1. Introduction, Threat Models

Поделиться
HTML-код
  • Опубликовано: 4 фев 2025

Комментарии • 243

  • @AlJey007
    @AlJey007 4 года назад +355

    I am simply blown away by the fact that we can just watch these for free. This is the very definition of quality content.

    • @luqmanhamdan9285
      @luqmanhamdan9285 3 года назад +13

      Man, I just wish to found these earlier in university.

    • @johnpaulsmith5636
      @johnpaulsmith5636 3 года назад +4

      So fascinating story of the corners I'm thinking about the corners order so fascinating

    • @iyadzain6972
      @iyadzain6972 3 года назад

      And imagine some people hate this facts and dislike this Video

    • @yolandadarricarrere2529
      @yolandadarricarrere2529 2 года назад

      Amen!

    • @markoer
      @markoer 2 года назад +1

      Almost all content in information security is free. You just need to find the good one and separate it from junk.

  • @mohammadseraji2088
    @mohammadseraji2088 7 лет назад +66

    This is a clear indication and proof of how MIT secure it's top position in technology education. Thanks to MIT from the bottom of my Heart.

  • @amaresh105
    @amaresh105 9 лет назад +217

    This is truly amazing. I had never been so energetic while listening to lectures. Thanks a lot to the Professor and MIT for making such exciting study materials available online without asking for a single penny in return. :)

    • @beback_
      @beback_ 7 лет назад +3

      Check out their math and basic science courses. They're even better.

    • @vivekmit06
      @vivekmit06 5 лет назад +2

      @@beback_ Can you please provide course name or link for basic math and science courses ?

    • @alileevil
      @alileevil 4 года назад +2

      It’s not free. It’s paid for by either govt grants or private funding.

    • @dirverslicense
      @dirverslicense 4 года назад +3

      @Justin Garcia This is a computer security course, not a philosophy course...

    • @hafhar1344
      @hafhar1344 4 года назад

      @@beback_ Hello, The professor said their is no book in this course but do know if there is anyway that the labs that he mentions, are they by any chance uploaded on you tube?
      I feel very prevliged to be able to take this course online as I am not financially strong to attend in person. But I would be extremely grateful if I could get some guidance in the lab work.

  • @FoxInTheBasement
    @FoxInTheBasement 2 года назад +8

    the fact that he went through the syllabus in 5 minutes blows my mind, my profs often take the full first lecture.

  • @redraider4b40
    @redraider4b40 2 года назад +8

    I am going back to school for my cybersecurity major, and I was just looking for lectures to fall asleep to. This is GOLD.

    • @ddollarz567
      @ddollarz567 6 месяцев назад +2

      I have zero background on cybersecurity can I start learning here with theses lessons ?

    • @manashalder1206
      @manashalder1206 Месяц назад

      ​@@ddollarz567 yes u can

  • @ThatFlyGuy98
    @ThatFlyGuy98 2 года назад +1

    After watching these videos I was able to put mit cyber security course graduate. I then got a job paying $100k a year thankyou !!!

  • @tamojitbasu8634
    @tamojitbasu8634 4 года назад +7

    This is the power of MIT. Amazing lecture on cybersecurity for aspiring students in this field.

  • @christianschafer3724
    @christianschafer3724 7 лет назад +54

    Content starts at 5:43

  • @simaphore
    @simaphore 3 года назад +3

    Thank you for promoting educational equality by making such high quality content available.

  • @Koala_Studio14
    @Koala_Studio14 2 месяца назад +1

    What a great lesson , I am never seem so excited just by watching online course, but the instructor is success giving their material by a fun way ,Thank you MIT you deserve the tittle of the best school in earth.

  • @WhyAnkurGautam
    @WhyAnkurGautam 6 лет назад +14

    Thank you MIT for making those videos online...
    Love from India...!!!

  • @DrJochenLeidner
    @DrJochenLeidner 4 года назад +15

    I recommend the book "Security Engineering" (Ross Anderson, 3rd ed., 2021) as background reading.

