Course Ph.D(1991) from EECS@Yokohama National University...

10
Title : Cyber Security (CS748) Credit/Hour : 3/3 Prof : Kwangjo Kim (Room 2215@N5) TA : Jangseong Kim, Course Course TA : Jangseong Kim, Hour : Tue. / Thu., 16:00 - 17:15 Web page : http://caislab.kaist.ac.kr/lecture/2010/fall/cs748/index.html 1 Academic History BS (1981) and MS (1983)from EE@Yonsei Univ. Ph.D(1991) from EECS@Yokohama National University Career '79 ~ '97 : Section Head of Coding Tech. #1 in ETRI '96 ~ '97 : Adjunct Professor at Computer Science Dept. in ChungNam National Univ. '99 ~ '00 : Visiting Professor at Univ. of Tokyo, Japan '99 ~ ’05 : Director of IACR / Institute for IT-gifted Youth '98 ~ ’09 : Professor / Dean of School of Engineering in ICU Prof. Kwangjo Kim Prof. Kwangjo Kim '98 ~ ’09 : Professor / Dean of School of Engineering in ICU '02 : 1000 World Leaders of Scientific Influence by ABI ’05 ~ ‘06 : Visiting Scholar at MIT/UCSD ‘09.1~’09.12: President of KIISC ’09.3 ~ : Professor in CSD@ KAIST Academic Activities More than 100 Program Committee Members of Crypto and Security Conferences Chairperson of Asiacrypt Steering Committee (‘05-’08) More than 20 invited talks to international conferences Awards Presidential Citation (’09.9), Minister of NIS (‘09.12) 2

Transcript of Course Ph.D(1991) from EECS@Yokohama National University...

Page 1: Course Ph.D(1991) from EECS@Yokohama National University ...caislab.kaist.ac.kr/lecture/2010/fall/cs748/20100902-1st week.pdf · Lifelines for society, economy, and daily life Exclusive

�T

itle

: C

yber

Sec

uri

ty (

CS748

)

�C

redit

/Hour

: 3/3

�P

rof : K

wan

gjo

Kim

(R

oom

2215

@N

5)

�T

A : J

an

gse

on

gK

im,

Cou

rse

Cou

rse

�T

A : J

an

gse

on

gK

im,

�H

our

: T

ue.

/ T

hu., 1

6:0

0 -

17:1

5

�W

eb p

age

: htt

p:/

/cais

lab.k

ais

t.ac.

kr/

lect

ure

/20

10/f

all/c

s748

/in

dex

.htm

l

�1

�A

cadem

ic H

isto

ry•

BS (

198

1) a

nd M

S (

198

3)f

rom

EE

@Y

on

seiU

niv

.

•P

h.D

(1991)

fro

m E

EC

S@

Yokoham

aN

ati

on

al U

niv

ersi

ty

�C

are

er•

'79 ~

'97 : S

ecti

on

Hea

d o

f C

odin

g T

ech. #

1 in

ET

RI

•'9

6 ~

'97 : A

dju

nct

Pro

fess

or

at C

om

pute

r Sci

ence

Dep

t. in

Chun

gN

am

Nati

on

al U

niv

.•

'99 ~

'00

: V

isit

ing P

rofe

ssor

at U

niv

. of T

okyo, Japan

•'9

9 ~

’05

: D

irec

tor

of IA

CR

/ I

nst

itute

for

IT-g

ifte

d Y

outh

•'9

8 ~

’09

: P

rofe

ssor

/ D

ean

of Sch

ool of E

ngin

eeri

ng

in I

CU

Pro

f. K

wan

gjo

Kim

Pro

f. K

wan

gjo

Kim

•'9

8 ~

’09

: P

rofe

ssor

/ D

ean

of Sch

ool of E

ngin

eeri

ng

in I

CU

•'0

2

: 1

00

0 W

orl

d L

eader

s of Sci

enti

fic

Infl

uen

ce b

y A

BI

•’0

5 ~

‘06 : V

isit

ing S

chola

r at M

IT/U

CSD

•‘0

9.1

~’0

9.1

2: P

resi

den

t of K

IISC

•’0

9.3

~ :

