1 / 7

Lecture 1 Introduction

Lecture 1 Introduction. CS 450/650 Fundamentals of Integrated Computer Security. Slides are modified from Hesham El-Rewini. Trustworthy Systems. Trustworthiness = Reliability + Security + Privacy + Usability. The Role of Security.

nibaw
Download Presentation

Lecture 1 Introduction

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Lecture 1Introduction CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini

  2. Trustworthy Systems Trustworthiness = Reliability + Security + Privacy + Usability CS 450/650 Fundamentals of Integrated Computer Security

  3. The Role of Security • Security is like adding brakes to cars. • The purpose of brakes is not to stop you; • it is to enable you to go faster. • Brakes help avoid accidents caused by mechanical failures in other cars, rude drivers, and road hazards. • Better security is an enabler for greater freedom and confidence in the Cyber world. CS 450/650 Fundamentals of Integrated Computer Security

  4. Computer-Based System • Hardware • Software • Data • Vulnerability • Weakness (to be exploited) • Threat • Circumstances (Potential to cause harm) • Attack • Exploits vulnerabilities CS 450/650 Fundamentals of Integrated Computer Security

  5. Control • Protective measure • Action, device, procedure, or technique that removes or reduces a vulnerability CS 450/650 Fundamentals of Integrated Computer Security

  6. Threats • Interception • Unauthorized party has gained access to an asset • Interruption • An asset becomes lost, unavailable, or unusable • Modification • Unauthorized party tampers with an asset • Fabrication • Unauthorized party may create objects CS 450/650 Fundamentals of Integrated Computer Security

  7. Security Goals Assets are accessed only by authorized people Confidentiality Integrity Availability Assets are accessible to authorized people Assets can be modified only by authorized people CS 450/650 Fundamentals of Integrated Computer Security

More Related