    • @Ray-gd6mj
      @Ray-gd6mj 5 месяцев назад

      Thank you :)

  • @mathisawesome618
    @mathisawesome618 7 лет назад +21

    It would be really helpful if their were subtitles for the parts when the students are talking. I think it's really cool that the sound changes but you still can'T really understand them so subtitles would be really helpful. Really great Course, i enjoyed watching this and am looking forward to the next lectures. Thank you

  • @RajaRamz
    @RajaRamz 3 года назад +3

    Thanks to Prof Professor Zeldovich for this amazing lecture, even I have just watched it today, still it makes my mind blown.

  • @dougd120
    @dougd120 4 года назад +3

    This is truly an amazing lecture that details what network security actually is. An amazing way to advertise for a scripting lecture that is very well detailed at that age.

  • @gusgebzz
    @gusgebzz 7 лет назад +163

    The MIT chalk is very smooth.

    • @lseul8812
      @lseul8812 5 лет назад +8

      Its a special Japanese chalk thats going out of production its a huge thing

    • @equim7363
      @equim7363 4 года назад +3

      @@lseul8812 sorry to hear that

    • @paulhetherington3854
      @paulhetherington3854 4 года назад

      CLDZALKX-- This vision, of cells-- not out from. You mentioned, smooth? Man yuck!

  • @johnsonisreal4530
    @johnsonisreal4530 6 лет назад +4

    Start with this course and I'm enjoy it already.

  • @markarca6360
    @markarca6360 2 года назад +1

    One best example is the EMV standard (Europay, MasterCard, Visa), where a unique key is generated for every single transaction (balance inquiry, withdrawal, etc.) based on the chip on the card and the PIN keyed by the user.
    Also, SSL is now deprecated in favor of TLS.

  • @Ak47Hangu
    @Ak47Hangu 3 месяца назад

    Whoever presented the idea id sharing this on RUclips well i praise your mind you are a God man simply the best heart this is a great knowledge n i wish MIT share more and more topics and different problems solutions n alorithms n also different studies knowledge with different subjects its very good 💯❤

  • @lizahquinn4985
    @lizahquinn4985 6 лет назад +4

    This guy is doing a great job of explaining this information. Lucky students!

    • @Haidderispro
      @Haidderispro 3 года назад

      You're getting the same information lucky you!

  • @AndyThomasStaff
    @AndyThomasStaff 8 лет назад +30

    21:40 20 minutes late to class, immortalized online

    • @BaSs_HaXoR
      @BaSs_HaXoR 7 лет назад +3

      If only the Professor said somethin. xD
      He gave em' the eyes.

    • @Ichinin
      @Ichinin 7 лет назад +3

      An employer doing a social search on you will be happy to find this.

    • @pattty847
      @pattty847 7 лет назад +3

      What if the kid's mom blew up, and he still made it to class. Now how will the employer feel?

  • @mohammadseraji2088
    @mohammadseraji2088 7 лет назад +4

    Requesting more recent lectures on the Information System Security

    • @harshsharma9149
      @harshsharma9149 4 года назад

      a bit late, but prof Zeldovich has recorded 2020 lectures

  • @CorporateDrone
    @CorporateDrone 2 года назад +4

    Lecture starts at 5:43

  • @dania_884
    @dania_884 4 года назад

    Nice video in educating of the fundamentals. Buffer overflow and code attach details from around 46'48. Thanks MIT give us the video!

  • @JimmyNgugi
    @JimmyNgugi 7 лет назад +45

    I long to be in such a class.One day,my wish will be granted.
    Greetings from Kenya!

    • @arobidy
      @arobidy 7 лет назад +5

      Greetings from the USA. We'd love to have you!

    • @mohaahmedtahiri1177
      @mohaahmedtahiri1177 6 лет назад +3

      kenyan also;;;; enyewe tunasoma

    • @fredharvey2720
      @fredharvey2720 5 лет назад +2

      Oh boy another migrant.

    • @wahtsfgsgwwwsxq
      @wahtsfgsgwwwsxq 5 лет назад +1

      You are in already! Thanks to MIT!

    • @zoomin9684
      @zoomin9684 5 лет назад +1

      @@fredharvey2720 Are you an Indian?

  • @cmms1234
    @cmms1234 3 года назад +1

    I think technique adapted at MIT is understanding existing setup, Concentrating problems then solutions... That makes student to think continuously

  • @KrishnaDasPC
    @KrishnaDasPC 2 года назад +2

    Truly amazing classes.

