16.01.2015 Views

CS2013-final-report

CS2013-final-report

CS2013-final-report

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2. Discuss the concept of web sessions, secure communication channels such as TLS and importance of<br />

secure certificates, authentication including single sign-on such as OAuth and SAML. [Familiarity]<br />

3. Describe common types of vulnerabilities and attacks in web applications, and defenses against them.<br />

[Familiarity]<br />

4. Use client-side security capabilities in an application. [Usage]<br />

IAS/Platform Security<br />

[Elective]<br />

Topics:<br />

• Code integrity and code signing<br />

• Secure boot, measured boot, and root of trust<br />

• Attestation<br />

• TPM and secure co-processors<br />

• Security threats from peripherals, e.g., DMA, IOMMU<br />

• Physical attacks: hardware Trojans, memory probes, cold boot attacks<br />

• Security of embedded devices, e.g., medical devices, cars<br />

• Trusted path<br />

Learning outcomes:<br />

1. Explain the concept of code integrity and code signing and the scope it applies to. [Familiarity]<br />

2. Discuss the concept of root of trust and the process of secure boot and secure loading. [Familiarity]<br />

3. Describe the mechanism of remote attestation of system integrity. [Familiarity]<br />

4. Summarize the goals and key primitives of TPM. [Familiarity]<br />

5. Identify the threats of plugging peripherals into a device. [Familiarity]<br />

6. Identify physical attacks and countermeasures. [Familiarity]<br />

7. Identify attacks on non-PC hardware platforms. [Familiarity]<br />

8. Discuss the concept and importance of trusted path. [Familiarity]<br />

IAS/Security Policy and Governance<br />

[Elective]<br />

See general cross-referencing with the SP/Security Policies, Laws and Computer Crimes.<br />

Topics:<br />

• Privacy policy (cross-reference SP/Social Context/Social implications of computing in a networked world;<br />

cross-reference SP/Professional Ethics/Accountability, responsibility and liability; cross-reference<br />

SP/Privacy and Civil Liberties/Legal foundations of privacy protection)<br />

• Inference controls/statistical disclosure limitation<br />

• Backup policy, password refresh policy<br />

• Breach disclosure policy<br />

• Data collection and retention policies<br />

• Supply chain policy<br />

• Cloud security tradeoffs<br />

- 109 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!