CS 450/650 Fundamentals of Integrated Computer Security

Slides:



Advertisements
Similar presentations
Advanced Networks and Computer Security Curt Carver & Jeff Humphries © 1999 Texas A&M University.
Advertisements

OCTAVESM Process 4 Create Threat Profiles
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Cryptography and Network Security Chapter 1
1 Network Security Ola Flygt Växjö University
Lecture 1: Overview modified from slides of Lawrie Brown.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering.
Lecture 1 Overview.
Network Security PHILADELPHIA UNIVERSITY Ahmad Alghoul Module 1 Introduction: To Information & Security  Modified by :Ahmad Al Ghoul  Philadelphia.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering.
CPSC 6126 Computer Security Information Assurance.
Computer Engineering II Computer and Network Security Rabie A. Ramadan
What does “secure” mean? Protecting Valuables
Lecture 1: Overview modified from slides of Lawrie Brown.
Information Security Dr. Rabie A. Ramadan GUC, Cairo Room C Lecture 1.
Introduction to Computer Security1 Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st semester University of.
29.1 Lecture 29 Security I Based on the Silberschatz & Galvin’s slides And Stallings’ slides.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Network security Network security. Look at the surroundings before you leap.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Information Security What is Information Security?
Chap1: Is there a Security Problem in Computing?.
CSCE 548 Secure Software Development Security Operations.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Linux-vs-Windows Security
Introduction to Security CS432 – Security in Computing Copyright © 2005, 2009 by Scott Orr and the Trustees of Indiana University.
Introduction to Security Dr. John P. Abraham Professor UTPA.
Computer Security By Duncan Hall.
Introduction to Computer Security
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
IT Security CS5493(74293). IT Security Q: Why do you need security? A: To protect assets.
1 TMK 264: COMPUTER SECURITY CHAPTER ONE: AN OVERVIEW OF COMPUTER SECURITY.
1 Certification and Accreditation CS Unit 4:RISK MANAGEMENT Jesus Gonzalez Kalpana Bahunoothula Jocelyne Farah.
Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Computer Security Introduction
CS457 Introduction to Information Security Systems
Cybersecurity First Principles
Security
Information System and Network Security
Secure Software Confidentiality Integrity Data Security Authentication
NET 311 Information Security
SECURITY MECHANISM & E-COMMERCE
Chapter 27 Security Engineering
Network Security Ola Flygt Växjö University
Computer Security Introduction
Lorenzo Biasiolo 3°AI INFORMATION SECURITY.
Security network management
Security in Computing, Fifth Edition
Mohammad Alauthman Computer Security Mohammad Alauthman
Chapter 1 Key Security Terms.
Cyber Security For Civil Engineering
Basic Security Concepts
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

CS 450/650 Fundamentals of Integrated Computer Security Lecture 1 Introduction CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini

Trustworthy Systems Trustworthiness = Reliability + Security + Privacy + Usability CS 450/650 Fundamentals of Integrated Computer Security

The Role of Security Security is like adding brakes to cars. The purpose of brakes is not to stop you; it is to enable you to go faster. Brakes help avoid accidents caused by mechanical failures in other cars, rude drivers, and road hazards. Better security is an enabler for greater freedom and confidence in the Cyber world. CS 450/650 Fundamentals of Integrated Computer Security

Computer-Based System Hardware Software Data Vulnerability Weakness (to be exploited) Threat Circumstances (Potential to cause harm) Attack Exploits vulnerabilities CS 450/650 Fundamentals of Integrated Computer Security

Control Protective measure Action, device, procedure, or technique that removes or reduces a vulnerability CS 450/650 Fundamentals of Integrated Computer Security

Threats Interception Interruption Modification Fabrication Unauthorized party has gained access to an asset Interruption An asset becomes lost, unavailable, or unusable Modification Unauthorized party tampers with an asset Fabrication Unauthorized party may create objects CS 450/650 Fundamentals of Integrated Computer Security

Security Goals Assets are accessed only by authorized people Confidentiality Integrity Availability Assets are accessible to authorized people Assets can be modified only by authorized people CS 450/650 Fundamentals of Integrated Computer Security