slides01.tex
changeset 7 bd2b16f82601
parent 6 4c40d4b2d01c
child 8 a5184c270f30
equal deleted inserted replaced
6:4c40d4b2d01c 7:bd2b16f82601
   526 \mbox{}\\[-9mm]
   526 \mbox{}\\[-9mm]
   527 
   527 
   528 {\lstset{language=Scala}\fontsize{8}{10}\selectfont
   528 {\lstset{language=Scala}\fontsize{8}{10}\selectfont
   529 \texttt{\lstinputlisting{app2.scala}}}
   529 \texttt{\lstinputlisting{app2.scala}}}
   530 
   530 
   531   
   531 \footnotesize
   532 \end{frame}}
   532 \begin{itemize}
   533 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
   533 \item cookie value encoded as hash
   534 
   534 \end{itemize}
   535 
   535 \end{frame}}
   536 
   536 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
   537 
       
   538 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   539 \mode<presentation>{
       
   540 \begin{frame}[c]
       
   541 
       
   542   \begin{center}
       
   543   \includegraphics[scale=1.8]{pics/barrier.jpg}
       
   544   \end{center}
       
   545 
       
   546 \end{frame}}
       
   547  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%     
       
   548 
       
   549 
       
   550 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   551 \mode<presentation>{
       
   552 \begin{frame}[c]
       
   553 \mbox{}\\[-9mm]
       
   554 
       
   555 {\lstset{language=Scala}\fontsize{8}{10}\selectfont
       
   556 \texttt{\lstinputlisting{app3.scala}}}
       
   557 
       
   558   
       
   559 \end{frame}}
       
   560 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
   561 
       
   562 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   563 \mode<presentation>{
       
   564 \begin{frame}[c]
       
   565 \frametitle{\begin{tabular}{c}SHA-1\end{tabular}}
       
   566   
       
   567 \begin{itemize}
       
   568 \item SHA-1 is a cryptographic hash function
       
   569 \item no known attack exists, except brute force\bigskip\pause
       
   570 \item but dictionary attacks can be very effective for extracting passwords
       
   571 \end{itemize}  
       
   572   
       
   573 \end{frame}}
       
   574 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
   575 
       
   576 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   577 \mode<presentation>{
       
   578 \begin{frame}[c]
       
   579 \mbox{}\\[-9mm]
       
   580 
       
   581 {\lstset{language=Scala}\fontsize{8}{10}\selectfont
       
   582 \texttt{\lstinputlisting{app4.scala}}}
       
   583 
       
   584 \end{frame}}
       
   585 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
   586 
       
   587 
       
   588 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   589 \mode<presentation>{
       
   590 \begin{frame}[c]
       
   591 \frametitle{\begin{tabular}{c}Unix Passwords\end{tabular}}
       
   592 
       
   593 % Unix password
       
   594 % http://ubuntuforums.org/showthread.php?p=5318038
       
   595 
       
   596 \end{frame}}
       
   597 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
   598 
       
   599 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   600 \mode<presentation>{
       
   601 \begin{frame}[c]
       
   602 \frametitle{\begin{tabular}{c}Password Blunders\end{tabular}}
   537 
   603 
   538 % linkedIn password
   604 % linkedIn password
   539 % http://erratasec.blogspot.co.uk/2012/06/confirmed-linkedin-6mil-password-dump.html
   605 % http://erratasec.blogspot.co.uk/2012/06/confirmed-linkedin-6mil-password-dump.html
   540 
   606 
       
   607 \end{frame}}
       
   608 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
   609 
   541 % rainbow tables
   610 % rainbow tables
   542 % http://en.wikipedia.org/wiki/Rainbow_table
   611 % http://en.wikipedia.org/wiki/Rainbow_table
   543 
   612 
   544 % Unix password
   613 
   545 % http://ubuntuforums.org/showthread.php?p=5318038
       
   546 
   614 
   547 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
   615 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
   548 \mode<presentation>{
   616 \mode<presentation>{
   549 \begin{frame}[c]
   617 \begin{frame}[c]
   550 \frametitle{\begin{tabular}{c}Brute Forcing Passwords\end{tabular}}
   618 \frametitle{\begin{tabular}{c}Brute Forcing Passwords\end{tabular}}
   586 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
   654 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
   587 
   655 
   588 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
   656 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
   589 \mode<presentation>{
   657 \mode<presentation>{
   590 \begin{frame}[c]
   658 \begin{frame}[c]
   591 \frametitle{\begin{tabular}{c}Privacy\end{tabular}}
       
   592 
       
   593 
       
   594 \begin{itemize}
       
   595 \item Scott McNealy: \\``You have zero privacy anyway. Get over it.''
       
   596 \end{itemize}
       
   597 
       
   598 \end{frame}}
       
   599 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
   600 
       
   601 
       
   602 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   603 \mode<presentation>{
       
   604 \begin{frame}[c]
       
   605 \frametitle{\begin{tabular}{c}Passwords\end{tabular}}
   659 \frametitle{\begin{tabular}{c}Passwords\end{tabular}}
   606 
   660 
   607 \begin{itemize}
   661 \begin{itemize}
   608 \item How do recover from a break in?
   662 \item How do recover from a breakin?
   609 \end{itemize}
   663 \end{itemize}
   610 
   664 
   611 \end{frame}}
   665 \end{frame}}
   612 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
   666 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
   613 
   667 
       
   668 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   669 \mode<presentation>{
       
   670 \begin{frame}[c]
       
   671 \frametitle{\begin{tabular}{c}This Course\end{tabular}}
       
   672 
       
   673 \begin{itemize}
       
   674 \item breakins (buffer overflows)
       
   675 \item access control (role based, data security / data integrity)
       
   676 \item protocols
       
   677 \item access control logic
       
   678 \item privacy
       
   679 \begin{quote}
       
   680 Scott McNealy: \\``You have zero privacy anyway. Get over it.''
       
   681 \end{quote}
       
   682 \end{itemize}
       
   683 
       
   684 \end{frame}}
       
   685 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
   614 
   686 
   615 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
   687 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
   616 \mode<presentation>{
   688 \mode<presentation>{
   617 \begin{frame}[c]
   689 \begin{frame}[c]
   618 \frametitle{\begin{tabular}{c}Thinking as a Defender\end{tabular}}
   690 \frametitle{\begin{tabular}{c}Thinking as a Defender\end{tabular}}