1. Introduction, Threat Models

Sdílet
Vložit
  • čas přidán 13. 07. 2015
  • MIT 6.858 Computer Systems Security, Fall 2014
    View the complete course: ocw.mit.edu/6-858F14
    Instructor: Nickolai Zeldovich
    In this lecture, Professor Zeldovich gives a brief overview of the class, summarizing class organization and the concept of threat models.
    License: Creative Commons BY-NC-SA
    More information at ocw.mit.edu/terms
    More courses at ocw.mit.edu

Komentáře • 231

  • @AlJey007
    @AlJey007 Před 3 lety +322

    I am simply blown away by the fact that we can just watch these for free. This is the very definition of quality content.

    • @luqmanhamdan9285
      @luqmanhamdan9285 Před 2 lety +10

      Man, I just wish to found these earlier in university.

    • @johnpaulsmith5636
      @johnpaulsmith5636 Před 2 lety +4

      So fascinating story of the corners I'm thinking about the corners order so fascinating

    • @iyadzain6972
      @iyadzain6972 Před 2 lety

      And imagine some people hate this facts and dislike this Video

    • @yolandadarricarrere2529
      @yolandadarricarrere2529 Před 2 lety

      Amen!

    • @markoer
      @markoer Před rokem +1

      Almost all content in information security is free. You just need to find the good one and separate it from junk.

  • @mohammadseraji2088
    @mohammadseraji2088 Před 6 lety +58

    This is a clear indication and proof of how MIT secure it's top position in technology education. Thanks to MIT from the bottom of my Heart.

  • @FoxInTheBasement
    @FoxInTheBasement Před rokem +6

    the fact that he went through the syllabus in 5 minutes blows my mind, my profs often take the full first lecture.

  • @christianschafer3724
    @christianschafer3724 Před 6 lety +42

    Content starts at 5:43

  • @redraider4b40
    @redraider4b40 Před rokem +5

    I am going back to school for my cybersecurity major, and I was just looking for lectures to fall asleep to. This is GOLD.

  • @amaresh105
    @amaresh105 Před 8 lety +212

    This is truly amazing. I had never been so energetic while listening to lectures. Thanks a lot to the Professor and MIT for making such exciting study materials available online without asking for a single penny in return. :)

    • @beback_
      @beback_ Před 6 lety +3

      Check out their math and basic science courses. They're even better.

    • @vivekmit06
      @vivekmit06 Před 4 lety +2

      @@beback_ Can you please provide course name or link for basic math and science courses ?

    • @alileevil
      @alileevil Před 3 lety +2

      It’s not free. It’s paid for by either govt grants or private funding.

    • @dirverslicense
      @dirverslicense Před 3 lety +3

      @Justin Garcia This is a computer security course, not a philosophy course...

    • @hafhar1344
      @hafhar1344 Před 3 lety

      @@beback_ Hello, The professor said their is no book in this course but do know if there is anyway that the labs that he mentions, are they by any chance uploaded on you tube?
      I feel very prevliged to be able to take this course online as I am not financially strong to attend in person. But I would be extremely grateful if I could get some guidance in the lab work.

  • @RajaRamz
    @RajaRamz Před 3 lety +2

    Thanks to Prof Professor Zeldovich for this amazing lecture, even I have just watched it today, still it makes my mind blown.

  • @mathisawesome618
    @mathisawesome618 Před 6 lety +21

    It would be really helpful if their were subtitles for the parts when the students are talking. I think it's really cool that the sound changes but you still can'T really understand them so subtitles would be really helpful. Really great Course, i enjoyed watching this and am looking forward to the next lectures. Thank you

  • @tamojitbasu8634
    @tamojitbasu8634 Před 3 lety +5

    This is the power of MIT. Amazing lecture on cybersecurity for aspiring students in this field.

  • @gusgebzz
    @gusgebzz Před 7 lety +164

    The MIT chalk is very smooth.

