SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
SUBJECT NAME: INFORMATION SECURITY
CHAPTER NO.: 1
CHAPTER NAME: COMPUTER SECURITY FUNDAMENTALS
LECTURE NO: 1
COMPUTER SCIENCE
Computer Security Concepts
Definition
The Protection of computer system and information from harm, theft, and unauthorized
use.
The process of preventing and detecting unauthorized use of computer system.
Computer Security
NIST Definition
The protection afforded to an automated information system in order to attain the
applicable objectives of preserving the
• Integrity
• Availability
• Confidentiality
of information system resources (includes hardware, software, firmware,
information/data, and telecommunications).
Computer Security
Types
• Information Security – Securing information from access, modification, and
deletion
• Application Security – Securing application from SQL injection, DDOS, and data
breach
• Computer Security – Securing physical computer machine
• Network Security – Securing both software and hardware technologies of the
network
• Cyber Security – Protecting computer system which communicate over the
network
Computer Security
• Virus – a malicious program which is loaded into computer system without user’s
knowledge. It replicates itself and infects files and program on computer.
• Worms – a software program that can copy itself from one to another computer with
out human interaction. Potential risk is using p computer hard disk space.
• Phishing – attempts to steal sensitive financial or personal information through
fraudulent emails or instant messages.
• Rootkit – is a computer program designed to provide continuous privileged access to a
computer. After tacking control of privileged user, hacker executes files remotely and
change system configurations.
• Key Logger – tracks real time activities of a user.
Computer Security Threats
• Eavesdropping – observes traffic on your system and the work you are doing.
Examples: email, website, and file monitoring.
• Password Attack – finds password of your accounts.
• Dictionary attack
• Brute force
• Key logger
• Shoulder surfing
• Rainbow table
• SQL Injection – injects malicious i/p into SQL statement to get access to database files.
• Social Engineering – Social situation that encourages you to share your password.
Computer Security Threats
1. Confidentiality: means data, objects, and resources are protected from unauthorized access.
• Data confidentiality – assures that private or confidential information is not made
available or disclosed to unauthorized person.
• Privacy – assures that individual control what information is related to them may be
collected, stored, by whom, and to whom information is disclosed.
2. Integrity: data protected from unauthorized modification or changes. Ensures data is reliable
and correct
• Data integrity – assures that data is changed only in a specified manner and authorized
way.
• System integrity – assures that the system performs intended function in an unimpaired
way, free from deliberate / inadvertent unauthorized manipulation of the system.
3. Availability: assures that system work properly and service is not denied to the authorized
users.
Three key objectives of Computer Security
Additional two of the most commonly mentioned objectives are
1. Authenticity – is a property of being genuine , variable, and trusted.
2. Accountability – is a process of mapping action to an identity.
CIA Triad
Three levels of impact on organizations or individuals
1. Low
2. Moderate
3. High
Impact of breach of security
Computer Security Terminology
Adversary (threat agent) – an entity that attacks or is a threat to a system may be a
individuals, systems, or programs. Example: Hacker, organized crime, nation state
Attack – an assault on a system security that drives from an intelligent threat.
Countermeasure – an action, device, procedure or technique that reduces a threat, a
vulnerability, an attack by eliminating or preventing it.
Risk – an expectation of loss expressed as the probability that a particular threat will
exploit a particular vulnerability with a particular harmful result.
Security Policy – a set of rules and practices that specifies / regulate how a system /
organization provides security services to protect system resources.
A Model for Computer Security
Computer Security Terminology
System Resource (Asset) – data contained in a information systems.
Threat – a potential for violation of security or is a possible danger that might exploit a
vulnerability.
Vulnerability – a flaw / weakness in a system design, implementation, operation and
maintenance that could be violated system security.
A Model for Computer Security
System Resource or Asset
1. Hardware
2. Software
3. Data
4. Communication facilities and
networks
A Model for Computer Security
Categories of vulnerabilities
1. Corrupted – does wrong thing
or gives wrong answers.
2. Leaky – information may be
disclosed.
3. Unavailable – system or
network becomes impossible or
impractical.
A Model for Computer Security
Types of Attacks
1. Active attack – an attempt to alter system resources or affect their resources.
2. Passive attack – an attempt to learn or make use of information from the system.
Attacks based on the origin of the attack
1. Inside attack – initiated by an entity inside security perimeter. Insider is
authorized to access system resources but use them in a way not approved.
2. Outside attack - initiated by an entity from outside security perimeter.
Example: Hacker, Terrorist, etc.
A Model for Computer Security

