SlideShare a Scribd company logo
Cyber security: Technology, Application and Policy| Modules, Topics, and Faculty
MODULE ONE: Introduction
The introductory module aims to give a broad survey of the course and of
cybersecurity challenges and opportunities.
Introduction: Cybersecurity (Howard Shrobe)
 Learning from the past: Multics
 Examples of what can go wrong
 Capability architectures
 Tagged architectures, including Memory safety, Type safety, Information flow, and
“Zero Kernel”
Security Overview (Srini Devedas)
 Why security is a hard goal to achieve
 Broad strategies that one can employ to create secure systems
MODULE TWO: Systems Security
The systems security module surveys the system development side of cybersecurity.
Hardware Architectures for Security (Howard Shrobe)
 How novel hardware architectures can help to enforce the security properties that
Operating Systems and Programming Languages expect, including memory safety,
type safety, information flow, and access control
 How to enforce properties in hardware can be much more systematic and
dramatically more efficient than enforcement by software alone
Operating Systems Security (Frans Kaashoek)
 Taking a global, systems-wide view of security. Viewing security as a "negative goal,"
considering all possible paths to security breaches- permissions, access, trojans,
bugs, and many others
 Discussion of various design approaches to securing systems, including complete
mediation, separation privilege, and minimizing the trusted computer base
Verifying Systems (Adam Chlipala)
 How to formulate requirements on secure behavior of C-like programs as rigorous
logical formulas
 How to argue that programs meet such requirements
Secure Programming Languages (Armando Solar Lezama)
 Languages and low-level security properties
 Languages and high-level security properties
 Type safety
MODULE THREE: Cryptography and Network
This module is on algorithms for secure computation and security challenges in
network and protocol design.
Public Key Cryptography (Ron Rivest)
 A quick overview of basic public-key cryptography, including the RSA and El-Gamal
public-key cryptosystems, relevant number theory, security definitions, and
complexity assumptions
 A brief intro to more advanced notions, such as digital signatures, certificates,
homomorphic encryption, and elliptic curves
Multi-party Computation, Secret Sharing, Distributed Trust (Shafi Goldwasser)
 A cryptographic paradigm shift: from communication of private data to computation
over private data
 How to define secure multiparty computation and its applications
 How to achieve multi-party secure computation through polynomial secret sharing
and computation on shares
 Using the principles of multiparty computation to distribute trust and power
Homomorphic and functional encryption (Vinod Vaikuntanathan)
 Solving the all or nothing paradigm of encryption - how do we keep data secure,
while allowing computations on underlying data: how to “have your cake and eat it
too”
 Discussion on the developments in homomorphic encryption from the ‘80s through
today, and constructing partially and fully homomorphic crypto-systems
 How functional encryption systems can grant third-party access to only the precise
information it needs to perform a task
Network Security and Protocol Design (Dave Clark)
 What the different aspects of network security are and what mechanisms are used to
address them
 Why the current state of network security is so poor
MODULE FOUR: Case Studies
This systems module discusses solutions to security in several domains.
Bitlocker (Nickolai Zeldovich)
 Discussion of the challenges of building a disk encryption system using passwords,
removable devices and trusted hardware methods
 Overview of the Trusted platform method and case study of how BitLocker uses this
method
 How BitLocker actually encrypts data using the ‘poor man’s authentication’ method
Resilient Software (Martin Rinard)
 An explanation of how errors can cause serious security vulnerabilities using
examples of buffer and integer overflow errors
 Overview of methods to automatically find and patch these errors, including
transferring correct code from one application to another, and generating patches to
identify errors and produce the correct output
 Discussion of how automating these difficult and expensive manual tasks can
produce software that is more reliable and secure, with enhanced functionality
Web security (Daniel Jackson)
 What makes web applications especially vulnerable to attack
 How attacks against web applications work: two broad classes
 How to defend against attacks, at the design and implementation levels
Mobile Phone Security (Nickolai Zeldovich)
 Discussion of the unique characteristics of a mobile phone that necessitate different
applications from existing desktop or web applications
 Case study of how computer system security works in mobile phones, using the
Android's application model, and mechanisms used by Android to secure data while
allowing applications to share information
 A look back on Android’s development: What worked? What didn’t work? What
changes have been made to overcome challenges?
MODULE FIVE: Policy
This systems module discusses policy aspects of cybersecurity.
The Landscape of Cyber Policy (Danny Weitzner)
 Inquiring into the role public policy plays in sustaining and securing the Internet
 Reviewing six key policy goals embodied in today’s digital communications
environment, how they arose, and what keeps them on track
 Exploring the way progress requires policymakers to understand the background
against which new rules are made