    • @lseul8812
      @lseul8812 Před 4 lety +8

      Its a special Japanese chalk thats going out of production its a huge thing

    • @equim7363
      @equim7363 Před 4 lety +3

      @@lseul8812 sorry to hear that

    • @paulhetherington3854
      @paulhetherington3854 Před 3 lety

      CLDZALKX-- This vision, of cells-- not out from. You mentioned, smooth? Man yuck!

  • @ThatFlyGuy98
    @ThatFlyGuy98 Před rokem +1

    After watching these videos I was able to put mit cyber security course graduate. I then got a job paying $100k a year thankyou !!!

  • @dougd120
    @dougd120 Před 3 lety +2

    This is truly an amazing lecture that details what network security actually is. An amazing way to advertise for a scripting lecture that is very well detailed at that age.

  • @simaphore
    @simaphore Před 3 lety +2

    Thank you for promoting educational equality by making such high quality content available.

  • @johnsonisreal4530
    @johnsonisreal4530 Před 5 lety +3

    Start with this course and I'm enjoy it already.

  • @WhyAnkurGautam
    @WhyAnkurGautam Před 5 lety +13

    Thank you MIT for making those videos online...
    Love from India...!!!

  • @DrJochenLeidner
    @DrJochenLeidner Před 3 lety +7

    I recommend the book "Security Engineering" (Ross Anderson, 3rd ed., 2021) as background reading.

  • @dania_884
    @dania_884 Před 3 lety

    Nice video in educating of the fundamentals. Buffer overflow and code attach details from around 46'48. Thanks MIT give us the video!

  • @markarca6360
    @markarca6360 Před rokem +1

    One best example is the EMV standard (Europay, MasterCard, Visa), where a unique key is generated for every single transaction (balance inquiry, withdrawal, etc.) based on the chip on the card and the PIN keyed by the user.
    Also, SSL is now deprecated in favor of TLS.

  • @ElectricBubble
    @ElectricBubble Před 6 lety +1

    This style is so on point!

  • @AndyThomasStaff
    @AndyThomasStaff Před 7 lety +28

    21:40 20 minutes late to class, immortalized online

    • @BaSs_HaXoR
      @BaSs_HaXoR Před 7 lety +3

      If only the Professor said somethin. xD
      He gave em' the eyes.

    • @Ichinin
      @Ichinin Před 7 lety +2

      An employer doing a social search on you will be happy to find this.

    • @pattty847
      @pattty847 Před 6 lety +2

      What if the kid's mom blew up, and he still made it to class. Now how will the employer feel?

  • @KrishnaDasPC
    @KrishnaDasPC Před rokem +2

    Truly amazing classes.

  • @lizahquinn4985
    @lizahquinn4985 Před 6 lety +4

    This guy is doing a great job of explaining this information. Lucky students!

    • @Haidderispro
      @Haidderispro Před 2 lety

      You're getting the same information lucky you!

  • @sivkboi3402
    @sivkboi3402 Před 7 lety

    Great lecture with good examples like i-cloud

  • @abhaypratapsingh2920
    @abhaypratapsingh2920 Před rokem +1

    Wish Nalanda Was Never Destroyed. This was some A++ stuff.

  • @mohammadseraji2088
    @mohammadseraji2088 Před 6 lety +2

    Requesting more recent lectures on the Information System Security

    • @harshsharma9149
      @harshsharma9149 Před 3 lety

      a bit late, but prof Zeldovich has recorded 2020 lectures

  • @RoDrop
    @RoDrop Před 8 lety +5

    Great lecture. Thanks

  • @TRECAH
    @TRECAH Před 7 lety

    thank you very much

  • @mwanikastudios
    @mwanikastudios Před 9 měsíci

    Super amazing content. Just what i need.

  • @maximflorov3232
    @maximflorov3232 Před 6 lety +2

    Great speaker!Very interesting!!

  • @fedemolto
    @fedemolto Před 4 lety

    Excellent lecture, thx for sharing!

