<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://homeostasis.scs.carleton.ca/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Willforrest</id>
	<title>Soma-notes - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://homeostasis.scs.carleton.ca/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Willforrest"/>
	<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php/Special:Contributions/Willforrest"/>
	<updated>2026-05-02T07:46:01Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.42.1</generator>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=Computer_Systems_Security_(Winter_2016)&amp;diff=20726</id>
		<title>Computer Systems Security (Winter 2016)</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=Computer_Systems_Security_(Winter_2016)&amp;diff=20726"/>
		<updated>2016-02-22T00:35:20Z</updated>

		<summary type="html">&lt;p&gt;Willforrest: /* Lectures and Exams */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Course Outline==&lt;br /&gt;
&lt;br /&gt;
[[Computer Systems Security: Winter 2016 Course Outline|Here]] is the course outline.&lt;br /&gt;
&lt;br /&gt;
==Hacking Opportunities==&lt;br /&gt;
&lt;br /&gt;
The [[SystemsSec 2016W Hacking Opportunities|Hacking Opportunities]] page lists potential hacking opportunities that you can attempt for your hacking journal.  If you attempt but do not successfully accomplish one of them, be sure to document what you tried.  As you learn more, you may come back to them and try again.&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
&lt;br /&gt;
===Readings===&lt;br /&gt;
&lt;br /&gt;
* For the first part of the course we will be reading selections from Trent Jaeger&#039;s [http://www.morganclaypool.com/doi/abs/10.2200/S00126ED1V01Y200808SPT001 Operating Systems Security] textbook.  You can download the PDF [http://www.morganclaypool.com.proxy.library.carleton.ca/doi/abs/10.2200/S00126ED1V01Y200808SPT001 through Carleton&#039;s library].  In the reading assignments this text will be referred to as &amp;quot;Jaeger&amp;quot;.&lt;br /&gt;
* An excellent but dated text on browser security is Michal Zalewski&#039;s [https://code.google.com/p/browsersec/wiki/Main Browser Security Handbook].&lt;br /&gt;
&lt;br /&gt;
===Other Courses===&lt;br /&gt;
&lt;br /&gt;
* Dan Boneh ran an excellent course at Stanford in Spring 2015 on [https://crypto.stanford.edu/cs155/ Computer and Network Security].  This course has many interesting readings that we will not be covering.  Also, the assignments are very good sources for hacking opportunities.&lt;br /&gt;
* The assignments from the Winter 2015 run of COMP 4108 [https://www.ccsl.carleton.ca/~askillen/COMP4108/ are available].  They are a reasonable start for several hacking opportunities.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Lectures and Exams==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table style=&amp;quot;width: 100%;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&lt;br /&gt;
    &amp;lt;th&amp;gt;&lt;br /&gt;
    &amp;lt;p align=&amp;quot;left&amp;quot;&amp;gt;Date&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/th&amp;gt;&lt;br /&gt;
    &amp;lt;th&amp;gt;&lt;br /&gt;
    &amp;lt;p align=&amp;quot;left&amp;quot;&amp;gt;Topic&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/th&amp;gt;&lt;br /&gt;
    &amp;lt;th&amp;gt;&lt;br /&gt;
    &amp;lt;p align=&amp;quot;left&amp;quot;&amp;gt;Readings&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/th&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Jan. 7&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[SystemsSec 2016W Lecture 1|Introduction]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&amp;lt;p&amp;gt;Jaeger, Chapter 1 (Introduction)&amp;lt;/p&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Jan. 12&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[SystemsSec 2016W Lecture 2|Access Control, Security Hacking 101]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;p&amp;gt;Jaeger, Chapter 2 (Access Control Fundamentals)&amp;lt;/p&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Jan. 14&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[SystemsSec 2016W Lecture 3|Multics, UNIX, and Windows]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;p&amp;gt;Jaeger, Chapter 3 (Multics) and Chapter 4 (UNIX &amp;amp; Windows) &amp;lt;/p&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Jan. 