Weitere ähnliche Inhalte

Ähnlich wie 20210629_104540Information Security L1.pdf

PPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptxPPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptxPiBits
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecuritylearnt
 
CH01-CompSec4e.pptx
CH01-CompSec4e.pptxCH01-CompSec4e.pptx
CH01-CompSec4e.pptxams1ams11
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedBule Hora University
 
Protection and security
Protection and securityProtection and security
Protection and securitymbadhi
 
Data information and security unit 1.pdf
Data information and security unit 1.pdfData information and security unit 1.pdf
Data information and security unit 1.pdfdeepakbharathi16
 
security system by desu star chapter 1.pptx
security system by desu star chapter 1.pptxsecurity system by desu star chapter 1.pptx
security system by desu star chapter 1.pptxdesalewminale
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issuesHaseeb Ahmed Awan
 
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavurS.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavurvkarthi314
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)Zara Nawaz
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lectureZara Nawaz
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdfNdheh
 
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...NISHASOMSCS113
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityShafaan Khaliq Bhatti
 
Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01ITNet
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1osama elfar
 

Ähnlich wie 20210629_104540Information Security L1.pdf (20)

PPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptxPPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptx
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
CH01-CompSec4e.pptx
CH01-CompSec4e.pptxCH01-CompSec4e.pptx
CH01-CompSec4e.pptx
 
Ch1 cse
Ch1 cseCh1 cse
Ch1 cse
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Protection and security
Protection and securityProtection and security
Protection and security
 
Data information and security unit 1.pdf
Data information and security unit 1.pdfData information and security unit 1.pdf
Data information and security unit 1.pdf
 
security system by desu star chapter 1.pptx
security system by desu star chapter 1.pptxsecurity system by desu star chapter 1.pptx
security system by desu star chapter 1.pptx
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavurS.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdf
 
Lec 01.pdf
Lec 01.pdfLec 01.pdf
Lec 01.pdf
 
Unit v
Unit vUnit v
Unit v
 
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
 
Module -5 Security.pdf
Module -5 Security.pdfModule -5 Security.pdf
Module -5 Security.pdf
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
 
Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
 

Kürzlich hochgeladen

WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2
 
tonesoftg
tonesoftgtonesoftg
tonesoftglanshi9
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...SelfMade bd
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park masabamasaba
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park masabamasaba
 
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...WSO2
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...masabamasaba
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...masabamasaba
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastPapp Krisztián
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
WSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - KanchanaWSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - KanchanaWSO2
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2
 

Kürzlich hochgeladen (20)

WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AI
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
Abortion Pill Prices Boksburg [(+27832195400*)] 🏥 Women's Abortion Clinic in ...
Abortion Pill Prices Boksburg [(+27832195400*)] 🏥 Women's Abortion Clinic in ...Abortion Pill Prices Boksburg [(+27832195400*)] 🏥 Women's Abortion Clinic in ...
Abortion Pill Prices Boksburg [(+27832195400*)] 🏥 Women's Abortion Clinic in ...
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
WSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - KanchanaWSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - Kanchana
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 