  • @quitecontrary.
    @quitecontrary. Před rokem +1

    Going to watch this whole playlist thank u

  • @bryanmccaffrey1
    @bryanmccaffrey1 Před 8 lety +3

    MIT Team,
    Well done. This is fantastic and just in time. In Lecture 1, you mentioned you might hold a tutorial on how to dissect a binary and related items. Did you ever do that? Is there a recording or document describing this? I can't seem to find a good source for this sort of thing (outside of learning IDA Pro). Not a strong programmer so could use the help. Thanks for all the work you do to make this accessible.

    • @subvind
      @subvind Před 8 lety +1

      +bryanmccaffrey1 yes. no. see episode 5 for more information @7:30

  • @CorporateDrone
    @CorporateDrone Před 2 lety +3

    Lecture starts at 5:43

  • @cmms1234
    @cmms1234 Před 3 lety

    I think technique adapted at MIT is understanding existing setup, Concentrating problems then solutions... That makes student to think continuously

  • @hadijajabborhonova9292

    awesome video tutorials :) Thanks for sharing!

  • @akintoyeebunlomo2625
    @akintoyeebunlomo2625 Před 2 lety

    This is very educative..thank you for sharing

  • @mohammedserghini979
    @mohammedserghini979 Před 3 lety

    thank you very much MITs

  • @SuperHero777
    @SuperHero777 Před 3 lety

    Super. Amazing. Very interesting to listen.

  • @thandobooi8168
    @thandobooi8168 Před 6 lety +1

    loving this course

  • @meyerjohannes
    @meyerjohannes Před 8 lety +1

    Fantastic!

  • @jmafoko
    @jmafoko Před rokem

    that definition of security is wow

  • @aaronurbina1745
    @aaronurbina1745 Před 4 lety

    Yup very nice ill make a donation here in a bit . I appriciate you guys very much.

  • @corykeilig5183
    @corykeilig5183 Před 7 lety +6

    Great examples professor

    • @LoneVocalist
      @LoneVocalist Před rokem

      Is that his name, professor Examples? Because that's all he did for an hour instead of teaching any threat modeling like the title suggested.

    • @osufwiffo
      @osufwiffo Před 8 měsíci

      @@LoneVocalist Except, the description, clearly states it's about: `... concept of threat models.` Not "how to write a Threat Model." So he's dead on what he should do, get them excited about it, vs "Dang these will suck, I'm going to hate Info Sec." like most corporate Coders these days.

    • @LoneVocalist
      @LoneVocalist Před 8 měsíci

      ​@@osufwiffo I'll just copy my other comment here for you:
      This video is a waste of time*, but let me help you waste a little less of your time with timestamps:
      fluff
      5:42 - What is Security?
      more fluff
      15:35 - Policy
      example of a company that got hacked
      example of a company that got hacked
      22:30 - Threat Models
      example of a company that got hacked
      example of a company that got hacked
      29:44 - Mechanisms
      example of a company that got hacked
      example of a company that got hacked
      example of a company that got hacked
      *This video is falsely titled because it's not about threat modeling. There's no threat modeling process presented in the video at all, no mention of STRIDE or DREAD or anything you hope to learn, just a quick verbal summary. Instead the instructor prefers to give tons of examples of hacks at big company and giggle at them. The video spends way more time on buffer overflow than threat modeling. Can't believe people are paying a fortune for this at MIT.

  • @StephenPaulKing
    @StephenPaulKing Před 7 lety +1

    Security can be modeled as the difficulty of creating a simulation of one's
    computations.

  • @JimmyNgugi
    @JimmyNgugi Před 6 lety +44

    I long to be in such a class.One day,my wish will be granted.
    Greetings from Kenya!

  • @nachiketathakur697
    @nachiketathakur697 Před 7 lety +3

    hey ! Thanks for the wonderful work. I was wondering if this course will be helpful to someone who is targeting to become security analyst?

    • @MrGoldenApe
      @MrGoldenApe Před 6 lety +2

      If you're analysing security and you know nothing about the weapon the attacker will use, how do you prepare? To answer your question, yes.

  • @gilbertsenyonjo963
    @gilbertsenyonjo963 Před 4 lety

    This is very good content.

