Course
Abstract:
Growing societal dependence on
large-scale, highly-distributed, network systems amplifies the consequences of
intrusion and compromise. Such
systems face security threats that continue to grow in sophistication and scope.
System architectures must incorporate security capabilities to deal with
these threats. These capabilities include techniques such as boundary
control, security protocols, encryption, authentication, intrusion detection,
multi-level security, and network partitioning.
This course covers
architecture fundamentals, security and survivability methods, and development
of secure and survivable systems. Architecture
analysis and trade-offs can assess the relative merits of security strategies
for particular environments of system use.
In addition, systems must be analyzed and designed for survivability of
critical mission functions. The
Survivable Network Analysis method is used to evaluate and improve
survivability. Development of
secure and survivable architectures requires effective management and
engineering methods to ensure reliable implementation of security strategies. Course topics include fundamentals of system architecture
representation, definition, and analysis, system survivability analysis,
security threats and architecture strategies, and security architecture
implementation and lifecycle management. A
team project that requires analysis of a system for survivability comprises a
substantial portion of the course. This
course provides you with analytical methods to assess and improve system
security and survivability.
Architecture
Fundamentals |
Linger |
System Architectures |
Course introduction Concepts of system architectures HW: Bass Ch 1,2, 5; Anderson Ch 1; handouts |
Linger |
Architecture Reasoning |
Reasoning about
system architectures Component and network behavior
|
|
Linger
|
Architecture Development |
Architecture life cycle, processes, and work products Student presentation: “Blueprint for Solving
Problems in Your IT Architecture” HW: Rechtin Ch 1, 2; handouts
|
|
Linger |
Architecture Analysis |
Architecture trade-off analysis Student presentation: “E-Business Architecture
Design Issues” |
|
Linger |
Survivability Analysis |
Survivable Network Analysis (SNA) method Student presentation: “Information
Survivability Control Systems” |
|
3b Sept 12 Project Requirement Mead |
Team project Introduction |
Introduction to student projects Team definitions, deliverables discussion Student presentation: “Developing a Distributed
System for Infrastructure Protection” |
|
Security
Architectures |
Longstaff |
Firewalls (1) |
Introduction to firewalls – network
architectures, types of firewalls, proxies versus filtering routers Student presentation HW: Anderson Ch 18 |
Longstaff |
Firewalls (2) |
Security properties and firewalls -complexity and
vulnerability, configuration control, changing services, executable
content Student presentation |
|
5a
Sept 26 Mead |
Project Presentations |
SNA Step 1 Team Presentations |
|
5b
Sept 26 Wilson (Guest) |
OCTAVE |
Analysis Method for Operational Systems |
|
Longstaff |
Intrusion Detection (1) |
Types of intrusion detection, architecture
support for intrusion detection, IDS research Student presentation HW: Anderson Ch 10, Review Ch 18.5 |
|
6b
Oct 3 Longstaff |
Intrusion Detection (2) |
Anomaly Detection Student presentation |
|
Longstaff |
System Security Architectures (1) |
Security architectures of operating systems,
Distributed application security, system vulnerabilities Student presentation HW: Anderson Ch 7 |
|
7b
Oct 10 Longstaff |
System Security Architectures (2) |
Security architectures of operating systems,
Distributed application security Student presentation Mid-term distributed (Take home) HW: Anderson Ch 8 |
|
TBD (Guest) |
|
|
|
8b
Oct 17 TBD (Guest) |
|
|
|
9a
Oct 24 Longstaff |
Vulnerability Analysis for Architectures (1)
|
System vulnerabilities Student presentation HW: Anderson Ch 3 |
|
9b
Oct 24 Longstaff |
Vulnerability Analysis for Architectures (2) |
System vulnerabilities Student presentation HW: Anderson Ch 4 |
|
10a
Oct 31 Mead |
Project Presentations |
SNA Step 2 Team Presentations Mid-term due (turned in) |
|
Moore
(Guest) |
Intrusion Scenarios |
Attack trees Structured intrusion scenario analysis |
|
Longstaff |
Secure protocols |
Introduction to encryption protocols, public key
infrastructures, introduction to Kerberos Student presentation HW: Anderson Ch 2 |
|
11b
Nov 7 Longstaff |
Kerberos |
Kerberos architecture Student presentation HW: Anderson Ch 5 |
|
12a
Nov 14 Mead |
Project
Presentations |
SNA Step 3 Team
Presentations |
|
Fisher (Guest) |
Survivability Simulation |
Survivability as an emergent property The EASEL simulation environment and language |
|
Nov 21 |
No meeting |
Holiday |
|
13a
Nov 28 Linger |
Managing Architecture Development |
COTS-based architectures Evaluating COTS components Student presentation |
|
13b
Nov 28 Linger |
Managing System Development |
Development planning Incremental development and testing Student presentation |
|
14a
Dec 5
Mead |
Project Presentations |
SNA Step 4 Team Presentations |
|
14b
Dec 5
Linger, Longstaff, Mead |
Course Review |
Review of all course content |
|
Dec 12 |
Reading Day |
|
|
15
Dec 19 |
Final Exam |
|
Anderson, Ross, Security
Engineering: A Guide to Building Dependable Distributed Systems, Wiley,
2001, ISBN 0-471-38922-6.
Other
reference books:
Bass, Clements, and Kazman, Software Architecture in Practice, Addison-Wesley, 1998.
Shaw and Garlan, Software
Architecture: Perspectives on an Emerging Discipline, Prentice-Hall, 1996.
Hoffman, Daniel and Weiss David, Software Fundamentals: Collected Papers of David L. Parnas,Addison-Wesley,
2001.
Maier and Rechtin, The Art of Systems
Architecting, Second Edition, CRC Press, 2000.
Grading
percentages:
Midterm (take home) 35% of grade
Final Exam (in class)
35% of grade
Team project
30% of grade
Grading
Scale:
A
90-100%
B
80-89.99%
C
70-79.99%
D
60-69.99%
Not passing
Below 60%
Office
hours:
After class or by appointment
Instructor
Information:
Tom Longstaff, SEI Room 4500
Tal@sei.cmu.edu,
412-268-7074
Rick Linger
Rlinger@sei.cmu.edu,
301-926-4858
Nancy Mead
Nrm@sei.cmu.edu,
412-268-5756
Teaching
Assistant:
Yi Hu
Website:
http://www.andrew.cmu.edu/course/95-750/