1. Introduction, Threat Models

MIT 6.858 Computer Systems Security, Fall 2014
View the complete course: ocw.mit.edu/6-858F14
Instructor: Nickolai Zeldovich
In this lecture, Professor Zeldovich gives a brief overview of the class, summarizing class organization and the concept of threat models.
License: Creative Commons BY-NC-SA
More information at ocw.mit.edu/terms
More courses at ocw.mit.edu

Пікірлер: 230

  • @AlJey007
    @AlJey0073 жыл бұрын

    I am simply blown away by the fact that we can just watch these for free. This is the very definition of quality content.

  • @luqmanhamdan9285

    @luqmanhamdan9285

    2 жыл бұрын

    Man, I just wish to found these earlier in university.

  • @johnpaulsmith5636

    @johnpaulsmith5636

    2 жыл бұрын

    So fascinating story of the corners I'm thinking about the corners order so fascinating

  • @iyadzain6972

    @iyadzain6972

    2 жыл бұрын

    And imagine some people hate this facts and dislike this Video

  • @yolandadarricarrere2529

    @yolandadarricarrere2529

    2 жыл бұрын

    Amen!

  • @markoer

    @markoer

    Жыл бұрын

    Almost all content in information security is free. You just need to find the good one and separate it from junk.

  • @mohammadseraji2088
    @mohammadseraji20886 жыл бұрын

    This is a clear indication and proof of how MIT secure it's top position in technology education. Thanks to MIT from the bottom of my Heart.

  • @amaresh105
    @amaresh1058 жыл бұрын

    This is truly amazing. I had never been so energetic while listening to lectures. Thanks a lot to the Professor and MIT for making such exciting study materials available online without asking for a single penny in return. :)

  • @beback_

    @beback_

    6 жыл бұрын

    Check out their math and basic science courses. They're even better.

  • @vivekmit06

    @vivekmit06

    4 жыл бұрын

    @@beback_ Can you please provide course name or link for basic math and science courses ?

  • @alileevil

    @alileevil

    4 жыл бұрын

    It’s not free. It’s paid for by either govt grants or private funding.

  • @dirverslicense

    @dirverslicense

    3 жыл бұрын

    @Justin Garcia This is a computer security course, not a philosophy course...

  • @hafhar1344

    @hafhar1344

    3 жыл бұрын

    @@beback_ Hello, The professor said their is no book in this course but do know if there is anyway that the labs that he mentions, are they by any chance uploaded on you tube? I feel very prevliged to be able to take this course online as I am not financially strong to attend in person. But I would be extremely grateful if I could get some guidance in the lab work.

  • @redraider4b40
    @redraider4b40 Жыл бұрын

    I am going back to school for my cybersecurity major, and I was just looking for lectures to fall asleep to. This is GOLD.

  • @RajaRamz
    @RajaRamz3 жыл бұрын

    Thanks to Prof Professor Zeldovich for this amazing lecture, even I have just watched it today, still it makes my mind blown.

  • @christianschafer3724
    @christianschafer37246 жыл бұрын

    Content starts at 5:43

  • @adityaprakash2078

    @adityaprakash2078

    Жыл бұрын

    Thanks

  • @tamojitbasu8634
    @tamojitbasu86343 жыл бұрын

    This is the power of MIT. Amazing lecture on cybersecurity for aspiring students in this field.

  • @simaphore
    @simaphore3 жыл бұрын

    Thank you for promoting educational equality by making such high quality content available.

  • @dougd120
    @dougd1203 жыл бұрын

    This is truly an amazing lecture that details what network security actually is. An amazing way to advertise for a scripting lecture that is very well detailed at that age.

  • @WhyAnkurGautam
    @WhyAnkurGautam5 жыл бұрын

    Thank you MIT for making those videos online... Love from India...!!!

  • @johnsonisreal4530
    @johnsonisreal45305 жыл бұрын

    Start with this course and I'm enjoy it already.

  • @FoxInTheBasement
    @FoxInTheBasement Жыл бұрын

    the fact that he went through the syllabus in 5 minutes blows my mind, my profs often take the full first lecture.