  • @bruce8088
    @bruce8088 Před 5 lety +12

    Seems like the coverage of threat models is very brief with this lecture focusing more on threats and vulnerabilities. So if you, like me, were hoping for extended content on threat modeling then I'd recommend a different video.

    • @ovilashmoitra4252
      @ovilashmoitra4252 Před 2 lety

      have you find any course on the stipulate subject? and if you have would you mind sharing this with me?

  • @veramentegina
    @veramentegina Před 4 lety

    great lecture! great lecturer! thank you MIT!

  • @harrior1
    @harrior1 Před 5 lety +1

    Прекрасные лекции! Люблю их больше чем водку! From Russia with love.

  • @shinkurt
    @shinkurt Před 2 lety

    actually, makes it seem like going to school is not a bad idea when you have professors like this. not really a waste of time.

  • @dewdop
    @dewdop Před 3 lety

    Professor has great posture for a CS ;)

  • @ruchit8762
    @ruchit8762 Před 4 lety +1

    Thank you very much Nickolai/MIT on simplifying Threat Model..... I found the GDB found a bit difficult to understand as I am not good with C and x86 assembly.. Can you please advise some resources to understand GDB and x86...
    thank you once again for the interesting lecture.

    • @asharbinkhalil
      @asharbinkhalil Před 2 lety

      x86 and C are the basics of computer programming, learn it from anywehre

  • @musirantv
    @musirantv Před rokem +1

    the first time I slowed down a lecture :D

    • @janek4024
      @janek4024 Před 9 měsíci

      when i just turned on the lecture, i thought that i still had 1.5x speed up on yt. the guy is amazing

  • @SiddharthSharma-yh1bc
    @SiddharthSharma-yh1bc Před 4 lety

    @59:25 "x86 is little-endian (LSB in lower address), and the stack grows towards lower address." I got confused so just putting it out there

  • @amalcidhu3745
    @amalcidhu3745 Před měsícem

    Playlist length: 29 Hours, 44 Minutes, 16 seconds

  • @MakerMark
    @MakerMark Před 7 lety

    note to camera person. Don't need to zoom or follow. Just leave it pointed at the board full frame.

  • @brian-kt1rc
    @brian-kt1rc Před 6 lety +2

    Increase speed in lecture videos its much better

  • @trinayanbaruah9704
    @trinayanbaruah9704 Před 7 lety +3

    Are the course labs accessible for outside MIT students?. Anyone tried?

  • @w3w3w3
    @w3w3w3 Před 3 lety

    hmm nice i enjoy this so much and could listen to this all day... i will hahah :)

  • @taylort3926
    @taylort3926 Před 7 lety +10

    Is this course useful for someone who has not taken any sort of computer science course and has little/no experience in coding? Or is there another lecture series I should start with?

    • @mitocw
      @mitocw  Před 7 lety +81

      We would recommend you start with 6.00SC and work your way up. (The course sequence to get here would be 6.00SC or 6.01SC or 6.001, 6.002 > 6.004 > 6.033 > 6.858). ocw.mit.edu/courses/electrical-engineering-and-computer-science/ Best wishes on your studies!

    • @taylort3926
      @taylort3926 Před 7 lety +4

      Thank you!

    • @stevewu9372
      @stevewu9372 Před 5 lety

      @@mitocw I appreciate you guys for sharing collective wisdom with all human beings!

  • @moshe6501
    @moshe6501 Před 7 lety +1

    Can you provide for reference sources citing the three folded security approach (policy, tm and mechanisms)? Regarding the threat model, is there a generally accepted methodology you could mention (preferably free from product bias) specifically advised for system protection endevors ?

  • @piffdos
    @piffdos Před 8 lety

    Is there a more detailed explanation of that atoi conversion that writes 0 @ 1:01:00 ?

  • @dhirajrajofficail8594
    @dhirajrajofficail8594 Před měsícem

    I love you sir ji good lecture

  • @zhiyongyao5697
    @zhiyongyao5697 Před rokem +1

    great

  • @gingarrison104
    @gingarrison104 Před 3 měsíci +1

    So, they need to study C, assembly, python and Java in the same time? Here is my respect!!!