19&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[SystemsSec 2016W Lecture 4|Secure OSs, theory and practice]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;p&amp;gt;Jaeger, Chapter 6 (Security Kernels) and Chapter 7 (Securing Commercial Operating Systems)&amp;lt;/p&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Jan. 21&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[SystemsSec 2016W Lecture 5|LSM, SELinux, &amp;amp; Capabilities]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;p&amp;gt;Jaeger, Chapter 9 (LSM &amp;amp; SELinux) and Chapter 10 (Secure Capability Systems)&amp;lt;/p&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Jan. 26&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[SystemsSec 2016W Lecture 6|Secure Virtual Machines, Systems Assurance]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;p&amp;gt;Jaeger, Chapter 11 (Secure Virtual Machine Systems) and Chapter 12 (System Assurance)&amp;lt;/p&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Jan. 28&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[SystemsSec 2016W Lecture 7|Lecture 7]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;p&amp;gt;&amp;lt;/p&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Feb. 2&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[SystemsSec 2016W Lecture 8|Lecture 8]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;p&amp;gt;&amp;lt;/p&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Feb. 4&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[SystemsSec 2016W Lecture 9|Lecture 9]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;p&amp;gt;&amp;lt;/p&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Feb. 9&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[SystemsSec 2016W Lecture 10|Lecture 10]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;p&amp;gt;&amp;lt;/p&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Feb. 11&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[SystemsSec 2016W Lecture 11|Modeling a potential attack/ Midterm FAQ]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;p&amp;gt;&amp;lt;/p&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Feb. 23&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[SystemsSec 2016W Lecture 12|Midterm Review]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;p&amp;gt;&amp;lt;/p&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Feb. 25&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Midterm (in class)&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;p&amp;gt;&amp;lt;/p&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Mar. 1&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[SystemsSec 2016W Lecture 13|Lecture 13]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;p&amp;gt;&amp;lt;/p&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Mar. 3&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[SystemsSec 2016W Lecture 14|Lecture 14]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;p&amp;gt;&amp;lt;/p&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Mar. 8&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[SystemsSec 2016W Lecture 15|Lecture 15]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;p&amp;gt;&amp;lt;/p&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Mar. 10&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[SystemsSec 2016W Lecture 16|Lecture 16]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;p&amp;gt;&amp;lt;/p&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Mar. 15&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[SystemsSec 2016W Lecture 17|Lecture 17]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;p&amp;gt;&amp;lt;/p&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Mar. 17&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[SystemsSec 2016W Lecture 18|Lecture 18]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;p&amp;gt;&amp;lt;/p&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Mar. 22&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[SystemsSec 2016W Lecture 19|Lecture 19]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;p&amp;gt;&amp;lt;/p&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Mar. 24&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[SystemsSec 2016W Lecture 20|Lecture 