Hello! This is an Org-mode file, and can be viewed nicely with Emacs and org-present.
- Discussion forum
- Live Q&A (in this course)
https://courses.edx.org/courses/course-v1:RITx+CYBER501x+1T2017/info Jonathan S. Weissman Lecturer, Computing Security Rochester Institute of Technology (RiX
MicroMasters program in Cybersecurity
Certificate: $150 for this course (didn’t do it)
Target audience: Beginners to the topics.
7 modules so far
Introduction: what’s cybersecurity about, what’s a vulnerability, famous hacks
Models to approach cybersecurity
Hashes, certificates, symmetric vs asymmetric encryption
Didn’t watch.
IP, subnet mask, routing, MAC addresses Ports, TCP, UDP, switches, dynamic routing,
static addresses, DHCP + DNS
Firewalls, IDS, IPS and the differences between them. Decoy systems and honeypots
111,341,258 user names with passwords exposed
Why’s that still relevant today?
Very nice technical reconstruction of the attack
December 2013, the hack was published
Stolen: • Personal Identifiable Information (PII) of 70 million customers • 40 million credit cards and debit cards
CEO and CIO resigned Fin damages: $1b
• the HVAC (Heating, ventilation and air conditioning) provider was hacked using email-phishing • gained access to targets vendor systems • PHP vulnerability • Created Windows Domain Admin account • Used this to gain access to the DB servers • Create FTP server to download the files
Looking at what we want to achieve and what we must balance
• Confidentiality: Restricting read-access to sensitive information. Cryptography. • Integrity: We feel safe that the data transmitted, processed and stored has not been changed from its original form. • Availability: Authorized ppl have access to the services. This includes protection from DDoS or disaster.
Looking at how to achieve the proper CIA balance.
• Multiple factors: Something you know (e.g. password, passphrase), something you have (e.g. keyfile, passport), something you are (e.g. biometrics, your retina)
A password and a secret phrase are not two factors!
We know who you are: What are you allowed to do?
• Principle of Least Privilege
Keeping track of users and their actions. -> alerts for suspicious behavior -> forensics after an attack
At Target, the new admin may have raised eyebrows!
It’s a balance.
Perfect availability: No restrictions. Perfect security: System is offline
Only secrecy of the key provides security (not secrecy of the algorithm). https://en.wikipedia.org/wiki/Kerckhoffs%27s_principle
Mark has shown this works at Caresharing for SSH!