More Related Content

PPT
Privacy Techniques in Fourth Generation Heterogeneous Networks
PDF
Network security chapter 1
PPTX
Research proposal on Computing Security and Reliability - Phdassistance.com
PDF
Network security
PDF
International Conference on Cryptography and Blockchain (CRBL 2021)
PDF
Iaetsd a novel approach to provide the security for distributed adaptive netw...
PDF
International Conference on Cryptography and Blockchain (CRBL 2021)
Privacy Techniques in Fourth Generation Heterogeneous Networks
Network security chapter 1
Research proposal on Computing Security and Reliability - Phdassistance.com
Network security
International Conference on Cryptography and Blockchain (CRBL 2021)
Iaetsd a novel approach to provide the security for distributed adaptive netw...
International Conference on Cryptography and Blockchain (CRBL 2021)

What's hot (20)

DOCX
International Journal on Cryptography and Information Security (IJCIS)
DOCX
Report on Network Security And Privacy
DOCX
Call for Papers - 6th International Conference on Cryptography and Informatio...
PDF
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
PDF
International Conference on Cryptography and Blockchain (CRBL 2021)
PDF
International Conference on Cryptography and Blockchain (CRBL 2021)
DOCX
International Journal of Wireless Networks Systems (IJWNS)
PDF
6th International Conference on Cryptography and Information Security (CRIS 2...
DOCX
International Journal of Wireless Networks Systems (IJWNS)
DOCX
Ijwns
DOCX
International Journal of Wireless Networks Systems (IJWNS)
DOCX
International Journal of Network Security & Its Applications (IJNSA)
DOCX
International Journal of Network Security & Its Applications (IJNSA)
PDF
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION
DOCX
International Journal of Network Security & Its Applications (IJNSA)
DOCX
International Journal of Wireless Networks Systems (IJWNS)
PDF
6th International Conference on Cryptography and Information Security (CRIS 2...
PDF
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
PPT
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
DOCX
International Journal of Network Security & Its Applications (IJNSA)
International Journal on Cryptography and Information Security (IJCIS)
Report on Network Security And Privacy
Call for Papers - 6th International Conference on Cryptography and Informatio...
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)
International Journal of Wireless Networks Systems (IJWNS)
6th International Conference on Cryptography and Information Security (CRIS 2...
International Journal of Wireless Networks Systems (IJWNS)
Ijwns
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Wireless Networks Systems (IJWNS)
6th International Conference on Cryptography and Information Security (CRIS 2...
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
International Journal of Network Security & Its Applications (IJNSA)
Ad

Viewers also liked (14)

PPTX
Leadership lessons from geese assembly
PPTX
Cooperative values tutor activities
PPTX
Happy 60th birthday john mazwell
PDF
myrole at ibnk
PDF
Perrini Gabriella e Zanframundo Gregorio
PPTX
EVALUATION QUESTION TWO
PDF
ASCL_Syllabus_Project Report Details
PPT
Nicola andreace (il da vinci di massafra) lamanna angelo & miraglia francesco)
PPTX
Nicola andreace (la storia) caramia domenico , sisto giuseppe & greco tiziana
PPTX
Nicola Andreace artista di fama internazionale
DOCX
Cirneco Marica nicola andreace un artista e le sue maschere
PPTX
Can you push a straw through a potato?
DOCX
Subrata_resume update
PPTX
Happy 60th birthday john mazwell
Leadership lessons from geese assembly
Cooperative values tutor activities
Happy 60th birthday john mazwell
myrole at ibnk
Perrini Gabriella e Zanframundo Gregorio
EVALUATION QUESTION TWO
ASCL_Syllabus_Project Report Details
Nicola andreace (il da vinci di massafra) lamanna angelo & miraglia francesco)
Nicola andreace (la storia) caramia domenico , sisto giuseppe & greco tiziana
Nicola Andreace artista di fama internazionale
Cirneco Marica nicola andreace un artista e le sue maschere
Can you push a straw through a potato?
Subrata_resume update
Happy 60th birthday john mazwell
Ad