P

rofe

ssor

in C

SD

@ K

AIS

T

�A

cadem

ic A

ctiv

itie

s•

More

than

10

0 P

rogra

m C

om

mit

tee

Mem

ber

s of C

rypto

an

d S

ecuri

ty C

on

fere

nce

s•

Chair

per

son

of A

siacr

yptSte

erin

g C

om

mit

tee

(‘0

5-’

08

)•

More

than

20

in

vit

ed talk

s to

in

tern

ati

on

al co

nfe

ren

ces

�A

ward

s•

Pre

siden

tial C

itati

on

(’0

9.9

), M

inis

ter

of N

IS (

‘09.1

2)

�2

Page 2: Course Ph.D(1991) from EECS@Yokohama National University ...caislab.kaist.ac.kr/lecture/2010/fall/cs748/20100902-1st week.pdf · Lifelines for society, economy, and daily life Exclusive

Objective:

This

cours

e d

iscu

sses

the late

st iss

ues

on

cyber

secu

rity

begin

nin

g w

ith t

he

intr

oduct

ion

of basi

c cr

ypto

gra

phy t

o u

nders

tan

d h

ow

to d

esi

gn

auth

en

tica

tion

pri

mit

ives

coveri

ng m

ult

i-part

y c

rypto

gra

phic

pro

toco

ls a

nd

core

secu

rity

com

pon

en

ts for

netw

ork

secu

rity

, etc

. S

peci

al pre

sen

tati

on

s on

DD

oS

defe

nse

s an

d s

ecu

re s

mart

gri

d a

re s

chedule

d. T

he e

nro

lled

studen

t m

ust

read a

nd p

rese

nt

the r

eco

mm

en

ded p

apers

an

d p

ract

ice y

our

term

pro

ject

un

der

the g

uid

an

ce o

f your

pro

fess

or

an

d T

A.

Syll

abu

sSyll

abu

s

term

pro

ject

un

der

the g

uid

an

ce o

f your

pro

fess

or

an

d T

A.

References:

W.Sta

llin

gs,

“Cry

pto

gra

phy

an

dN

etw

ork

Secu

rity

”,4

thE

d.,

Pea

rson

Educa

tion

Inc,

ISB

N0

-13-

187316

-4,2

00

6J. M

irkovic

, S. D

ietr

ich, D

. D

ittr

ich

an

d P

. R

eih

er,

“In

tern

et D

en

ial of Serv

ice, A

ttack

an

d

Defe

nse

s M

ech

an

ism

s”, 2

00

5, P

ears

on

Educa

tion

In

c., IS

BN

0-1

3-1

47573-8

Sid

e C

han

nel A

ttack

: h

ttp:/

/ww

w.c

rypto

.ruhr-

un

i-boch

um

.de/

en_

sclo

un

ge.

htm

lD

ET

ER

: h

ttp:/

/ww

w.isi

.edu/d

ete

r/, etc

.

GradingPolicy:

-M

idte

rmE

xam

:15

%-

Quiz

:5%

-F

inalE

xam

:15%

-H

om

ework

:10

%-

Ter

mP

roje

ct:25%

-Ter

mP

aper

:25%

,A

tten

dan

ce:5%

(Tota

l:10

0%

)

�3

�(R

edir

ecte

d f

rom

Cyber

sec

uri

ty)

htt

p:/

/en

.wik

ipedia

.org

/wik

i/C

yber

_se

curi

ty

�Computer security

is a

bra

nch

of co

mpute

r te

chn

olo

gy k

now

n a

s in

form

ati

on

se

curi

tyas

applied

to c

om

pute

rsan

d n

etw

ork

s.

�T

he

obje

ctiv

e of co

mpute

r se

curi

ty in

cludes

pro

tect

ion

of in

form

ati

on

an

d p

roper

ty

from

thef

t, c

orr

upti

on

, or

natu

ral dis

ast

er, w

hile

allow

ing t

he

info

rmati

on

an

d

Wh

at

is C

yber

Secu

rity

?W

hat

is C

yber

Secu

rity

?

from

thef

t, c

orr

upti

on

, or

natu

ral dis

ast

er, w

hile

allow

ing t

he

info

rmati

on

an

d

pro

per

ty t

o r

emain

acc

essi

ble

an

d p

roduct

ive

to its

in

ten

ded u

sers

.