20]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;p&amp;gt;&amp;lt;/p&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Mar. 29&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[SystemsSec 2016W Lecture 21|Lecture 21]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;p&amp;gt;&amp;lt;/p&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Mar. 31&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[SystemsSec 2016W Lecture 22|Lecture 22]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;p&amp;gt;&amp;lt;/p&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Apr. 5&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[SystemsSec 2016W Lecture 23|Lecture 23]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;p&amp;gt;&amp;lt;/p&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;April 7&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[SystemsSec 2016W Lecture 24|Lecture 24]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;p&amp;gt;&amp;lt;/p&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;April 19, 9 AM&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Final Exam&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;p&amp;gt;&amp;lt;/p&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&amp;lt;table style=&amp;quot;width: 100%;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&lt;br /&gt;
    &amp;lt;th&amp;gt;&lt;br /&gt;
    &amp;lt;p align=&amp;quot;left&amp;quot;&amp;gt;Due Date&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/th&amp;gt;&lt;br /&gt;
    &amp;lt;th&amp;gt;&lt;br /&gt;
    &amp;lt;p align=&amp;quot;left&amp;quot;&amp;gt;Assignments&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/th&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Jan. 30&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[SystemsSec 2016W: Assignment 1|Assignment 1]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Feb. 22&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[SystemsSec 2016W: Assignment 2|Assignment 2]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Mar. 19&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[SystemsSec 2016W: Assignment 3|Assignment 3]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;April 4&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[SystemsSec 2016W: Assignment 4|Assignment 4]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Lecture Notes Guidelines==&lt;br /&gt;
&lt;br /&gt;
Part of your participation mark is doing notes for at least one of the lectures.  Here are the guidelines for those notes.&lt;br /&gt;
&lt;br /&gt;
The class TA Borke (BorkeObadaObieh at cmail.carleton.ca) will be handling course notes.  Please contact her to schedule your class to take notes.&lt;br /&gt;
&lt;br /&gt;
Borke or Anil will set you up with an account on this wiki.  You&#039;ll enter your initial draft notes here and then work with Borke to make sure they are of sufficient quality.  This may require a few rounds of revisions; however, if you follow the guidelines below it shouldn&#039;t be too bad.&lt;br /&gt;
&lt;br /&gt;
You should plan on organizing your notes as follows:&lt;br /&gt;
* Organize them in at least the following sections: Topics &amp;amp; Readings and Notes.&lt;br /&gt;
* The Topics &amp;amp; Readings section lists the main topics covered in the class, e.g. &amp;quot;buffer overflows&amp;quot;.  Please use an unordered bulleted list (using *&#039;s in wiki markup).  In this section also list readings relevant to the lecture that were mentioned in class.&lt;br /&gt;
* Put your notes in the Notes section.&lt;br /&gt;
&lt;br /&gt;
Use (nested) lists if appropriate for the notes; however, please have some text that isn&#039;t bulleted.  Please try to make the notes even if you did not attend lecture; however, you don&#039;t need to cover every small bit of information that was covered.  In particular the notes do not need to include digressions into topics only tangentially related to the course.  Complete sentences are welcome but not required.&lt;/div&gt;</summary>
		<author><name>Willforrest</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_11&amp;diff=20725</id>
		<title>SystemsSec 2016W Lecture 11</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_11&amp;diff=20725"/>
		<updated>2016-02-22T00:27:37Z</updated>

		<summary type="html">&lt;p&gt;Willforrest: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Sample Midterm Questions==&lt;br /&gt;
&lt;br /&gt;