  • @mathisawesome618
    @mathisawesome6186 жыл бұрын

    It would be really helpful if their were subtitles for the parts when the students are talking. I think it's really cool that the sound changes but you still can'T really understand them so subtitles would be really helpful. Really great Course, i enjoyed watching this and am looking forward to the next lectures. Thank you

  • @dania_884
    @dania_8843 жыл бұрын

    Nice video in educating of the fundamentals. Buffer overflow and code attach details from around 46'48. Thanks MIT give us the video!

  • @ThatFlyGuy98
    @ThatFlyGuy98 Жыл бұрын

    After watching these videos I was able to put mit cyber security course graduate. I then got a job paying $100k a year thankyou !!!

  • @lizahquinn4985
    @lizahquinn49856 жыл бұрын

    This guy is doing a great job of explaining this information. Lucky students!

  • @Haidderispro

    @Haidderispro

    2 жыл бұрын

    You're getting the same information lucky you!

  • @gusgebzz
    @gusgebzz7 жыл бұрын

    The MIT chalk is very smooth.

  • @lseul8812

    @lseul8812

    4 жыл бұрын

    Its a special Japanese chalk thats going out of production its a huge thing

  • @equim7363

    @equim7363

    4 жыл бұрын

    @@lseul8812 sorry to hear that

  • @paulhetherington3854

    @paulhetherington3854

    3 жыл бұрын

    CLDZALKX-- This vision, of cells-- not out from. You mentioned, smooth? Man yuck!

  • @KrishnaDasPC
    @KrishnaDasPC2 жыл бұрын

    Truly amazing classes.

  • @DrJochenLeidner
    @DrJochenLeidner3 жыл бұрын

    I recommend the book "Security Engineering" (Ross Anderson, 3rd ed., 2021) as background reading.

  • @ElectricBubble
    @ElectricBubble6 жыл бұрын

    This style is so on point!

  • @markarca6360
    @markarca6360 Жыл бұрын

    One best example is the EMV standard (Europay, MasterCard, Visa), where a unique key is generated for every single transaction (balance inquiry, withdrawal, etc.) based on the chip on the card and the PIN keyed by the user. Also, SSL is now deprecated in favor of TLS.

  • @sivkboi3402
    @sivkboi34027 жыл бұрын

    Great lecture with good examples like i-cloud

  • @RoDrop
    @RoDrop8 жыл бұрын

    Great lecture. Thanks

  • @TRECAH
    @TRECAH7 жыл бұрын

    thank you very much

  • @AndyThomasStaff
    @AndyThomasStaff7 жыл бұрын

    21:40 20 minutes late to class, immortalized online

  • @BaSs_HaXoR

    @BaSs_HaXoR

    7 жыл бұрын

    If only the Professor said somethin. xD He gave em' the eyes.

  • @Ichinin

    @Ichinin

    7 жыл бұрын

    An employer doing a social search on you will be happy to find this.

  • @pattty847

    @pattty847

    6 жыл бұрын

    What if the kid's mom blew up, and he still made it to class. Now how will the employer feel?

  • @mohammadseraji2088
    @mohammadseraji20886 жыл бұрын

    Requesting more recent lectures on the Information System Security

  • @harshsharma9149

    @harshsharma9149

    3 жыл бұрын

    a bit late, but prof Zeldovich has recorded 2020 lectures

  • @quitecontrary.
    @quitecontrary. Жыл бұрын

    Going to watch this whole playlist thank u

  • @maximflorov3232
    @maximflorov32327 жыл бұрын

    Great speaker!Very interesting!!

  • @trinayanbaruah9704
    @trinayanbaruah97047 жыл бұрын

    Are the course labs accessible for outside MIT students?. Anyone tried?

  • @bryanmccaffrey1
    @bryanmccaffrey18 жыл бұрын

    MIT Team, Well done. This is fantastic and just in time. In Lecture 1, you mentioned you might hold a tutorial on how to dissect a binary and related items. Did you ever do that? Is there a recording or document describing this? I can't seem to find a good source for this sort of thing (outside of learning IDA Pro). Not a strong programmer so could use the help. Thanks for all the work you do to make this accessible.

  • @subvind

    @subvind

    8 жыл бұрын

    +bryanmccaffrey1 yes. no. see episode 5 for more information @7:30

  • @mwanikastudios
    @mwanikastudios10 ай бұрын

    Super amazing content. Just what i need.