  • @lightosx
    @lightosx Před 4 lety

    Should rename this to 1. Introduction, Buffer Overflows

  • @anthonyover
    @anthonyover Před 4 lety +1

    22:30 is Threat Models

  • @mohamedfouad2304
    @mohamedfouad2304 Před 5 lety +64

    The guy from the hangover movie

  • @danmendes2749
    @danmendes2749 Před 2 lety

    Does anyone have any additional information about the DARPA secure OS backdoor story I was not able to find any related material. It is interesting to reflect today dependency confusion attack works.

  • @khumoyunakhmedov4562
    @khumoyunakhmedov4562 Před 7 lety

    really awesome lecture, isn't it? We should propagate this kind of lectures through other medias also

  • @randythamrin5976
    @randythamrin5976 Před 3 lety +2

    that is why we need to study in MIT

  • @filippocesana5696
    @filippocesana5696 Před 2 lety

    Are the labs available anywhere for students who are not enrolled in MIT?

  • @andarkge
    @andarkge Před 3 lety

    Come to learn about threat modeling, learned bunch of stuff on assembly and buffer overrun hacks.

  • @CyberNerd1000
    @CyberNerd1000 Před 5 lety

    Great course but the lecture is little too long...this lecture should have been broken down into two parts for class focus optimization. You can also listen to lecture with 2x the speed if you can absorb that fast.

  • @abdihakimmohamed6309
    @abdihakimmohamed6309 Před 5 lety

    Is the course lab work available the viewers ?

  • @berndeckenfels
    @berndeckenfels Před 3 lety

    27:22 is that a transparent whiteboard? looks like a monitor behind it turned on.

  • @matiassandacz9145
    @matiassandacz9145 Před 3 lety

    Buffer Overflows 46:20

  • @profesorinformatica7370
    @profesorinformatica7370 Před 7 lety +1

    Congratulations excellent videos, could you please change the standard youtube license to creative common license, to be able to download the videos are no ethical dilemma. Thanks a lot for your valuable help.

    • @mitocw
      @mitocw  Před 7 lety +1

      You can use these videos without ethical dilemma as long as you follow our Creative Commons license (BY-NC-SA 4.0), see ocw.mit.edu/terms/ for details. The reason we do not use the CZcams Creative Commons license is because it doesn't match our license.

  • @hamdemon8511
    @hamdemon8511 Před 7 lety +2

    you guys need to have an educational auditing service where students can submit papers and programs for grading and take proctored tests for credit. with the glut in the academic labor market and the sheer tonnage of hungry grad students you could farm the grading to the credentialed poor through something like Amazons Mechanical Turk. With all the syllabi, readings, open source systems and even lectures free on line there is no reason student's should have to mortgage themselves for an undergraduate degree. and by the same token there is no reason each class shouldn't have several million student's earning grades.

  • @mrpotatohed4
    @mrpotatohed4 Před 6 lety +5

    wish my university had that big ass chalk so I could see better

  • @Alex-oh6lj
    @Alex-oh6lj Před 5 lety

    Can anyone explain what he is doing with the code? I don't understand what he is doing. Thanks

  • @mustaphaminteh7228
    @mustaphaminteh7228 Před 3 lety

    Hi i am very interested to be part of this class online, please help me how to connect.

  • @pietromorenoallaho
    @pietromorenoallaho Před 3 lety

    does someone know why LLDB on macOS throws error that it can't disassemle the $ebp+4 adress?

  • @mitchtapesthemovie520
    @mitchtapesthemovie520 Před 3 lety

    Can anyone tell me which paper they assigned to the class?

  • @zainab6140
    @zainab6140 Před 4 lety

    Why don't we have normal teachers that explain with such enthusiasm? ☹️

    • @tamojitbasu8634
      @tamojitbasu8634 Před 3 lety

      Because MIT, Harvard, Oxford etc professors doesn't have egos and attitude.