* What properties should a secure OS have?  Why?&lt;br /&gt;
* Why are production operating systems not constructed like ones designed for security first?  Be specific&lt;br /&gt;
* To what extent are security tools (for attack and defense) hard to use?  Are these difficulties inherent to the technology or are other factors in play?  Give examples from your personal experience.&lt;br /&gt;
* Describe three threat models and explain what entities these threat models apply to.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Midterm Layout==&lt;br /&gt;
&lt;br /&gt;
*Expect each question to be a small essay, that draws upon the information acquired through class, and through the readings to form a conclusion.&lt;br /&gt;
*Expect 3-5 questions on the midterm.&lt;br /&gt;
*This exam will be closed book. Email Anil if writing this midterm via computer is important to you.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Model of a standard attack==&lt;br /&gt;
&lt;br /&gt;
    Let us look at a standard attack. An attacker will do the following:&lt;br /&gt;
*Identify a target:    An attacker will select a system or individual to attack&lt;br /&gt;
*Surveillance:    An attacker will study the target. &lt;br /&gt;
*Get access (&amp;quot;The Attack&amp;quot;):    An attacker at some point will access or breach the system.&lt;br /&gt;
*Accomplish his goal:    An attacker will gather what he came for (credit cards, passwords, bank transfer etc)&lt;br /&gt;
*Cover his tracks:    An attacker will not want to be identified. They will try to destroy system logs, and any evidence that could point to the attack ever happening. In this sense, the news only reports failed attacks, as the intrusion was detected.&lt;br /&gt;
&lt;br /&gt;
==Example attack Surveillance==&lt;br /&gt;
&lt;br /&gt;
Let&#039;s say we are attacking an Ubuntu machine.&lt;br /&gt;
&lt;br /&gt;
How do we monitor what&#039;s happening?&lt;br /&gt;
&lt;br /&gt;
*IP addresses, Port checking, etc.: These are very noisy approaches, and will alert a system. An attacker will not do this more then absolutely necessary&lt;br /&gt;
&lt;br /&gt;
*Monitoring the network: Is it possible to monitor this network from another machine?, An attacker may need to compromise another machine first!&lt;br /&gt;
**This can be done by Wireshark&lt;br /&gt;
&lt;br /&gt;
*Physical Surveillance: &lt;br /&gt;
**Personnel, Administrators: Do they have social media that can be accessed, and guess the password from info? **Set up account on another site: Can they convince an employee to make an account, they may use same password. &lt;br /&gt;
**Forums: Have they posted about bugs or net problems? &lt;br /&gt;
**Wireless network: can they eavesdrop on a signal?&lt;br /&gt;
&lt;br /&gt;
What we really want to know in Surveillance step: What code is running on the server.&lt;br /&gt;
&lt;br /&gt;
==Example attack==&lt;br /&gt;
&lt;br /&gt;
There&#039;s a tool called &#039;&#039;&#039;nmap&#039;&#039;&#039; which can figure out what operating system you&#039;re running. Let&#039;s say it is running WordPress (wahoo, it has known vulnerabilities), and we know the exact version. There are packaged tools like &#039;&#039;&#039;metaexploit&#039;&#039;&#039; which easily help you make the attack.&lt;br /&gt;
&lt;br /&gt;
The next step? Set up the same WordPress version, and test the exploit on our own systems. We don&#039;t want to be caught on a failed attempt. We can engineer the exploit to do it&#039;s intended goal, and test it&#039;s success, without fear of detection.&lt;br /&gt;
&lt;br /&gt;
If we are not detected, this brings us to another type of attack:&lt;br /&gt;
&lt;br /&gt;
*Advanced Persistent Threats: Breaking in, and modifying the system to infiltrate as needed.&lt;br /&gt;
&lt;br /&gt;
As we can see it takes a fair bit of work to infiltrate a target. So why do we protection? The end result is if someone doesn&#039;t want to be caught, they need another machine. Or many.&lt;br /&gt;
&lt;br /&gt;
*The most common threat scenario:&lt;br /&gt;
&lt;br /&gt;
**Being attacked, but you are not the target!&lt;br /&gt;
**Targets become very broad: Anyone with windows, anyone with an RBC account etc.&lt;br /&gt;
**Surveillance becomes less needed if you infect a trusted system.&lt;br /&gt;
&lt;br /&gt;