  • @hadijajabborhonova9292
    @hadijajabborhonova92926 жыл бұрын

    awesome video tutorials :) Thanks for sharing!

  • @fedemolto
    @fedemolto4 жыл бұрын

    Excellent lecture, thx for sharing!

  • @akintoyeebunlomo2625
    @akintoyeebunlomo26252 жыл бұрын

    This is very educative..thank you for sharing

  • @cmms1234
    @cmms12343 жыл бұрын

    I think technique adapted at MIT is understanding existing setup, Concentrating problems then solutions... That makes student to think continuously

  • @piffdos
    @piffdos8 жыл бұрын

    Is there a more detailed explanation of that atoi conversion that writes 0 @ 1:01:00 ?

  • @SuperHero777
    @SuperHero7773 жыл бұрын

    Super. Amazing. Very interesting to listen.

  • @mohammedserghini979
    @mohammedserghini9793 жыл бұрын

    thank you very much MITs

  • @abhaypratapsingh2920
    @abhaypratapsingh2920 Жыл бұрын

    Wish Nalanda Was Never Destroyed. This was some A++ stuff.

  • @meyerjohannes
    @meyerjohannes8 жыл бұрын

    Fantastic!

  • @thandobooi8168
    @thandobooi81686 жыл бұрын

    loving this course

  • @nachiketathakur697
    @nachiketathakur6977 жыл бұрын

    hey ! Thanks for the wonderful work. I was wondering if this course will be helpful to someone who is targeting to become security analyst?

  • @MrGoldenApe

    @MrGoldenApe

    6 жыл бұрын

    If you're analysing security and you know nothing about the weapon the attacker will use, how do you prepare? To answer your question, yes.

  • @corykeilig5183
    @corykeilig51837 жыл бұрын

    Great examples professor

  • @LoneVocalist

    @LoneVocalist

    Жыл бұрын

    Is that his name, professor Examples? Because that's all he did for an hour instead of teaching any threat modeling like the title suggested.

  • @osufwiffo

    @osufwiffo

    8 ай бұрын

    @@LoneVocalist Except, the description, clearly states it's about: `... concept of threat models.` Not "how to write a Threat Model." So he's dead on what he should do, get them excited about it, vs "Dang these will suck, I'm going to hate Info Sec." like most corporate Coders these days.

  • @LoneVocalist

    @LoneVocalist

    8 ай бұрын

    ​@@osufwiffo I'll just copy my other comment here for you: This video is a waste of time*, but let me help you waste a little less of your time with timestamps: fluff 5:42 - What is Security? more fluff 15:35 - Policy example of a company that got hacked example of a company that got hacked 22:30 - Threat Models example of a company that got hacked example of a company that got hacked 29:44 - Mechanisms example of a company that got hacked example of a company that got hacked example of a company that got hacked *This video is falsely titled because it's not about threat modeling. There's no threat modeling process presented in the video at all, no mention of STRIDE or DREAD or anything you hope to learn, just a quick verbal summary. Instead the instructor prefers to give tons of examples of hacks at big company and giggle at them. The video spends way more time on buffer overflow than threat modeling. Can't believe people are paying a fortune for this at MIT.

  • @moshe6501
    @moshe65017 жыл бұрын

    Can you provide for reference sources citing the three folded security approach (policy, tm and mechanisms)? Regarding the threat model, is there a generally accepted methodology you could mention (preferably free from product bias) specifically advised for system protection endevors ?

  • @marveladeguitar

    @marveladeguitar

    2 жыл бұрын

    STRIDE is ok if you're starting out.

  • @gilbertsenyonjo963
    @gilbertsenyonjo9634 жыл бұрын

    This is very good content.

  • @ruchit8762
    @ruchit87624 жыл бұрын

    Thank you very much Nickolai/MIT on simplifying Threat Model..... I found the GDB found a bit difficult to understand as I am not good with C and x86 assembly.. Can you please advise some resources to understand GDB and x86... thank you once again for the interesting lecture.

  • @asharbinkhalil

    @asharbinkhalil

    2 жыл бұрын

    x86 and C are the basics of computer programming, learn it from anywehre

  • @anthonyover
    @anthonyover4 жыл бұрын

    22:30 is Threat Models

  • @aaronurbina1745
    @aaronurbina17454 жыл бұрын

    Yup very nice ill make a donation here in a bit . I appriciate you guys very much.