  • @jganer
    @jganer Před 7 lety

    21:32 you lost the kid LOL!

  • @Reggae_TCS
    @Reggae_TCS Před 7 lety +2

    is it possible to view the labs for this video?

    • @mitocw
      @mitocw  Před 7 lety +6

      Yes, the labs are available on MIT OpenCourseWare at ocw.mit.edu/6-858F14.

  • @mohamedkhalilzouitni3803
    @mohamedkhalilzouitni3803 Před 5 lety +1

    Is there any chance of me getting hands on those Lab materials ? I need it.

  • @oneblackpanda
    @oneblackpanda Před 4 lety +1

    Any pre-requisite courses for this... am getting lost really quickly

    • @mitocw
      @mitocw  Před 4 lety +1

      +Black Panda The syllabus page in the full OCW course site ocw.mit.edu/6-858F14 is where prerequisites are listed. In this case, 6.033 Computer System Engineering is the prerequisite: ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-033-computer-system-engineering-spring-2018/. Good luck with your studies!

  • @demensdeum_live
    @demensdeum_live Před 8 lety +7

    Good thing that his is russian, i can understand what he says perfectly)

  • @AlexisDimes
    @AlexisDimes Před 9 měsíci

    28:50

  • @mathssoso4261
    @mathssoso4261 Před 7 lety +4

    hi guys,
    does any one have the books going with this courses please?

    • @mitocw
      @mitocw  Před 7 lety +10

      There does not seem to be a required textbook for this course. You should look at the Readings section of the course on MIT OpenCourseWare at ocw.mit.edu/6-858F14 for more information.

  • @ZahidHasan-cc8tf
    @ZahidHasan-cc8tf Před 2 lety

    22:38 how threat models go wrong?

  • @gatlinmyer4738
    @gatlinmyer4738 Před 7 lety +1

    Please, give us the lab.😢 This is very hard to implement without knowing how to do it.

    • @mitocw
      @mitocw  Před 7 lety +7

      The materials that we do have are available at ocw.mit.edu/6-858F14. Hope this helps!

    • @gatlinmyer6976
      @gatlinmyer6976 Před 7 lety

      Thank You! This actually helped, that is a first.

    • @jorgediaz6730
      @jorgediaz6730 Před 6 lety +1

      MIT OpenCourseWare wow thanks

  • @puupuuu9031
    @puupuuu9031 Před 7 lety +2

    Where can I learn about "Code signing" and "Sandboxing"?
    I've been searching for hours and don't seem to find one that tells me exactly how "Code signing" and "Sandboxing" works.

    • @alexholker1309
      @alexholker1309 Před 5 lety +1

      For the benefit of anyone reading this a year after the fact, "code signing" is an application of asymmetric key encryption. In symmetric key encryption you have one key that can be used to decrypt the same data that it encrypts, while in asymmetric key encryption you have two keys, and if you use one to encrypt data only the other key can be used to decrypt it.
      If you make one of those keys publicly available but keep the other one a secret, you can use your secret key to encrypt data - including software updates - and everyone has a way of verifying that the update came from you and not some hacker. They don't know what your secret key is, but they know *you* have your secret key because you're capable of producing encrypted data that can be decrypted by your public key.

  • @maycodes
    @maycodes Před 4 lety

    Is there any other course on system security on mit ocw ?

    • @mitocw
      @mitocw  Před 4 lety

      No, currently this is all we have on this topic.

  • @mazhani-8
    @mazhani-8 Před měsícem

    weird to think this was 10 years ago

  • @lukesf7838
    @lukesf7838 Před 5 lety +1

    Title should be threat examples, not threat models

  • @shantanusengupta2696
    @shantanusengupta2696 Před 7 lety +2

    Which editor is being used to explain the buffer overflow exploit?

    • @alexandermilkov6313
      @alexandermilkov6313 Před 7 lety

      xmonad (minimalistic Haskell desktop) with what i'm pretty sure is xmobar

    • @phoenix2464
      @phoenix2464 Před 6 lety

      it's a debugger ==>gdb (gnu debugger)