Course Ph.D(1991) from EECS@Yokohama National University...
Transcript of Course Ph.D(1991) from EECS@Yokohama National University...
�T
itle
: C
yber
Sec
uri
ty (
CS748
)
�C
redit
/Hour
: 3/3
�P
rof : K
wan
gjo
Kim
(R
oom
2215
@N
5)
�T
A : J
an
gse
on
gK
im,
Cou
rse
Cou
rse
�T
A : J
an
gse
on
gK
im,
�H
our
: T
ue.
/ T
hu., 1
6:0
0 -
17:1
5
�W
eb p
age
: htt
p:/
/cais
lab.k
ais
t.ac.
kr/
lect
ure
/20
10/f
all/c
s748
/in
dex
.htm
l
�1
�A
cadem
ic H
isto
ry•
BS (
198
1) a
nd M
S (
198
3)f
rom
EE
@Y
on
seiU
niv
.
•P
h.D
(1991)
fro
m E
EC
S@
Yokoham
aN
ati
on
al U
niv
ersi
ty
�C
are
er•
'79 ~
'97 : S
ecti
on
Hea
d o
f C
odin
g T
ech. #
1 in
ET
RI
•'9
6 ~
'97 : A
dju
nct
Pro
fess
or
at C
om
pute
r Sci
ence
Dep
t. in
Chun
gN
am
Nati
on
al U
niv
.•
'99 ~
'00
: V
isit
ing P
rofe
ssor
at U
niv
. of T
okyo, Japan
•'9
9 ~
’05
: D
irec
tor
of IA
CR
/ I
nst
itute
for
IT-g
ifte
d Y
outh
•'9
8 ~
’09
: P
rofe
ssor
/ D
ean
of Sch
ool of E
ngin
eeri
ng
in I
CU
Pro
f. K
wan
gjo
Kim
Pro
f. K
wan
gjo
Kim
•'9
8 ~
’09
: P
rofe
ssor
/ D
ean
of Sch
ool of E
ngin
eeri
ng
in I
CU
•'0
2
: 1
00
0 W
orl
d L
eader
s of Sci
enti
fic
Infl
uen
ce b
y A
BI
•’0
5 ~
‘06 : V
isit
ing S
chola
r at M
IT/U
CSD
•‘0
9.1
~’0
9.1
2: P
resi
den
t of K
IISC
•’0
9.3
~ :
P
rofe
ssor
in C
SD
@ K
AIS
T
�A
cadem
ic A
ctiv
itie
s•
More
than
10
0 P
rogra
m C
om
mit
tee
Mem
ber
s of C
rypto
an
d S
ecuri
ty C
on
fere
nce
s•
Chair
per
son
of A
siacr
yptSte
erin
g C
om
mit
tee
(‘0
5-’
08
)•
More
than
20
in
vit
ed talk
s to
in
tern
ati
on
al co
nfe
ren
ces
�A
ward
s•
Pre
siden
tial C
itati
on
(’0
9.9
), M
inis
ter
of N
IS (
‘09.1
2)
�2
Objective:
This
cours
e d
iscu
sses
the late
st iss
ues
on
cyber
secu
rity
begin
nin
g w
ith t
he
intr
oduct
ion
of basi
c cr
ypto
gra
phy t
o u
nders
tan
d h
ow
to d
esi
gn
auth
en
tica
tion
pri
mit
ives
coveri
ng m
ult
i-part
y c
rypto
gra
phic
pro
toco
ls a
nd
core
secu
rity
com
pon
en
ts for
netw
ork
secu
rity
, etc
. S
peci
al pre
sen
tati
on
s on
DD
oS
defe
nse
s an
d s
ecu
re s
mart
gri
d a
re s
chedule
d. T
he e
nro
lled
studen
t m
ust
read a
nd p
rese
nt
the r
eco
mm
en
ded p
apers
an
d p
ract
ice y
our
term
pro
ject
un
der
the g
uid
an
ce o
f your
pro
fess
or
an
d T
A.
Syll
abu
sSyll
abu
s
term
pro
ject
un
der
the g
uid
an
ce o
f your
pro
fess
or
an
d T
A.