  • @CorporateDrone
    @CorporateDrone2 жыл бұрын

    Lecture starts at 5:43

  • @w3w3w3
    @w3w3w33 жыл бұрын

    hmm nice i enjoy this so much and could listen to this all day... i will hahah :)

  • @StephenPaulKing
    @StephenPaulKing7 жыл бұрын

    Security can be modeled as the difficulty of creating a simulation of one's computations.

  • @abdihakimmohamed6309
    @abdihakimmohamed63095 жыл бұрын

    Is the course lab work available the viewers ?

  • @filippocesana5696
    @filippocesana56962 жыл бұрын

    Are the labs available anywhere for students who are not enrolled in MIT?

  • @danmendes2749
    @danmendes27492 жыл бұрын

    Does anyone have any additional information about the DARPA secure OS backdoor story I was not able to find any related material. It is interesting to reflect today dependency confusion attack works.

  • @jmafoko
    @jmafoko Жыл бұрын

    that definition of security is wow

  • @harrior1
    @harrior15 жыл бұрын

    Прекрасные лекции! Люблю их больше чем водку! From Russia with love.

  • @taylort3926
    @taylort39267 жыл бұрын

    Is this course useful for someone who has not taken any sort of computer science course and has little/no experience in coding? Or is there another lecture series I should start with?

  • @mitocw

    @mitocw

    7 жыл бұрын

    We would recommend you start with 6.00SC and work your way up. (The course sequence to get here would be 6.00SC or 6.01SC or 6.001, 6.002 > 6.004 > 6.033 > 6.858). ocw.mit.edu/courses/electrical-engineering-and-computer-science/ Best wishes on your studies!

  • @taylort3926

    @taylort3926

    7 жыл бұрын

    Thank you!

  • @stevewu9372

    @stevewu9372

    5 жыл бұрын

    @@mitocw I appreciate you guys for sharing collective wisdom with all human beings!

  • @berndeckenfels
    @berndeckenfels3 жыл бұрын

    27:22 is that a transparent whiteboard? looks like a monitor behind it turned on.

  • @veramentegina
    @veramentegina4 жыл бұрын

    great lecture! great lecturer! thank you MIT!

  • @Alex-oh6lj
    @Alex-oh6lj5 жыл бұрын

    Can anyone explain what he is doing with the code? I don't understand what he is doing. Thanks

  • @zhiyongyao5697
    @zhiyongyao5697 Жыл бұрын

    great

  • @musirantv
    @musirantv Жыл бұрын

    the first time I slowed down a lecture :D

  • @janek4024

    @janek4024

    10 ай бұрын

    when i just turned on the lecture, i thought that i still had 1.5x speed up on yt. the guy is amazing

  • @SiddharthSharma-yh1bc
    @SiddharthSharma-yh1bc4 жыл бұрын

    @59:25 "x86 is little-endian (LSB in lower address), and the stack grows towards lower address." I got confused so just putting it out there

  • @JimmyNgugi
    @JimmyNgugi6 жыл бұрын

    I long to be in such a class.One day,my wish will be granted. Greetings from Kenya!

  • @arobidy

    @arobidy

    6 жыл бұрын

    Greetings from the USA. We'd love to have you!

  • @mohaahmedtahiri1177

    @mohaahmedtahiri1177

    6 жыл бұрын

    kenyan also;;;; enyewe tunasoma

  • @fredharvey2720

    @fredharvey2720

    5 жыл бұрын

    Oh boy another migrant.

  • @wahtsfgsgwwwsxq

    @wahtsfgsgwwwsxq

    4 жыл бұрын

    You are in already! Thanks to MIT!

  • @zoomin9684

    @zoomin9684

    4 жыл бұрын

    @@fredharvey2720 Are you an Indian?

  • @bruce8088
    @bruce80885 жыл бұрын

    Seems like the coverage of threat models is very brief with this lecture focusing more on threats and vulnerabilities. So if you, like me, were hoping for extended content on threat modeling then I'd recommend a different video.

  • @ovilashmoitra4252

    @ovilashmoitra4252

    2 жыл бұрын

    have you find any course on the stipulate subject? and if you have would you mind sharing this with me?