Recently, some attackers stop at surveillance. They develop the exploits and keep them; in order to sell the vulnerability (not the exploit) or blackmail. Governments now keep exploit stacks.&lt;br /&gt;
&lt;br /&gt;
==Countermeasures==&lt;br /&gt;
&lt;br /&gt;
*We can&#039;t stop surveillence, but we can mitigate it. This is the purpose of firewalls, they reduce infomation that can be obtained from the outside.&lt;br /&gt;
&lt;br /&gt;
*Having a custom OS would be very ideal, an attacker can&#039;t practice against a copy of your system. Live and noisy attacks become the only method of attacker. And the system targeted can attempt up it&#039;s security in response, or move data.&lt;br /&gt;
&lt;br /&gt;
*Under ideal conditions, the reference monitor of a system cannot be broken into. An attacker has to deal with the reference monitor&#039;s restrictions. They have to attack people and use the methods they would use to edit data. As a result, every user is a possible attacker. The access of every user, including root, must be limited. &lt;br /&gt;
&lt;br /&gt;
*Preventing an attacker from achieving their goals and covering their tracks are the most reliant countermeasures.&lt;br /&gt;
**Logs that can&#039;t be tampered with by being placed on another system, or uneditable.&lt;br /&gt;
**Information being withheld to even users&lt;br /&gt;
&lt;br /&gt;
*One problem. We can&#039;t make a perfect reference monitor.&lt;br /&gt;
**The rest of the semester, we&#039;ll talk about the failure of reference monitor.&lt;br /&gt;
&lt;br /&gt;
==Tools==&lt;br /&gt;
&lt;br /&gt;
*NMAP: A tool designed to identify system and their versions, by analyzing the responses. Each system implements networks slightly differently, and this tool has a small database to compare to.&lt;/div&gt;</summary>
		<author><name>Willforrest</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_11&amp;diff=20709</id>
		<title>SystemsSec 2016W Lecture 11</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_11&amp;diff=20709"/>
		<updated>2016-02-12T19:03:32Z</updated>

		<summary type="html">&lt;p&gt;Willforrest: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Sample Midterm Questions==&lt;br /&gt;
&lt;br /&gt;
* What properties should a secure OS have?  Why?&lt;br /&gt;
* Why are production operating systems not constructed like ones designed for security first?  Be specific&lt;br /&gt;
* To what extent are security tools (for attack and defense) hard to use?  Are these difficulties inherent to the technology or are other factors in play?  Give examples from your personal experience.&lt;br /&gt;
* Describe three threat models and explain what entities these threat models apply to.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Midterm Layout==&lt;br /&gt;
&lt;br /&gt;
*Expect each question to be a small essay, that draws upon the information acquired through class, and through the readings to form a conclusion.&lt;br /&gt;
*Expect 3-5 questions on the midterm.&lt;br /&gt;
*This exam will be closed book. Email Anil if writing this midterm via computer is important to you.&lt;br /&gt;
&lt;br /&gt;
==Under construction==&lt;br /&gt;
&lt;br /&gt;
==Model of a standard attack==&lt;br /&gt;
&lt;br /&gt;
    Let us look at a standard attack. An attacker will do the following:&lt;br /&gt;
*Identify a target:    An attacker will select a system or individual to attack&lt;br /&gt;
*Surveillence:    An attacker will study the target. &lt;br /&gt;
*Get access (&amp;quot;The Attack&amp;quot;):    An attacker at some point will access or breach the system.&lt;br /&gt;
*Accomplish his goal:    An attacker will gather what he came for (credit cards, passwords, bank transfer etc)&lt;br /&gt;
*Cover his tracks:    An attacker will not want to be identified. They will try to destroy system logs, and any evidence that could point to the attack ever happening. In this sense, the news only reports failed attacks, as the intrusion was detected.&lt;br /&gt;
&lt;br /&gt;
==Example attack Surveillence==&lt;br /&gt;
&lt;br /&gt;
Let&#039;s say we are attacking an Ubuntu machine.&lt;br /&gt;
&lt;br /&gt;
What can we gather intelligence wise?&lt;br /&gt;
&lt;br /&gt;
*Ip addresses, Port checking, etc.: These are very noisy approaches, and will alert a system. an attacker will not do this more then absolutely neccessary&lt;br /&gt;
&lt;br /&gt;
*Webserver status:  &lt;br /&gt;