Similar to MITx_Cyber security_Syllabus (20)

PDF
cryptograph and computer security lecture 1.pdf
PPTX
Lecture 1
PPTX
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
PPT
software-security-intro-220901084730-8ed673b9.ppt
PPT
software-security.ppt
PDF
TUD CS4105 | 2015 | Lecture 1
PDF
Ch14 security
PDF
1_Introduction.pdf
PDF
COMP 424 Computer System Security Fall 2016
PPT
PBL PROJECT - B2- (54,56,50,40) (2) (1).ppt
PDF
QUESTION BANK CYBER OPEN ELECTIVE.pdfjjj
PPT
hel1.ppt
PPT
Introduction to Computer Security.ppt
PPT
PPT
Computer security power point prsentation.ppt
PPT
PPT
PPT
hel1.ppt
PPT
hel1.ppt
cryptograph and computer security lecture 1.pdf
Lecture 1
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
software-security-intro-220901084730-8ed673b9.ppt
software-security.ppt
TUD CS4105 | 2015 | Lecture 1
Ch14 security
1_Introduction.pdf
COMP 424 Computer System Security Fall 2016
PBL PROJECT - B2- (54,56,50,40) (2) (1).ppt
QUESTION BANK CYBER OPEN ELECTIVE.pdfjjj
hel1.ppt
Introduction to Computer Security.ppt
Computer security power point prsentation.ppt
hel1.ppt
hel1.ppt

More from Prakash Prasad ✔ (20)

PDF
Term End Results-MPA-II - June 2016
PDF
Coursera understandingterror 2016
PDF
IIMBx FC201
PDF
PDF
IIMBx OM101
PDF
IIMBx AC101
PDF
Coursera CNNQD3CGPQM-DMX
PDF
Coursera KT3KEDR8LS3D_DM
PDF
Certificate-IITBx_I
PDF
Coursera coaching 2015
PDF
Coursera XL8R7FKRPN8B
PDF
IIMBx QM101-Stat-II
PDF
IIMBx ES101x Certificate _Managerial Effectiveness edX
PDF
Coursera cryptography 2015
PDF
Coursera F5UV9L2NDBWY
PDF
Coursera 4GQ3DJZK3W9E
PDF
Coursera whartonmarketing 2015
PDF
PDF
Coursera LJYQQ5HEREGG-Strategic Management-CBS
PDF
Coursera whartonaccounting 2015
Term End Results-MPA-II - June 2016
Coursera understandingterror 2016
IIMBx FC201
IIMBx OM101
IIMBx AC101
Coursera CNNQD3CGPQM-DMX
Coursera KT3KEDR8LS3D_DM
Certificate-IITBx_I
Coursera coaching 2015
Coursera XL8R7FKRPN8B
IIMBx QM101-Stat-II
IIMBx ES101x Certificate _Managerial Effectiveness edX
Coursera cryptography 2015
Coursera F5UV9L2NDBWY
Coursera 4GQ3DJZK3W9E
Coursera whartonmarketing 2015
Coursera LJYQQ5HEREGG-Strategic Management-CBS
Coursera whartonaccounting 2015