  • @quitecontrary.
    @quitecontrary. Год назад +1

    Going to watch this whole playlist thank u

  • @gingarrison104
    @gingarrison104 Год назад +1

    So, they need to study C, assembly, python and Java in the same time? Here is my respect!!!

  • @shinkurt
    @shinkurt 2 года назад

    actually, makes it seem like going to school is not a bad idea when you have professors like this. not really a waste of time.

  • @DocoOne
    @DocoOne 7 лет назад +1

    This style is so on point!

  • @hypercortical7772
    @hypercortical7772 7 лет назад +15

    Lecture begins at 5:40

  • @anthonyover
    @anthonyover 5 лет назад +1

    22:30 is Threat Models

  • @jmafoko
    @jmafoko 2 года назад

    that definition of security is wow

  • @svramanujan
    @svramanujan 2 года назад +1

    Wish Nalanda Was Never Destroyed. This was some A++ stuff.

    • @82h4dheu6
      @82h4dheu6 4 месяца назад

      In the end, It is what is :/

  • @bruce8088
    @bruce8088 5 лет назад +12

    Seems like the coverage of threat models is very brief with this lecture focusing more on threats and vulnerabilities. So if you, like me, were hoping for extended content on threat modeling then I'd recommend a different video.

    • @ovilashmoitra4252
      @ovilashmoitra4252 3 года назад

      have you find any course on the stipulate subject? and if you have would you mind sharing this with me?

  • @corykeilig5183
    @corykeilig5183 8 лет назад +6

    Great examples professor

    • @LoneVocalist
      @LoneVocalist 2 года назад

      Is that his name, professor Examples? Because that's all he did for an hour instead of teaching any threat modeling like the title suggested.

    • @osufwiffo
      @osufwiffo Год назад

      @@LoneVocalist Except, the description, clearly states it's about: `... concept of threat models.` Not "how to write a Threat Model." So he's dead on what he should do, get them excited about it, vs "Dang these will suck, I'm going to hate Info Sec." like most corporate Coders these days.

    • @LoneVocalist
      @LoneVocalist Год назад

      ​@@osufwiffo I'll just copy my other comment here for you:
      This video is a waste of time*, but let me help you waste a little less of your time with timestamps:
      fluff
      5:42 - What is Security?
      more fluff
      15:35 - Policy
      example of a company that got hacked
      example of a company that got hacked
      22:30 - Threat Models
      example of a company that got hacked
      example of a company that got hacked
      29:44 - Mechanisms
      example of a company that got hacked
      example of a company that got hacked
      example of a company that got hacked
      *This video is falsely titled because it's not about threat modeling. There's no threat modeling process presented in the video at all, no mention of STRIDE or DREAD or anything you hope to learn, just a quick verbal summary. Instead the instructor prefers to give tons of examples of hacks at big company and giggle at them. The video spends way more time on buffer overflow than threat modeling. Can't believe people are paying a fortune for this at MIT.

  • @brian-kt1rc
    @brian-kt1rc 7 лет назад +2

    Increase speed in lecture videos its much better

  • @SiddharthSharma-yh1bc
    @SiddharthSharma-yh1bc 5 лет назад

    @59:25 "x86 is little-endian (LSB in lower address), and the stack grows towards lower address." I got confused so just putting it out there

  • @StephenPaulKing
    @StephenPaulKing 8 лет назад +1

    Security can be modeled as the difficulty of creating a simulation of one's
    computations.

  • @musirantv
    @musirantv 2 года назад +1

    the first time I slowed down a lecture :D

    • @janek4024
      @janek4024 Год назад

      when i just turned on the lecture, i thought that i still had 1.5x speed up on yt. the guy is amazing

  • @mwanikastudios
    @mwanikastudios Год назад

    Super amazing content. Just what i need.

  • @taylort3926
    @taylort3926 8 лет назад +10

    Is this course useful for someone who has not taken any sort of computer science course and has little/no experience in coding? Or is there another lecture series I should start with?

    • @mitocw
      @mitocw  8 лет назад +81

      We would recommend you start with 6.00SC and work your way up. (The course sequence to get here would be 6.00SC or 6.01SC or 6.001, 6.002 > 6.004 > 6.033 > 6.858). ocw.mit.edu/courses/electrical-engineering-and-computer-science/ Best wishes on your studies!