�T

he

term

com

pute

r sy

stem

sec

uri

ty m

ean

s th

e co

llec

tive

pro

cess

es a

nd m

echan

ism

s by w

hic

h s

ensi

tive

an

d v

alu

able

in

form

ati

on

an

d s

ervic

es a

re p

rote

cted

fro

m

publica

tion

, ta

mper

ing o

r co

llapse

by u

nauth

ori

zed a

ctiv

itie

s or

un

trust

wort

hy

indiv

idu

als

an

d u

npla

nn

ed e

ven

ts, re

spec

tivel

y.

�T

he

stra

tegie

s an

d m

ethodolo

gie

s of co

mpute

r se

curi

ty o

ften

dif

fer

from

most

oth

er

com

pute

r te

chn

olo

gie

s bec

ause

of it

s so

mew

hat

elusi

ve

obje

ctiv

e of pre

ven

tin

g

un

wan

ted c

om

pute

r beh

avio

r in

stea

d o

f en

ablin

g w

an

ted c

om

pute

r beh

avio

r.

�4

Page 3: Course Ph.D(1991) from EECS@Yokohama National University ...caislab.kaist.ac.kr/lecture/2010/fall/cs748/20100902-1st week.pdf · Lifelines for society, economy, and daily life Exclusive

�D

escr

ibe

your

pre

vio

us

or

curr

ent ca

reer

on

in

form

ati

on

sec

uri

ty a

nd c

rypto

gra

phy

You

r B

ack

gro

un

dY

ou

r B

ack

gro

un

d

�5

Weekly

Lect

ure

Pla

nW

eekly

Lect

ure

Pla

n

�6

* Schedule can be subject to change slightly depending on the number of enrolled students.

Page 4: Course Ph.D(1991) from EECS@Yokohama National University ...caislab.kaist.ac.kr/lecture/2010/fall/cs748/20100902-1st week.pdf · Lifelines for society, economy, and daily life Exclusive

�P

aper

Rea

din

g

•R

ecom

men

ded

paper

will be

sugges

ted

•Y

ou c

an

sel

ect am

on

g b

asi

c an

d a

dvan

ced p

aper

s

�T

erm

Pro

ject

•e.

g.,

Ref

erto

DE

TE

Rw

ebpage

an

dse

lect

your

challen

gin

gto

pic

Pap

er

Read

ing &

Term

Pro

ject

P

ap

er

Read

ing &

Term

Pro

ject

•e.

g.,

Ref

erto

DE

TE

Rw

ebpage

an

dse

lect

your

challen

gin

gto

pic

•T

erm

Pro

ject

Pro

posa

l

•P

roble

mSta

tem

en

t

•M

yA

ppro

ach

•T

ime

Sch

edule

•E

xpect

ed

outc

om

e

•2

tim

espre

sen

tati

on

�C

on

sult

TA

for

det

ails.

�7

Ch

all

en

gin

g T

op

ics

for

you

r T

PC

hall

en

gin

g T

op

ics

for

you

r T

P

�8

http://www.goingwimax.com/cybersecurity-roadmap-or-internet-roadblock-11516/

Page 5: Course Ph.D(1991) from EECS@Yokohama National University ...caislab.kaist.ac.kr/lecture/2010/fall/cs748/20100902-1st week.pdf · Lifelines for society, economy, and daily life Exclusive

DE

TE

R

DE

TE

R T

est

bed

Test

bed

�9

Ch

an

gin

g

Ch

an

gin

g IT

Secu

rity

IT

Secu

rity

Users

Lifelines for society,

economy, and daily life

Exclusive systems

Big, host types

C/S types

PC, Internet

Mobile & Ubiquitous

Small/medium

Personal use

Role of inform

ation systems

Direction of IT security

Internet

PC

Mobile/

Ubiquitous

�10

Efficient work style,

competitiveness

2000

Users

National security,

calculation use

Reliability of

systems

E-commerce

Economic infrastructure

Government

Banking, transportation,

energy sectors

Large enterprises

enterprises

Protection of military data.