20210629_104540Information Security L1.pdf

  • 1. SUBJECT NAME: INFORMATION SECURITY CHAPTER NO.: 1 CHAPTER NAME: COMPUTER SECURITY FUNDAMENTALS LECTURE NO: 1 COMPUTER SCIENCE
  • 3. Definition The Protection of computer system and information from harm, theft, and unauthorized use. The process of preventing and detecting unauthorized use of computer system. Computer Security
  • 4. NIST Definition The protection afforded to an automated information system in order to attain the applicable objectives of preserving the • Integrity • Availability • Confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications). Computer Security
  • 5. Types • Information Security – Securing information from access, modification, and deletion • Application Security – Securing application from SQL injection, DDOS, and data breach • Computer Security – Securing physical computer machine • Network Security – Securing both software and hardware technologies of the network • Cyber Security – Protecting computer system which communicate over the network Computer Security
  • 6. • Virus – a malicious program which is loaded into computer system without user’s knowledge. It replicates itself and infects files and program on computer. • Worms – a software program that can copy itself from one to another computer with out human interaction. Potential risk is using p computer hard disk space. • Phishing – attempts to steal sensitive financial or personal information through fraudulent emails or instant messages. • Rootkit – is a computer program designed to provide continuous privileged access to a computer. After tacking control of privileged user, hacker executes files remotely and change system configurations. • Key Logger – tracks real time activities of a user. Computer Security Threats
  • 7. • Eavesdropping – observes traffic on your system and the work you are doing. Examples: email, website, and file monitoring. • Password Attack – finds password of your accounts. • Dictionary attack • Brute force • Key logger • Shoulder surfing • Rainbow table • SQL Injection – injects malicious i/p into SQL statement to get access to database files. • Social Engineering – Social situation that encourages you to share your password. Computer Security Threats
  • 8. 1. Confidentiality: means data, objects, and resources are protected from unauthorized access. • Data confidentiality – assures that private or confidential information is not made available or disclosed to unauthorized person. • Privacy – assures that individual control what information is related to them may be collected, stored, by whom, and to whom information is disclosed. 2. Integrity: data protected from unauthorized modification or changes. Ensures data is reliable and correct • Data integrity – assures that data is changed only in a specified manner and authorized way. • System integrity – assures that the system performs intended function in an unimpaired way, free from deliberate / inadvertent unauthorized manipulation of the system. 3. Availability: assures that system work properly and service is not denied to the authorized users. Three key objectives of Computer Security
  • 9. Additional two of the most commonly mentioned objectives are 1. Authenticity – is a property of being genuine , variable, and trusted. 2. Accountability – is a process of mapping action to an identity. CIA Triad
  • 10. Three levels of impact on organizations or individuals 1. Low 2. Moderate 3. High Impact of breach of security
  • 11. Computer Security Terminology Adversary (threat agent) – an entity that attacks or is a threat to a system may be a individuals, systems, or programs. Example: Hacker, organized crime, nation state Attack – an assault on a system security that drives from an intelligent threat. Countermeasure – an action, device, procedure or technique that reduces a threat, a vulnerability, an attack by eliminating or preventing it. Risk – an expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result. Security Policy – a set of rules and practices that specifies / regulate how a system / organization provides security services to protect system resources. A Model for Computer Security
  • 12. Computer Security Terminology System Resource (Asset) – data contained in a information systems. Threat – a potential for violation of security or is a possible danger that might exploit a vulnerability. Vulnerability – a flaw / weakness in a system design, implementation, operation and maintenance that could be violated system security. A Model for Computer Security
  • 13. System Resource or Asset 1. Hardware 2. Software 3. Data 4. Communication facilities and networks A Model for Computer Security
  • 14. Categories of vulnerabilities 1. Corrupted – does wrong thing or gives wrong answers. 2. Leaky – information may be disclosed. 3. Unavailable – system or network becomes impossible or impractical. A Model for Computer Security
  • 15. Types of Attacks 1. Active attack – an attempt to alter system resources or affect their resources. 2. Passive attack – an attempt to learn or make use of information from the system. Attacks based on the origin of the attack 1. Inside attack – initiated by an entity inside security perimeter. Insider is authorized to access system resources but use them in a way not approved. 2. Outside attack - initiated by an entity from outside security perimeter. Example: Hacker, Terrorist, etc. A Model for Computer Security