  • @Reggae_TCS
    @Reggae_TCS7 жыл бұрын

    is it possible to view the labs for this video?

  • @mitocw

    @mitocw

    7 жыл бұрын

    Yes, the labs are available on MIT OpenCourseWare at ocw.mit.edu/6-858F14.

  • @mustaphaminteh7228
    @mustaphaminteh72283 жыл бұрын

    Hi i am very interested to be part of this class online, please help me how to connect.

  • @brian-kt1rc
    @brian-kt1rc6 жыл бұрын

    Increase speed in lecture videos its much better

  • @dpetrov32
    @dpetrov323 жыл бұрын

    does someone know why LLDB on macOS throws error that it can't disassemle the $ebp+4 adress?

  • @oneblackpanda
    @oneblackpanda4 жыл бұрын

    Any pre-requisite courses for this... am getting lost really quickly

  • @mitocw

    @mitocw

    4 жыл бұрын

    +Black Panda The syllabus page in the full OCW course site ocw.mit.edu/6-858F14 is where prerequisites are listed. In this case, 6.033 Computer System Engineering is the prerequisite: ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-033-computer-system-engineering-spring-2018/. Good luck with your studies!

  • @dewdop
    @dewdop3 жыл бұрын

    Professor has great posture for a CS ;)

  • @puupuuu9031
    @puupuuu90317 жыл бұрын

    Where can I learn about "Code signing" and "Sandboxing"? I've been searching for hours and don't seem to find one that tells me exactly how "Code signing" and "Sandboxing" works.

  • @alexholker1309

    @alexholker1309

    5 жыл бұрын

    For the benefit of anyone reading this a year after the fact, "code signing" is an application of asymmetric key encryption. In symmetric key encryption you have one key that can be used to decrypt the same data that it encrypts, while in asymmetric key encryption you have two keys, and if you use one to encrypt data only the other key can be used to decrypt it. If you make one of those keys publicly available but keep the other one a secret, you can use your secret key to encrypt data - including software updates - and everyone has a way of verifying that the update came from you and not some hacker. They don't know what your secret key is, but they know *you* have your secret key because you're capable of producing encrypted data that can be decrypted by your public key.

  • @mohamedkhalilzouitni3803
    @mohamedkhalilzouitni38035 жыл бұрын

    Is there any chance of me getting hands on those Lab materials ? I need it.

  • @mohamedkhalilzouitni3803

    @mohamedkhalilzouitni3803

    5 жыл бұрын

    Actually I just noticed, it's all on the website 😅 I've been saved by me 😁

  • @mitchtapesthemovie520
    @mitchtapesthemovie5203 жыл бұрын

    Can anyone tell me which paper they assigned to the class?

  • @MakerMark
    @MakerMark7 жыл бұрын

    note to camera person. Don't need to zoom or follow. Just leave it pointed at the board full frame.

  • @maycodes
    @maycodes4 жыл бұрын

    Is there any other course on system security on mit ocw ?

  • @mitocw

    @mitocw

    4 жыл бұрын

    No, currently this is all we have on this topic.

  • @dhirajrajofficail8594
    @dhirajrajofficail85942 ай бұрын

    I love you sir ji good lecture

  • @shinkurt
    @shinkurt2 жыл бұрын

    actually, makes it seem like going to school is not a bad idea when you have professors like this. not really a waste of time.

  • @lightosx
    @lightosx4 жыл бұрын

    Should rename this to 1. Introduction, Buffer Overflows

  • @matiassandacz9145
    @matiassandacz91453 жыл бұрын

    Buffer Overflows 46:20

  • @mohamedfouad2304
    @mohamedfouad23045 жыл бұрын

    The guy from the hangover movie

  • @PreetiRachelJasper

    @PreetiRachelJasper

    5 жыл бұрын

    Mohamed Fouad lol

  • @saringali9439

    @saringali9439

    5 жыл бұрын

    bredly cooper???

  • @user-ImmortalRavan

    @user-ImmortalRavan

    3 жыл бұрын

    Yeh bro😂

  • @mathssoso4261
    @mathssoso42617 жыл бұрын

    hi guys, does any one have the books going with this courses please?

  • @mitocw

    @mitocw

    7 жыл бұрын

    There does not seem to be a required textbook for this course. You should look at the Readings section of the course on MIT OpenCourseWare at ocw.mit.edu/6-858F14 for more information.