Availability for

critical infrastructure

Availability for IT

systems in corporations

Network security

for e-commerce

Security for

e-government

Safe/reliable

society

1950

Page 6: Course Ph.D(1991) from EECS@Yokohama National University ...caislab.kaist.ac.kr/lecture/2010/fall/cs748/20100902-1st week.pdf · Lifelines for society, economy, and daily life Exclusive

Evolu

tion

of

Att

ack

Evolu

tion

of

Att

ack

Evolu

tion

of

Att

ack

Evolu

tion

of

Att

ack

�From an expert to

anyone

�From a hobby to a

profitable industry

From annoying to

�11

�From annoying to

destructive

�From playing to

stealing

�From simplicity to

complexity

�C

yber

Sec

uri

ty is

now

in

the

top 5

nati

on

al

secu

rity

pri

ori

ties

of m

ost

gre

at

pow

ers

an

d

man

y m

iddle

pow

ers

�D

efen

se is

not en

ough; all c

oun

trie

s dev

elopin

g o

ffen

se

Str

ate

gic

Hack

ing E

raStr

ate

gic

Hack

ing E

ra

dev

elopin

g o

ffen

se�

Pri

vate

sec

tor

def

ense

con

tract

ors

are

goin

g

on

the

off

ensi

ve

�E

ver

yon

e is

att

ack

ing e

ver

yon

e el

se, ev

en

allie

s vs.

allie

s�

2 lik

ely s

cen

ari

os:

chaos

or

sever

e re

stri

ctio

n �12

Page 7: Course Ph.D(1991) from EECS@Yokohama National University ...caislab.kaist.ac.kr/lecture/2010/fall/cs748/20100902-1st week.pdf · Lifelines for society, economy, and daily life Exclusive

ITU

&

ITU

& C

ybers

ecu

rity

Cybers

ecu

rity

�13

UN

Reso

luti

on

s on

“C

ult

ure

of

UN

Reso

luti

on

s on

“C

ult

ure

of

Secu

rity

” (1

/2)

Secu

rity

” (1

/2)

�14

Page 8: Course Ph.D(1991) from EECS@Yokohama National University ...caislab.kaist.ac.kr/lecture/2010/fall/cs748/20100902-1st week.pdf · Lifelines for society, economy, and daily life Exclusive

UN

Reso

luti

on

s on

“C

ult

ure

of

UN

Reso

luti

on

s on

“C

ult

ure

of

Secu

rity

” (2

/2)

Secu

rity

” (2

/2)

�15

Cybers

ecu

rity

Cybers

ecu

rity

SG

Act

ivit

ies

in I

TU

SG

Act

ivit

ies

in I

TU

--T

(Sta

nd

ard

izati

on

)T

(Sta

nd

ard

izati

on

)

�16

Page 9: Course Ph.D(1991) from EECS@Yokohama National University ...caislab.kaist.ac.kr/lecture/2010/fall/cs748/20100902-1st week.pdf · Lifelines for society, economy, and daily life Exclusive

CyberS

ecu

rity

CyberS

ecu

rity

Issu

es

& C

hall

en

ges

Issu

es

& C

hall

en

ges

�17

Cyber

Secu

rity

in

IT

UC

yber

Secu

rity

in

IT

U--S

G17

SG

17

�KINAC 강연(2010.7.21) Kwangjo Kim

�18

Page 10: Course Ph.D(1991) from EECS@Yokohama National University ...caislab.kaist.ac.kr/lecture/2010/fall/cs748/20100902-1st week.pdf · Lifelines for society, economy, and daily life Exclusive

Ele

ctro

nic

Arm

s R

ace

of

Ele

ctro

nic

Arm

s R

ace

of

Cyber

Secu

rity

Cyber

Secu

rity

�KINAC 강연(2010.7.21) Kwangjo Kim

�19

보안

보안위협의

위협의진화

진화

�2006 CISCO 발표자료

�KINAC 강연(2010.7.21) Kwangjo Kim

�20