References:
W.Sta
llin
gs,
“Cry
pto
gra
phy
an
dN
etw
ork
Secu
rity
”,4
thE
d.,
Pea
rson
Educa
tion
Inc,
ISB
N0
-13-
187316
-4,2
00
6J. M
irkovic
, S. D
ietr
ich, D
. D
ittr
ich
an
d P
. R
eih
er,
“In
tern
et D
en
ial of Serv
ice, A
ttack
an
d
Defe
nse
s M
ech
an
ism
s”, 2
00
5, P
ears
on
Educa
tion
In
c., IS
BN
0-1
3-1
47573-8
Sid
e C
han
nel A
ttack
: h
ttp:/
/ww
w.c
rypto
.ruhr-
un
i-boch
um
.de/
en_
sclo
un
ge.
htm
lD
ET
ER
: h
ttp:/
/ww
w.isi
.edu/d
ete
r/, etc
.
GradingPolicy:
-M
idte
rmE
xam
:15
%-
Quiz
:5%
-F
inalE
xam
:15%
-H
om
ework
:10
%-
Ter
mP
roje
ct:25%
-Ter
mP
aper
:25%
,A
tten
dan
ce:5%
(Tota
l:10
0%
)
�3
�(R
edir
ecte
d f
rom
Cyber
sec
uri
ty)
htt
p:/
/en
.wik
ipedia
.org
/wik
i/C
yber
_se
curi
ty
�Computer security
is a
bra
nch
of co
mpute
r te
chn
olo
gy k
now
n a
s in
form
ati
on
se
curi
tyas
applied
to c
om
pute
rsan
d n
etw
ork
s.
�T
he
obje
ctiv
e of co
mpute
r se
curi
ty in
cludes
pro
tect
ion
of in
form
ati
on
an
d p
roper
ty
from
thef
t, c
orr
upti
on
, or
natu
ral dis
ast
er, w
hile
allow
ing t
he
info
rmati
on
an
d
Wh
at
is C
yber
Secu
rity
?W
hat
is C
yber
Secu
rity
?
from
thef
t, c
orr
upti
on
, or
natu
ral dis
ast
er, w
hile
allow
ing t
he
info
rmati
on
an
d
pro
per
ty t
o r
emain
acc
essi
ble
an
d p
roduct
ive
to its
in
ten
ded u
sers
.
�T
he
term
com
pute
r sy
stem
sec
uri
ty m
ean
s th
e co
llec
tive
pro
cess
es a
nd m
echan
ism
s by w
hic
h s
ensi
tive
an
d v
alu
able
in
form
ati
on
an
d s
ervic
es a
re p
rote
cted
fro
m
publica
tion
, ta
mper
ing o
r co
llapse
by u
nauth
ori
zed a
ctiv
itie
s or
un
trust
wort
hy
indiv
idu
als
an
d u
npla
nn
ed e
ven
ts, re
spec
tivel
y.
�T
he
stra
tegie
s an
d m
ethodolo
gie
s of co
mpute
r se
curi
ty o
ften
dif
fer
from
most
oth
er
com
pute
r te
chn
olo
gie
s bec
ause
of it
s so
mew
hat
elusi
ve
obje
ctiv
e of pre
ven
tin
g
un
wan
ted c
om
pute
r beh
avio
r in
stea
d o
f en
ablin
g w
an
ted c
om
pute
r beh
avio
r.
�4
�D
escr
ibe
your
pre
vio
us
or
curr
ent ca
reer
on
in
form
ati
on
sec
uri
ty a
nd c
rypto
gra
phy
You
r B
ack
gro
un
dY
ou
r B
ack
gro
un
d
�5
Weekly
Lect
ure
Pla
nW
eekly
Lect
ure
Pla
n
�6
* Schedule can be subject to change slightly depending on the number of enrolled students.
�P
aper
Rea
din
g
•R
ecom
men
ded
paper
will be
sugges
ted
•Y
ou c
an
sel
ect am
on
g b
asi
c an
d a
dvan
ced p
aper
s
�T
erm
Pro
ject
•e.
g.,
Ref
erto
DE
TE
Rw
ebpage
an
dse
lect
your
challen
gin
gto
pic
Pap
er
Read
ing &
Term
Pro
ject
P
ap
er
Read
ing &
Term
Pro
ject
•e.
g.,
Ref
erto
DE
TE
Rw
ebpage
an
dse
lect
your
challen
gin
gto
pic
•T
erm
Pro
ject
Pro
posa
l
•P
roble
mSta
tem
en
t
•M
yA
ppro
ach
•T
ime
Sch
edule
•E
xpect
ed
outc
om
e
•2
tim
espre
sen
tati
on
�C
on
sult
TA
for
det
ails.