  • @shantanusengupta2696
    @shantanusengupta26967 жыл бұрын

    Which editor is being used to explain the buffer overflow exploit?

  • @alexandermilkov6313

    @alexandermilkov6313

    7 жыл бұрын

    xmonad (minimalistic Haskell desktop) with what i'm pretty sure is xmobar

  • @phoenix2464

    @phoenix2464

    6 жыл бұрын

    it's a debugger ==>gdb (gnu debugger)

  • @CaptHook-xb9jw
    @CaptHook-xb9jw7 жыл бұрын

    Where is no. 5 of the videos? It seems gone.

  • @mitocw

    @mitocw

    7 жыл бұрын

    Sorry, session 5 is not available. It was a guest lecture by Paul Youn from iSEC Partners. See the course on MIT OpenCourseWare for more details at ocw.mit.edu/6-858F14.

  • @profesorinformatica7370
    @profesorinformatica73707 жыл бұрын

    Congratulations excellent videos, could you please change the standard youtube license to creative common license, to be able to download the videos are no ethical dilemma. Thanks a lot for your valuable help.

  • @mitocw

    @mitocw

    7 жыл бұрын

    You can use these videos without ethical dilemma as long as you follow our Creative Commons license (BY-NC-SA 4.0), see ocw.mit.edu/terms/ for details. The reason we do not use the KZread Creative Commons license is because it doesn't match our license.

  • @ZahidHasan-cc8tf
    @ZahidHasan-cc8tf2 жыл бұрын

    22:38 how threat models go wrong?

  • @khumoyunakhmedov4562
    @khumoyunakhmedov45627 жыл бұрын

    really awesome lecture, isn't it? We should propagate this kind of lectures through other medias also

  • @eyeLikeCarrots
    @eyeLikeCarrots3 жыл бұрын

    5:50 .... "Secunty"?

  • @andarkge
    @andarkge4 жыл бұрын

    Come to learn about threat modeling, learned bunch of stuff on assembly and buffer overrun hacks.

  • @mrpotatohed4
    @mrpotatohed46 жыл бұрын

    wish my university had that big ass chalk so I could see better

  • @CyberNerd1000
    @CyberNerd10005 жыл бұрын

    Great course but the lecture is little too long...this lecture should have been broken down into two parts for class focus optimization. You can also listen to lecture with 2x the speed if you can absorb that fast.

  • @randythamrin5976
    @randythamrin59763 жыл бұрын

    that is why we need to study in MIT

  • @gingarrison104
    @gingarrison1044 ай бұрын

    So, they need to study C, assembly, python and Java in the same time? Here is my respect!!!

  • @demensdeum_live
    @demensdeum_live8 жыл бұрын

    Good thing that his is russian, i can understand what he says perfectly)

  • @jganer
    @jganer7 жыл бұрын

    21:32 you lost the kid LOL!

  • @avichalsharma3856
    @avichalsharma38568 жыл бұрын

    Where can I learn "what a binary program looks like, how to disassemble it, how to figure out whats on stack..." (as mentioned in 4:20)? Also I wanted to know if it is possible to access the data stored in memory of one program using another program.

  • @RiDankulous

    @RiDankulous

    8 жыл бұрын

    +Avichal Sharma A book called 'Practical Malware Analysis' allows you do to this. It has great reviews and will show you how to analyze any program, not just malware. It focuses on x86 Windows platform. It is very dense with information and has labs you can do set up a machine with teh tools.

  • @ArshadDanish
    @ArshadDanish7 жыл бұрын

    i dont see number 5 in play list

  • @mohamedfouad2304

    @mohamedfouad2304

    5 жыл бұрын

    Arshad Danish classified

  • @mohamedfouad2304
    @mohamedfouad23045 жыл бұрын

    Where are the lab handouts???

  • @mitocw

    @mitocw

    5 жыл бұрын

    The course materials are available on MIT OpenCourseWare at: ocw.mit.edu/6-858F14. Best wishes on your studies!

  • @amalcidhu3745
    @amalcidhu37452 ай бұрын

    Playlist length: 29 Hours, 44 Minutes, 16 seconds

  • @lolaplolap1
    @lolaplolap16 жыл бұрын

    52:22