    • @taylort3926
      @taylort3926 8 лет назад +4

      Thank you!

    • @stevewu9372
      @stevewu9372 5 лет назад

      @@mitocw I appreciate you guys for sharing collective wisdom with all human beings!

  • @MakerMark
    @MakerMark 8 лет назад

    note to camera person. Don't need to zoom or follow. Just leave it pointed at the board full frame.

  • @mohammedserghini979
    @mohammedserghini979 4 года назад

    thank you very much MITs

  • @bryanmccaffrey1
    @bryanmccaffrey1 9 лет назад +3

    MIT Team,
    Well done. This is fantastic and just in time. In Lecture 1, you mentioned you might hold a tutorial on how to dissect a binary and related items. Did you ever do that? Is there a recording or document describing this? I can't seem to find a good source for this sort of thing (outside of learning IDA Pro). Not a strong programmer so could use the help. Thanks for all the work you do to make this accessible.

    • @c_u_l8er
      @c_u_l8er 8 лет назад +1

      +bryanmccaffrey1 yes. no. see episode 5 for more information @7:30

  • @dewdop
    @dewdop 3 года назад

    Professor has great posture for a CS ;)

  • @aaronurbina1745
    @aaronurbina1745 5 лет назад

    Yup very nice ill make a donation here in a bit . I appriciate you guys very much.

  • @matiassandacz9145
    @matiassandacz9145 4 года назад

    Buffer Overflows 46:20

  • @sivkboi3402
    @sivkboi3402 7 лет назад

    Great lecture with good examples like i-cloud

  • @akintoyeebunlomo2625
    @akintoyeebunlomo2625 3 года назад

    This is very educative..thank you for sharing

  • @berndeckenfels
    @berndeckenfels 4 года назад

    27:22 is that a transparent whiteboard? looks like a monitor behind it turned on.

  • @maximflorov3232
    @maximflorov3232 7 лет назад +2

    Great speaker!Very interesting!!

  • @thandobooi8168
    @thandobooi8168 6 лет назад +1

    loving this course

  • @harrior1
    @harrior1 6 лет назад +1

    Прекрасные лекции! Люблю их больше чем водку! From Russia with love.

  • @w3w3w3
    @w3w3w3 4 года назад

    hmm nice i enjoy this so much and could listen to this all day... i will hahah :)

  • @keyvann7399
    @keyvann7399 2 месяца назад

    hello, thank you for your wonderful video, by any chance do you have any summary of this course ? if anyone have it i will be thank full to share it with me.

    • @mitocw
      @mitocw  2 месяца назад

      Here is the course description:
      6.858 Computer Systems Security is a class about the design and implementation of secure computer systems. Lectures cover threat models, attacks that compromise security, and techniques for achieving security, based on recent research papers. Topics include operating system (OS) security, capabilities, information flow control, language security, network protocols, hardware security, and security in web applications.
      For more info and materials, visit MIT OpenCourseWare at: ocw.mit.edu/6-858F14
      Best wishes on your studies!

  • @RoDrop
    @RoDrop 8 лет назад +5

    Great lecture. Thanks

  • @mohamedfouad2304
    @mohamedfouad2304 6 лет назад +63

    The guy from the hangover movie

  • @dhirajrajofficail8594
    @dhirajrajofficail8594 10 месяцев назад

    I love you sir ji good lecture

  • @fedemolto
    @fedemolto 4 года назад

    Excellent lecture, thx for sharing!

  • @gilbertsenyonjo963
    @gilbertsenyonjo963 5 лет назад

    This is very good content.

  • @zhiyongyao5697
    @zhiyongyao5697 Год назад +1

    great

  • @nachiketathakur697
    @nachiketathakur697 8 лет назад +3

    hey ! Thanks for the wonderful work. I was wondering if this course will be helpful to someone who is targeting to become security analyst?

    • @MrGoldenApe
      @MrGoldenApe 7 лет назад +2

      If you're analysing security and you know nothing about the weapon the attacker will use, how do you prepare? To answer your question, yes.

  • @c_u_l8er
    @c_u_l8er 8 лет назад

    14:41 alright... so, would saying a word like "verb" followed by another word like "object" on a command line interface be considered a thread vector within this model of yours; make sense? 14:50 left 4 even... my password is ummm 15:51uhhh...