**What code is running on the server? &lt;br /&gt;
**What version? &lt;br /&gt;
**Webserver will usually hand this out&lt;br /&gt;
&lt;br /&gt;
*monitoring the network: Is it possible to monitor this network from another machine?, An attacker may need to compromise another machine first!&lt;br /&gt;
&lt;br /&gt;
*Physical Surveillence: &lt;br /&gt;
**Personel, Administrators: Do they have social media that can be accessed, and guess the password from info? **Set up account on another site: Can they convince an employee to make an account, they may use same password. &lt;br /&gt;
**Forums: Have they posted about bugs or net problems? &lt;br /&gt;
**Wireless network: can they eavesdrop on a signal?&lt;br /&gt;
&lt;br /&gt;
==Example attack==&lt;br /&gt;
&lt;br /&gt;
Let&#039;s say we know someone is running wordpress (wahoo, many exploits), and we know the exact version. We can get an exploit to use online.&lt;br /&gt;
&lt;br /&gt;
The next step? Set up the same wordpress version, and test the exploit on our own systems. We don&#039;t want to be caught on a failed attempt. We can engineer the exploit to do it&#039;s intended goal, and test it&#039;s success, without fear of detection.&lt;br /&gt;
&lt;br /&gt;
If we are not detected, this brings us to another type of attack:&lt;br /&gt;
&lt;br /&gt;
*Advanced Persistent threats: Breaking in, and modifying the system to infiltrate as needed.&lt;br /&gt;
&lt;br /&gt;
As we can see it takes a fair bit of work to infiltrate a target. So why do we protection? The end result is if someone doesn&#039;t want to be caught, they need another machine. Or manay.&lt;br /&gt;
&lt;br /&gt;
*The most common threat scenario:&lt;br /&gt;
&lt;br /&gt;
**Being attacked, but you are not the target!&lt;br /&gt;
**Targets become very broad: Anyone with windows, anyone with an RBC account etc.&lt;br /&gt;
**Surveillence becomes less needed if you infect a trusted system.&lt;br /&gt;
&lt;br /&gt;
==Countermeasures==&lt;br /&gt;
&lt;br /&gt;
*We can&#039;t stop surveillence, but we can mitigate it. This is the purpose of firewalls, they reduce infomation that can be obtained from the outside.&lt;br /&gt;
&lt;br /&gt;
*Having a custom OS would be very ideal, an attacker can&#039;t practice against a copy of your system. Live and noisy attacks become the only method of attacker. And the system targeted can attempt up it&#039;s security in response, or move data.&lt;br /&gt;
&lt;br /&gt;
*Under ideal conditions, the reference monitor of a system cannot be broken into. An attacker has to deal with the reference monitor&#039;s restrictions. They have to attack people and use the methods they would use to edit data. As a result, every user is a possible attacker. The access of every user, including root, must be limited. &lt;br /&gt;
&lt;br /&gt;
*Preventing an attacker from achieving their goals and covering their tracks are the most reliant countermeasures.&lt;br /&gt;
**Logs that can&#039;t be tampered with by being placed on another system, or uneditable.&lt;br /&gt;
**Information being withheld to even users&lt;br /&gt;
&lt;br /&gt;
*One problem. We can&#039;t make a perfect reference monitor.&lt;br /&gt;
&lt;br /&gt;
==Tools==&lt;br /&gt;
&lt;br /&gt;
*NMAP: A tool designed to identify system and their versions, by analyzing the responses. Each system implements networks slightly differently, and this tool has a small database to compare to.&lt;/div&gt;</summary>
		<author><name>Willforrest</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_11&amp;diff=20708</id>
		<title>SystemsSec 2016W Lecture 11</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_11&amp;diff=20708"/>
		<updated>2016-02-12T18:52:40Z</updated>

		<summary type="html">&lt;p&gt;Willforrest: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Sample Midterm Questions==&lt;br /&gt;
&lt;br /&gt;
* What properties should a secure OS have?  Why?&lt;br /&gt;
* Why are production operating systems not constructed like ones designed for security first?  Be specific&lt;br /&gt;
* To what extent are security tools (for attack and defense) hard to use?  Are these difficulties inherent to the technology or are other factors in play?  Give examples from your personal experience.&lt;br /&gt;
* Describe three threat models and explain what entities these threat models apply to.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Midterm Layout==&lt;br /&gt;
&lt;br /&gt;
