Security www.AssignmentPoint.com.

Slides:



Advertisements
Similar presentations
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Advertisements

Lecture 1: Overview modified from slides of Lawrie Brown.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Security+ Guide to Network Security Fundamentals
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
1 An Overview of Computer Security computer security.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
CPSC 6126 Computer Security Information Assurance.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
What does “secure” mean? Protecting Valuables
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Cryptography, Authentication and Digital Signatures
29.1 Lecture 29 Security I Based on the Silberschatz & Galvin’s slides And Stallings’ slides.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Dimensions of E – Commerce Security
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 5: Basic Security.
© G. Dhillon Principles of IS Security Security of Technical Systems in Organizations – an introduction.
Chap1: Is there a Security Problem in Computing?.
Lecture 1 Page 1 CS 236 Online What Are Our Security Goals? CIA Confidentiality –If it’s supposed to be a secret, be careful who hears it Integrity –Don’t.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Introduction to Security CS432 – Security in Computing Copyright © 2005, 2009 by Scott Orr and the Trustees of Indiana University.
Introduction to Computer Security
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
1 TMK 264: COMPUTER SECURITY CHAPTER ONE: AN OVERVIEW OF COMPUTER SECURITY.
Is There a Security Problem in Computing?
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
UNIT-4 Computer Security Classification 2 Online Security Issues Overview Computer security – The protection of assets from unauthorized access, use,
Electronic Commerce Semester 1 Term 1 Lecture 14.
Threats, Attacks And Assets… By: Rachael L. Fernandes Roll no:
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Manajemen Jaringan, Sukiswo ST, MT 1 Network Control Sukiswo
Security Issues in Information Technology
CS457 Introduction to Information Security Systems
CS 395: Topics in Computer Security
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Security, Social and Legal Issues Regarding Software and Internet
Issues and Protections
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Threats By Dr. Shadi Masadeh.
CS 450/650 Fundamentals of Integrated Computer Security
Chapter 5 Electronic Commerce | Security
Information and Network Security
NET 311 Information Security
Chapter 5 Electronic Commerce | Security
INFORMATION SYSTEMS SECURITY and CONTROL
Faculty of Science IT Department By Raz Dara MA.
Network Security Ola Flygt Växjö University
Security network management
What Are Our Security Goals?
Mohammad Alauthman Computer Security Mohammad Alauthman
Cyber Security For Civil Engineering
Presentation transcript:

Security www.AssignmentPoint.com

Objectives Cover the fundamental issues in Computer, Data and Network Security www.AssignmentPoint.com

Overview of computer security Introduction to cryptography Discuss Overview of computer security Introduction to cryptography www.AssignmentPoint.com

Information Systems Security Deals with.. Security of end systems Examples: Operating system, files in a host, records,databases, accounting information, logs, etc. Security of information in transit over a network Examples: e-commerce transactions, online banking,confidential e-mails, file transfers, record transfers,authorization messages, etc. www.AssignmentPoint.com

Principles of computer security Principle of easiest penetration: An intruder must be expected to use any available means of penetration.The penetration may not necessarily be by the most obvious means,nor is it necessarily the one against which the most solid defense has been installed. Principle of adequate protection: Computer items must be protected only until they lost their value. www.AssignmentPoint.com

Some terminologies Threat Vulnerability Set of circumstances that has the potential to cause loss or harm Vulnerability a weakness in the security system(in procedures,design and implementation) Control Some protective measures www.AssignmentPoint.com

“A threat is blocked by control of vulnerabilities” www.AssignmentPoint.com

Types of threats Interception Un-authorized party gained access to an asset. For example, Illegal copying of program or data. Wiretapping to obtain data in a network. www.AssignmentPoint.com

Types of threats Interruption an asset of the system become lost, unavailable or unusable. For example, Hardware failure Operating system malfunction Erasure of a program or data file www.AssignmentPoint.com

Types of threats Modification: Not only an-authorized access, but tampers with an asset. For example, Alteration of data www.AssignmentPoint.com

Types of threats Fabrication: Addition of imaginary in information to a system by an un authorized party. For example, addition of a record to an existing database www.AssignmentPoint.com

MOM What does an attacker have? Method—sufficient skill,tools and knowledge to initiate an attack Opportunity– Time and access to accomplish the attack Motive– Why he wants to do that? Must have a reason. www.AssignmentPoint.com

Security goals(CIA) Confidentiality: Keeping data and resources secret or hidden.(secrecy or privacy) Only authorized party can access information. access does not mean write but allows to read, view or print information. www.AssignmentPoint.com

Security goals(CIA) Integrity: Availability: Assets can be modified only by authorized parties or only in authorized ways. Modification includes writing, deleting, creating, changing etc. Availability: Ensuring authorized access to data and resources when desired www.AssignmentPoint.com

Security goals(additional) Authenticity : ensures that the sender of a message is correctly identified, with an assurance that the identity is not false. Non-repudiation: ensures that neither the sender nor the receiver of a message can deny afterwards that it was not he, who send or receive the message. So, Non-repudiation services provide unforgivable evidence that a specific action has occurred www.AssignmentPoint.com

Vulnerabilities Always look for the vulnerabilities that can be the obstacles to reach the security goals Exist in all three major categories of system resources… Hardware vulnerabilities Software vulnerabilities Data vulnerabilities www.AssignmentPoint.com

Hardware vulnerabilities Hardware are always exposed Very easy to occurs Examples.. add/remove devices physically drenched with water dust and ash from cigarette smoke voluntary machine slaughter www.AssignmentPoint.com

Software vulnerabilities Software can be replaced, destroys maliciously,changed, modified,deleted, because of its vulnerabilities. Example—In a banking software, monthly interest on an account is calculated as $14.5467. But,software credits it as $14.54 and ignores $.0067. what can be the result if an attacker modifies this software? www.AssignmentPoint.com

Software vulnerabilities Software deletion: Easy to delete Accidental erasure of a file Software modification : modifications cause software to fail or do unintended task Various categories of software modification includes Logic bomb, Trojan horse,virus,trapdoor etc. Software theft : piracy www.AssignmentPoint.com

Data vulnerabilities Confidentiality Integrity Availability www.AssignmentPoint.com

What is cyber law? Cyber law encompasses a wide variety of political and legal issues related to the Internet and other communications technology, including intellectual property, privacy, freedom of expression, and jurisdiction. www.AssignmentPoint.com