COMPUTER SECURITY CONCEPTS

Slides:



Advertisements
Similar presentations
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Advertisements

1 NIST, FIPS, and you... Bob Grill Medi-Cal ISO July 16, 2009.
Cryptography and Network Security Sixth Edition by William Stallings.
Agenda COBIT 5 Product Family Information Security COBIT 5 content
Cryptography and Network Security Chapter 1
Chapter 1 This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet.
Lecture 1: Overview modified from slides of Lawrie Brown.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
C OMPUTER S ECURITY C ONCEPTS By: Qubilah D’souza TE computer.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
1 Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Lecture 1: Overview modified from slides of Lawrie Brown.
Introduction to Computer and Network Security
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Dimensions of E – Commerce Security
Chapter VII Security Management for an E-Enterprise -Ramyah Rammohan.
Another perspective on Network Security Network Security Essentials: Applications and Standards, 4/E William Stallings ISBN-10: ISBN-13:
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Definitions of Business, E- Business, and Risk  Business: An organization involved in trade of goods and/or services to the consumers  E-Business: Application.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Security in Networks Single point of failure Resillence or fault tolerance CS model.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Copyright © 2013 – Curt Hill Computer Security An Overview.
Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.
CST 312 Pablo Breuer. measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
UNIT-4 Computer Security Classification 2 Online Security Issues Overview Computer security – The protection of assets from unauthorized access, use,
COMPUTER SECURITY COMP424 1 ST LECTURE OVERVIEW AND TERMINOLOGIES Dr. Sarah Mustafa Eljack
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Electronic Commerce Semester 1 Term 1 Lecture 14.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Information Management System Ali Saeed Khan 29 th April, 2016.
Network Security Overview
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Information Security Principles course “Cryptology” Based of: “Cryptography and network Security” by William Stalling, 5th edition. Eng. Mohamed Adam Isak.
CS457 Introduction to Information Security Systems
Computer and Network Security
IT246 introduction to networkS Network Security
Information System and Network Security
Information Security.
Chapter 1 This chapter provides an overview of computer security. We begin with a discussion of what we mean by computer security. In essence, computer.
Introduction The combination of space, time, and strength that must be considered as the basic elements of this theory of defense makes this a fairly complicated.
Network Security Overview
BINF 711 Amr El Mougy Sherif Ismail.
Computer and Network Security
Introduction to Computer and Network Security
Another perspective on Network Security
IoTSec Taxonomy Proposal
Introduction to Cryptography
Mohammad Alauthman Computer Security Mohammad Alauthman
Chapter 4: Security Policies
CS 432/532 Computer and Network Security Spring 2019
Confidentiality, Integrity, Nonrepudiation
Message Authentication
Definition Of Computer Security
Security in Computing, Fifth Edition
Presentation transcript:

COMPUTER SECURITY CONCEPTS DINESH MAHALE  41130

KEY OBJECTIVES 1.CONFIDENTIALITY DATA CONFIDENTIALITY: assures that private or confidential information is not made available or disclosed to unauthorised individuals, PRIVACY: assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed

2.INTEGRITY DATA INTEGRITY: Assures that information and programs are changed only in specific and authorized manner SYSTEM INTEGRITY: Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of system

3.AVAILABILITY Assures that systems work promptly and services is not denied to authorized users THESE THREE CONCEPTS FORM IS OFTEN REFFERED TO AS THE CIA TRIAD CONFIDENTIALITY,INTEGRITY AND AVAILABILITY ARE LISTED AS THE THREE SECURITY OBJECTIVES FOR INFORMATION AND FOR INFORMATION SYSTEMS

FIPS PUB 199 (STANDARDS FOR SECURITY CATEGORIZATION OF FEDRAL INFORMATION AND INFORMATION SYSTEM) provides useful categorization of these three objectives in terms of requirements and the definition of loss of security in each category.

1.CONFIDENTIALITY Preserving authorized restrictions on information access and disclosure ,including means for protecting personal privacy and proprietary information. Loss of confidentiality is the unauthirized disclosure of information

2.INTEGRITY Guarding against improper information modification or destruction. A loss of integrity is the unauthorized modification or destruction of. information

3.AVAILABILITY Ensuring timely and reliable access to and use of information. A loss of availability is the disruption of access to or use of information or an information system.

CIA triad is well established still there are two additional concepts are needed to present the complete picture 1.Authenticity 2.Accountability

1.Authenticity The property of being genuine and being able to be verified and trusted; confidence in the validity of transmission, a message, or message originator. This means verifying that the user are who they say the are and that each input arriving at the system came from a trusted source

2.Accountability The security goal that generates the requirement for action of an entity to be traced uniquely to that entity. This supports nonrepudiation, fault isolation, intrusion detection and prevention, and after action recovery and legal action. This helps to trace a security breach to a responsible party

QUESTIONS (pg 636-637 W.S.) 1.Explain 3 key objectives of security concepts. 2.Explain in brief Authenticity and Accountability 3.Explain in brief three objectives of security concepts in terms of requirements and the definition of loss of security in each category.

THANK YOU 