why Why Why Why Why Why should my personal information remain private? Because my personal information gives me access to my money , my personal contacts , my identification , and I don’t want that to be taken advantage of. Frank Chen | Spring 2017

  19. Why Why Why Why Why Why should my personal information remain private? Because my personal information gives me access to my money , my personal contacts , my identification , and I don’t want that to be taken advantage of. Frank Chen | Spring 2017

  20. In Summary cybersecurity ~ 2 weeks protect myself ~ 4 weeks hack privacy ~ 2 weeks money, personal contact, identification ~ 2 weeks extra ( ex. security in IoT devices ) Frank Chen | Spring 2017

  21. Agenda ● Introductions ● Icebreaker Activity ● Administrative ● Myths & Realities ● Computers, Networks, Paradigms of Cybersecurity Frank Chen | Spring 2017

  22. Course Website! http://kfrankc.me/cs88s Frank Chen | Spring 2017

  23. A Note on “Homework” Frank Chen | Spring 2017

  24. Grading Scheme → Grade Frank Chen | Spring 2017

  25. <10 Hours Frank Chen | Spring 2017

  26. “Being right keeps you in place. Being wrong forces you to explore.” Steven Johnson Where Good Ideas Come From Frank Chen | Spring 2017

  27. ASK ME ANYTHING, ANYTIME. Frank Chen | Spring 2017

  28. Agenda ● Introductions ● Icebreaker Activity ● Administrative ● Myths & Realities ● Computers, Networks, Paradigms of Cybersecurity Frank Chen | Spring 2017

  29. Myths vs. Reality Frank Chen | Spring 2017

  30. Common Myths ● “No one cares about my computer.” ● “I have nothing worth stealing.” ● “Who would go through the effort of targeting me?” ● “It would be obvious if my computer was compromised.” Frank Chen | Spring 2017

  31. The Reality ● “No one cares about my computer.” ● Attacks are easily automated ○ For example: Spam & Phishing Frank Chen | Spring 2017

  32. The Reality ● “I have nothing worth stealing.” ● There are billions to be made off of insecure computers ○ Stolen money, but also: identities, accounts etc. Frank Chen | Spring 2017

  33. The Reality ● Who would go through the effort of targeting me?” ● Many of you are valuable targets ○ Credit cards, shopping accounts, research lab data, corporate data etc. Frank Chen | Spring 2017

  34. The Reality ● “It would be obvious if my computer was compromised.” ● When someone wants to take advantage of your information, they do NOT want you to discover them. Frank Chen | Spring 2017

  35. “Nothing is more important to a democracy than a well-informed electorate.” Will McAvoy The Newsroom Frank Chen | Spring 2017

  36. Nothing is more important to the success of cybersecurity than a cybersecurity-aware population. Frank Chen | Spring 2017

  37. ASK ME ANYTHING, ANYTIME. Frank Chen | Spring 2017

  38. Agenda ● Introductions ● Icebreaker Activity ● Administrative ● Myths & Realities ● Computers, Internet, Paradigms of Cybersecurity Frank Chen | Spring 2017

  39. Computers Computers deal with data . Computers are deterministic Frank Chen | Spring 2017

  40. Internet Internet brings everyone together. Internet is nondeterministic . Frank Chen | Spring 2017

  41. The CIA Principle C Confidentiality I Integrity A Accessibility Frank Chen | Spring 2017

  42. Confidentiality C Def: ability to hide information from those people unauthorised I to view it. A Frank Chen | Spring 2017

  43. Confidentiality C I A Frank Chen | Spring 2017

  44. Integrity C Def: ability to ensure that data is an accurate and unchanged representation of the original I secure information. A Frank Chen | Spring 2017

  45. Integrity C I $1000.00 A Frank Chen | Spring 2017

  46. Accessibility C Def: ability to ensure that the information concerned is readily I accessible to the authorised viewer at all times A Frank Chen | Spring 2017

  47. Accessibility C I A Frank Chen | Spring 2017 http://tcrn.ch/2dt8sHy

  48. In Summary C Confidentiality I Integrity A Accessibility Frank Chen | Spring 2017

  49. S�f��� �� ��� C���� T�� Always perform system update http://r29.co/2doFCmR Frank Chen | Spring 2017

  50. Mr. Robot, an Emmy Award-winning TV drama starring a vigilante hacker Next Week... Frank Chen | Spring 2017

Recommend


More recommend