*Expect each question to be a small essay, that draws upon the information acquired through class, and through the readings to form a conclusion.&lt;br /&gt;
*Expect 3-5 questions on the midterm.&lt;br /&gt;
*This exam will be closed book. Email Anil if writing this midterm via computer is important to you.&lt;br /&gt;
&lt;br /&gt;
==Under construction==&lt;br /&gt;
&lt;br /&gt;
==Model of a standard attack==&lt;br /&gt;
&lt;br /&gt;
    Let us look at a standard attack. An attacker will do the following:&lt;br /&gt;
*Identify a target:    An attacker will select a system or individual to attack&lt;br /&gt;
*Surveillence:    An attacker will study the target. &lt;br /&gt;
*Get access (&amp;quot;The Attack&amp;quot;):    An attacker at some point will access or breach the system.&lt;br /&gt;
*Accomplish his goal:    An attacker will gather what he came for (credit cards, passwords, bank transfer etc)&lt;br /&gt;
*Cover his tracks:    An attacker will not want to be identified. They will try to destroy system logs, and any evidence that could point to the attack ever happening. In this sense, the news only reports failed attacks, as the intrusion was detected.&lt;br /&gt;
&lt;br /&gt;
==Example attack Surveillence==&lt;br /&gt;
&lt;br /&gt;
Let&#039;s say we are attacking an Ubuntu machine.&lt;br /&gt;
&lt;br /&gt;
What can we gather intelligence wise?&lt;br /&gt;
&lt;br /&gt;
*Ip addresses, Port checking, etc.: These are very noisy approaches, and will alert a system. an attacker will not do this more then absolutely neccessary&lt;br /&gt;
&lt;br /&gt;
*Webserver status:  &lt;br /&gt;
**What code is running on the server? &lt;br /&gt;
**What version? &lt;br /&gt;
**Webserver will usually hand this out&lt;br /&gt;
&lt;br /&gt;
*monitoring the network: Is it possible to monitor this network from another machine?, An attacker may need to compromise another machine first!&lt;br /&gt;
&lt;br /&gt;
*Physical Surveillence: &lt;br /&gt;
**Personel, Administrators: Do they have social media that can be accessed, and guess the password from info? **Set up account on another site: Can they convince an employee to make an account, they may use same password. &lt;br /&gt;
**Forums: Have they posted about bugs or net problems? &lt;br /&gt;
**Wireless network: can they eavesdrop on a signal?&lt;br /&gt;
&lt;br /&gt;
==Example attack==&lt;br /&gt;
&lt;br /&gt;
Let&#039;s say we know someone is running wordpress (wahoo, many exploits), and we know the exact version. We can get an exploit to use online.&lt;br /&gt;
&lt;br /&gt;
The next step? Set up the same wordpress version, and test the exploit on our own systems. We don&#039;t want to be caught on a failed attempt.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Tools==&lt;br /&gt;
&lt;br /&gt;
*NMAP: A tool designed to identify system and their versions, by analyzing the responses. Each system implements networks slightly differently, and this tool has a small database to compare to.&lt;/div&gt;</summary>
		<author><name>Willforrest</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_11&amp;diff=20702</id>
		<title>SystemsSec 2016W Lecture 11</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_11&amp;diff=20702"/>
		<updated>2016-02-11T15:28:39Z</updated>

		<summary type="html">&lt;p&gt;Willforrest: /* Sample Midterm Questions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Sample Midterm Questions==&lt;br /&gt;
&lt;br /&gt;
* What properties should a secure OS have?  Why?&lt;br /&gt;
* Why are production operating systems not constructed like ones designed for security first?  Be specific&lt;br /&gt;
* To what extent are security tools (for attack and defense) hard to use?  Are these difficulties inherent to the technology or are other factors in play?  Give examples from your personal experience.&lt;br /&gt;
* Describe three threat models and explain what entities these threat models apply to.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Midterm Layout==&lt;br /&gt;
&lt;br /&gt;
*Expect each question to be a small essay, that draws upon the information acquired through class, and through the readings to form a conclusion.&lt;br /&gt;
*Expect 3-5 questions on the midterm.&lt;br /&gt;
*This exam will be closed book. Email Anil if writing this midterm via computer is important to you.&lt;/div&gt;</summary>
		<author><name>Willforrest</name></author>
	</entry>
</feed>