• Your selection is empty.

    Register the diplomas, courses or lessons of your choice.

System and physical security

  • School / Prep

    ENSEIRB-MATMECA

Internal code

EI9RE351

Description

This course introduces the concepts needed to understand system security. It is completed by an introduction to physical security (opening doors, padlocks and locks).

Read more

Teaching hours

  • CIIntegrated Courses15h
  • PRACTICAL WORKPractical work25h

Syllabus

Introduction to reverse engineering

Introduction
Static analysis: First steps, Information retrieval, Code representation
Result: Function analysis, Data flow tracking, Bonus

Principles of vulnerability exploitation

Introduction: Rules of the game, Cryptographic vulnerabilities, Logical vulnerabilities, String manipulation
Attacks: Injections, Memory corruption, Secure programming
OS hardening: The administrator's part, Protections

Linux system security

Introduction to system security: General, Legal aspects, Basic concepts, Hardware security
System security: Authentication, Authorization, Auditing

Containers and virtualization under Linux

Context: What do we want to protect against? Protection mechanisms
Containers vs. Virtualization: Definitions, Virtualization:

full emulation
software-level emulation (type 2)
host-level emulation (type 1)
Virtual hard disks
Vulnerability example

Containers

First step: chroot()
Advanced Linux kernel mechanisms
Sandbox
LXC, LibContainer and Docker
Vulnerability example


Applications: Malware, Provisioning, Containers, Development support, Cloud, Virtualization API: LibVirt, Compartmentalization,
Enhanced access control: MAC, Security policy models, Most common : SELinux and AppArmor, The rebel: grsecurity

Windows system security

General security principles: The 3 "A "s, Internal structure, Accounts and groups, Control and access
System security mechanisms: System architecture, Authentication, Security strategies, File system, Registry, Tools
Network security mechanisms: Active Directory, File sharing, IPSec under Windows, Firewall
Application security: Prevention of overflow attacks

Execution prevention (DEP/NX)
Exception control
PatchGuard

Other mechanisms

Software restriction strategies
Boot security

Principle of sandboxing (browsers)

Malware extraction and analysis: from forensics to reverse

Malware "ecosystem": Who are the attackers? Definitions, Exploitation As A Service: Exploit Kits, Defenders, Monetization
Forensics: Malware extraction, Objectives, Network forensics, System forensics, Application forensics
Malware analysis: Analysis basics, Automation tools, Handheld analysis, Packers, Obfuscation

Physical security.

Read more

Assessment of knowledge

Initial assessment / Main session - Tests

Type of assessmentType of testDuration (in minutes)Number of testsTest coefficientEliminatory mark in the testRemarks
Final inspectionWritten801
ProjectDefense0.5
ProjectReport0.5

Second chance / Catch-up session - Tests

Type of assessmentType of testDuration (in minutes)Number of testsTest coefficientEliminatory mark in the testRemarks
ProjectReport1