    • @c_u_l8er
      @c_u_l8er 8 лет назад

      +metaheap 101 gets(12:00 AM/PM) -> main(53:48 FM)

    • @c_u_l8er
      @c_u_l8er 8 лет назад

      gets(2:56) main(56:00) son of aaa... that one hurt :/

  • @ZahidHasan-cc8tf
    @ZahidHasan-cc8tf 3 года назад

    22:38 how threat models go wrong?

  • @TRECAH
    @TRECAH 8 лет назад

    thank you very much

  • @moshe6501
    @moshe6501 8 лет назад +1

    Can you provide for reference sources citing the three folded security approach (policy, tm and mechanisms)? Regarding the threat model, is there a generally accepted methodology you could mention (preferably free from product bias) specifically advised for system protection endevors ?

  • @khumoyunakhmedov4562
    @khumoyunakhmedov4562 7 лет назад

    really awesome lecture, isn't it? We should propagate this kind of lectures through other medias also

  • @ruchit8762
    @ruchit8762 4 года назад +1

    Thank you very much Nickolai/MIT on simplifying Threat Model..... I found the GDB found a bit difficult to understand as I am not good with C and x86 assembly.. Can you please advise some resources to understand GDB and x86...
    thank you once again for the interesting lecture.

    • @asharbinkhalil
      @asharbinkhalil 2 года назад

      x86 and C are the basics of computer programming, learn it from anywehre

  • @danmendes2749
    @danmendes2749 2 года назад

    Does anyone have any additional information about the DARPA secure OS backdoor story I was not able to find any related material. It is interesting to reflect today dependency confusion attack works.

  • @hamdemon8511
    @hamdemon8511 8 лет назад +2

    you guys need to have an educational auditing service where students can submit papers and programs for grading and take proctored tests for credit. with the glut in the academic labor market and the sheer tonnage of hungry grad students you could farm the grading to the credentialed poor through something like Amazons Mechanical Turk. With all the syllabi, readings, open source systems and even lectures free on line there is no reason student's should have to mortgage themselves for an undergraduate degree. and by the same token there is no reason each class shouldn't have several million student's earning grades.

  • @randythamrin5976
    @randythamrin5976 4 года назад +2

    that is why we need to study in MIT

  • @trinayanbaruah9704
    @trinayanbaruah9704 8 лет назад +3

    Are the course labs accessible for outside MIT students?. Anyone tried?

  • @dpetrov32
    @dpetrov32 3 года назад

    does someone know why LLDB on macOS throws error that it can't disassemle the $ebp+4 adress?

  • @Alex-oh6lj
    @Alex-oh6lj 6 лет назад

    Can anyone explain what he is doing with the code? I don't understand what he is doing. Thanks

  • @hadijajabborhonova9292
    @hadijajabborhonova9292 7 лет назад

    awesome video tutorials :) Thanks for sharing!

  • @zainab6140
    @zainab6140 4 года назад

    Why don't we have normal teachers that explain with such enthusiasm? ☹️

    • @tamojitbasu8634
      @tamojitbasu8634 4 года назад

      Because MIT, Harvard, Oxford etc professors doesn't have egos and attitude.

  • @profesorinformatica7370
    @profesorinformatica7370 7 лет назад +1

    Congratulations excellent videos, could you please change the standard youtube license to creative common license, to be able to download the videos are no ethical dilemma. Thanks a lot for your valuable help.

    • @mitocw
      @mitocw  7 лет назад +1

      You can use these videos without ethical dilemma as long as you follow our Creative Commons license (BY-NC-SA 4.0), see ocw.mit.edu/terms/ for details. The reason we do not use the RUclips Creative Commons license is because it doesn't match our license.

  • @meyerjohannes
    @meyerjohannes 9 лет назад +1

    Fantastic!

  • @eyeLikeCarrots
    @eyeLikeCarrots 4 года назад

    5:50 .... "Secunty"?

  • @mohamedkhalilzouitni3803
    @mohamedkhalilzouitni3803 5 лет назад +1

    Is there any chance of me getting hands on those Lab materials ? I need it.