MITx_Cyber security_Syllabus

  • 1. Cyber security: Technology, Application and Policy| Modules, Topics, and Faculty MODULE ONE: Introduction The introductory module aims to give a broad survey of the course and of cybersecurity challenges and opportunities. Introduction: Cybersecurity (Howard Shrobe)  Learning from the past: Multics  Examples of what can go wrong  Capability architectures  Tagged architectures, including Memory safety, Type safety, Information flow, and “Zero Kernel” Security Overview (Srini Devedas)  Why security is a hard goal to achieve  Broad strategies that one can employ to create secure systems MODULE TWO: Systems Security The systems security module surveys the system development side of cybersecurity. Hardware Architectures for Security (Howard Shrobe)  How novel hardware architectures can help to enforce the security properties that Operating Systems and Programming Languages expect, including memory safety, type safety, information flow, and access control  How to enforce properties in hardware can be much more systematic and dramatically more efficient than enforcement by software alone
  • 2. Operating Systems Security (Frans Kaashoek)  Taking a global, systems-wide view of security. Viewing security as a "negative goal," considering all possible paths to security breaches- permissions, access, trojans, bugs, and many others  Discussion of various design approaches to securing systems, including complete mediation, separation privilege, and minimizing the trusted computer base Verifying Systems (Adam Chlipala)  How to formulate requirements on secure behavior of C-like programs as rigorous logical formulas  How to argue that programs meet such requirements Secure Programming Languages (Armando Solar Lezama)  Languages and low-level security properties  Languages and high-level security properties  Type safety MODULE THREE: Cryptography and Network This module is on algorithms for secure computation and security challenges in network and protocol design. Public Key Cryptography (Ron Rivest)  A quick overview of basic public-key cryptography, including the RSA and El-Gamal public-key cryptosystems, relevant number theory, security definitions, and complexity assumptions  A brief intro to more advanced notions, such as digital signatures, certificates, homomorphic encryption, and elliptic curves Multi-party Computation, Secret Sharing, Distributed Trust (Shafi Goldwasser)  A cryptographic paradigm shift: from communication of private data to computation over private data
  • 3.  How to define secure multiparty computation and its applications  How to achieve multi-party secure computation through polynomial secret sharing and computation on shares  Using the principles of multiparty computation to distribute trust and power Homomorphic and functional encryption (Vinod Vaikuntanathan)  Solving the all or nothing paradigm of encryption - how do we keep data secure, while allowing computations on underlying data: how to “have your cake and eat it too”  Discussion on the developments in homomorphic encryption from the ‘80s through today, and constructing partially and fully homomorphic crypto-systems  How functional encryption systems can grant third-party access to only the precise information it needs to perform a task Network Security and Protocol Design (Dave Clark)  What the different aspects of network security are and what mechanisms are used to address them  Why the current state of network security is so poor MODULE FOUR: Case Studies This systems module discusses solutions to security in several domains. Bitlocker (Nickolai Zeldovich)  Discussion of the challenges of building a disk encryption system using passwords, removable devices and trusted hardware methods  Overview of the Trusted platform method and case study of how BitLocker uses this method  How BitLocker actually encrypts data using the ‘poor man’s authentication’ method Resilient Software (Martin Rinard)  An explanation of how errors can cause serious security vulnerabilities using examples of buffer and integer overflow errors  Overview of methods to automatically find and patch these errors, including transferring correct code from one application to another, and generating patches to identify errors and produce the correct output
  • 4.  Discussion of how automating these difficult and expensive manual tasks can produce software that is more reliable and secure, with enhanced functionality Web security (Daniel Jackson)  What makes web applications especially vulnerable to attack  How attacks against web applications work: two broad classes  How to defend against attacks, at the design and implementation levels Mobile Phone Security (Nickolai Zeldovich)  Discussion of the unique characteristics of a mobile phone that necessitate different applications from existing desktop or web applications  Case study of how computer system security works in mobile phones, using the Android's application model, and mechanisms used by Android to secure data while allowing applications to share information  A look back on Android’s development: What worked? What didn’t work? What changes have been made to overcome challenges? MODULE FIVE: Policy This systems module discusses policy aspects of cybersecurity. The Landscape of Cyber Policy (Danny Weitzner)  Inquiring into the role public policy plays in sustaining and securing the Internet  Reviewing six key policy goals embodied in today’s digital communications environment, how they arose, and what keeps them on track  Exploring the way progress requires policymakers to understand the background against which new rules are made