�7
Ch
all
en
gin
g T
op
ics
for
you
r T
PC
hall
en
gin
g T
op
ics
for
you
r T
P
�8
http://www.goingwimax.com/cybersecurity-roadmap-or-internet-roadblock-11516/
DE
TE
R
DE
TE
R T
est
bed
Test
bed
�9
Ch
an
gin
g
Ch
an
gin
g IT
Secu
rity
IT
Secu
rity
Users
Lifelines for society,
economy, and daily life
Exclusive systems
Big, host types
C/S types
PC, Internet
Mobile & Ubiquitous
Small/medium
Personal use
Role of inform
ation systems
Direction of IT security
Internet
PC
Mobile/
Ubiquitous
�10
Efficient work style,
competitiveness
2000
Users
National security,
calculation use
Reliability of
systems
E-commerce
Economic infrastructure
Government
Banking, transportation,
energy sectors
Large enterprises
enterprises
Protection of military data.
Availability for
critical infrastructure
Availability for IT
systems in corporations
Network security
for e-commerce
Security for
e-government
Safe/reliable
society
1950
Evolu
tion
of
Att
ack
Evolu
tion
of
Att
ack
Evolu
tion
of
Att
ack
Evolu
tion
of
Att
ack
�From an expert to
anyone
�From a hobby to a
profitable industry
From annoying to
�11
�From annoying to
destructive
�From playing to
stealing
�From simplicity to
complexity
�C
yber
Sec
uri
ty is
now
in
the
top 5
nati
on
al
secu
rity
pri
ori
ties
of m
ost
gre
at
pow
ers
an
d
man
y m
iddle
pow
ers
�D
efen
se is
not en
ough; all c
oun
trie
s dev
elopin
g o
ffen
se
Str
ate
gic
Hack
ing E
raStr
ate
gic
Hack
ing E
ra
dev
elopin
g o
ffen
se�
Pri
vate
sec
tor
def
ense
con
tract
ors
are
goin
g
on
the
off
ensi
ve
�E
ver
yon
e is
att
ack
ing e
ver
yon
e el
se, ev
en
allie
s vs.
allie
s�
2 lik
ely s
cen
ari
os:
chaos
or
sever
e re
stri
ctio
n �12
ITU
&
ITU
& C
ybers
ecu
rity
Cybers
ecu
rity
�13
UN
Reso
luti
on
s on
“C
ult
ure
of
UN
Reso
luti
on
s on
“C
ult
ure
of
Secu
rity
” (1
/2)
Secu
rity
” (1
/2)
�14
UN
Reso
luti
on
s on
“C
ult
ure
of
UN
Reso
luti
on
s on
“C
ult
ure
of
Secu
rity
” (2
/2)
Secu
rity
” (2
/2)
�15
Cybers
ecu
rity
Cybers
ecu
rity
SG
Act
ivit
ies
in I
TU
SG
Act
ivit
ies
in I
TU
--T
(Sta
nd
ard
izati
on
)T
(Sta
nd
ard
izati
on
)
�16
CyberS
ecu
rity
CyberS
ecu
rity
Issu
es
& C
hall
en
ges
Issu
es
& C
hall
en
ges
�17
Cyber
Secu
rity
in
IT
UC
yber
Secu
rity
in
IT
U--S
G17
SG
17
�KINAC 강연(2010.7.21) Kwangjo Kim
�18
Ele
ctro
nic
Arm
s R
ace
of
Ele
ctro
nic
Arm
s R
ace
of
Cyber
Secu
rity
Cyber
Secu
rity
�KINAC 강연(2010.7.21) Kwangjo Kim
�19
보안
보안위협의
위협의진화
진화
�2006 CISCO 발표자료
�KINAC 강연(2010.7.21) Kwangjo Kim
�20