    • @mohamedkhalilzouitni3803
      @mohamedkhalilzouitni3803 5 лет назад +1

      Actually I just noticed, it's all on the website 😅 I've been saved by me 😁

  • @piffdos
    @piffdos 8 лет назад

    Is there a more detailed explanation of that atoi conversion that writes 0 @ 1:01:00 ?

  • @filippocesana5696
    @filippocesana5696 3 года назад

    Are the labs available anywhere for students who are not enrolled in MIT?

  • @CyberNerd1000
    @CyberNerd1000 6 лет назад

    Great course but the lecture is little too long...this lecture should have been broken down into two parts for class focus optimization. You can also listen to lecture with 2x the speed if you can absorb that fast.

  • @andarkge
    @andarkge 4 года назад

    Come to learn about threat modeling, learned bunch of stuff on assembly and buffer overrun hacks.

  • @mitchtapesthemovie520
    @mitchtapesthemovie520 4 года назад

    Can anyone tell me which paper they assigned to the class?

  • @mustaphaminteh7228
    @mustaphaminteh7228 4 года назад

    Hi i am very interested to be part of this class online, please help me how to connect.

  • @oneblackpanda
    @oneblackpanda 5 лет назад +1

    Any pre-requisite courses for this... am getting lost really quickly

    • @mitocw
      @mitocw  5 лет назад +1

      +Black Panda The syllabus page in the full OCW course site ocw.mit.edu/6-858F14 is where prerequisites are listed. In this case, 6.033 Computer System Engineering is the prerequisite: ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-033-computer-system-engineering-spring-2018/. Good luck with your studies!

  • @Reggae_TCS
    @Reggae_TCS 7 лет назад +2

    is it possible to view the labs for this video?

    • @mitocw
      @mitocw  7 лет назад +6

      Yes, the labs are available on MIT OpenCourseWare at ocw.mit.edu/6-858F14.

  • @lightosx
    @lightosx 5 лет назад

    Should rename this to 1. Introduction, Buffer Overflows

  • @demensdeum_live
    @demensdeum_live 9 лет назад +7

    Good thing that his is russian, i can understand what he says perfectly)

  • @veramentegina
    @veramentegina 5 лет назад

    great lecture! great lecturer! thank you MIT!

  • @gatlinmyer4738
    @gatlinmyer4738 8 лет назад +1

    Please, give us the lab.😢 This is very hard to implement without knowing how to do it.

    • @mitocw
      @mitocw  8 лет назад +7

      The materials that we do have are available at ocw.mit.edu/6-858F14. Hope this helps!

    • @gatlinmyer6976
      @gatlinmyer6976 8 лет назад

      Thank You! This actually helped, that is a first.

    • @jorgediaz6730
      @jorgediaz6730 7 лет назад +1

      MIT OpenCourseWare wow thanks

  • @TeluguHacker
    @TeluguHacker 5 лет назад

    What is most useful lunguage to learn

  • @avichalsharma3856
    @avichalsharma3856 9 лет назад

    Where can I learn "what a binary program looks like, how to disassemble it, how to figure out whats on stack..." (as mentioned in 4:20)?
    Also I wanted to know if it is possible to access the data stored in memory of one program using another program.

  • @amalcidhu3745
    @amalcidhu3745 10 месяцев назад

    Playlist length: 29 Hours, 44 Minutes, 16 seconds

  • @ArshadDanish
    @ArshadDanish 7 лет назад +3

    i dont see number 5 in play list

  • @peterjbright
    @peterjbright 9 лет назад +3

    @53:30:00, the blackboard would be helpfull

    • @mitocw
      @mitocw  9 лет назад +14

      +Peter Bright The lecture notes might be of some help, see the course on MIT OpenCourseWare (ocw.mit.edu/6-858F14) for the materials.

    • @c_u_l8er
      @c_u_l8er 8 лет назад

      +MIT OpenCourseWare any chance the missing course within this series can be made available? else open-source... 2:10

    • @MrQwerty2524
      @MrQwerty2524 7 лет назад

      For future readers: You can see the stack at 55:57

  • @mathssoso4261
    @mathssoso4261 7 лет назад +4

    hi guys,
    does any one have the books going with this courses please?

    • @mitocw
      @mitocw  7 лет назад +10

      There does not seem to be a required textbook for this course. You should look at the Readings section of the course on MIT OpenCourseWare at ocw.mit.edu/6-858F14 for more information.