1 / 11

Introduction to Computer Security: Components, Threats, Policies, and Mechanisms

This chapter provides an introduction to computer security, covering the basic components, common threats, policies, and mechanisms. It also discusses operational and human issues in maintaining security.

ldeloach
Download Presentation

Introduction to Computer Security: Components, Threats, Policies, and Mechanisms

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 1: Introduction • Components of computer security • Threats • Policies and mechanisms • Operational Issues • Human Issues

  2. Basic Components (CIA) https://www.researchgate.net/profile/Ali_Aldallal2/post/What_is_information_security/attachment/59d640f979197b807799d189/AS%3A433099327709184%401480270334665/download/opentext-graphic-for-web-information-security-en.jpg

  3. Integrity • Data integrity (integrity, correctness) • Origin integrity (authentication, trustworthiness)

  4. Encrypt text information in music score, each note corresponds to a letter. --- Schott (1608 – 1666) Text Encryption & Image Encryption Image Encryption with SCAN (Bourbakis)

  5. Information Hiding - Examples • APPARENTLY NEUTRAL’S PROTEST IS THOROUGHLY DISCOUNTED AND IGNORED. ISMAN HARD HIT. BLOCKADE ISSUE AFFECTS PRETEXT FOR EMBARGO ON BY-PRODUCTS, EJECTING SUETS AND VEGETABLE OILS. • A message sent by a spy in World War II. • PERSHING SAILS FROM NY JUNE 1. • Extract the second letter from each word.

  6. Information Hiding - Examples (Maniccam & Bourbakis)

  7. Classes of Threats • Threat: potential violation of security; • Attack: the actual violation; • Attacker: people who execute the violation; http://datasmithnetworks.com/site/wp-content/uploads/2016/06/Screen-Shot-2016-06-16-at-10.25.22-AM.png

  8. Classes of Threats • Disclosure: unauthorized access to information • Deception: acceptance of false data • Disruption: interruption or prevention of correct operation • Usurpation: unauthorized control of a part of a system

  9. Policies and Mechanisms http://images.slideplayer.com/15/4818128/slides/slide_4.jpg

  10. Goals of Security https://image.slidesharecdn.com/securing-microservices-151023111758-lva1-app6892/95/beta-securing-microservices-20-638.jpg?cb=1445599262

  11. Types of Mechanisms http://images.slideplayer.com/16/5133500/slides/slide_30.jpg

More Related