CS 450/650 Fundamentals of Integrated Computer Security Lecture 1 Introduction CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini
Trustworthy Systems Trustworthiness = Reliability + Security + Privacy + Usability CS 450/650 Fundamentals of Integrated Computer Security
The Role of Security Security is like adding brakes to cars. The purpose of brakes is not to stop you; it is to enable you to go faster. Brakes help avoid accidents caused by mechanical failures in other cars, rude drivers, and road hazards. Better security is an enabler for greater freedom and confidence in the Cyber world. CS 450/650 Fundamentals of Integrated Computer Security
Computer-Based System Hardware Software Data Vulnerability Weakness (to be exploited) Threat Circumstances (Potential to cause harm) Attack Exploits vulnerabilities CS 450/650 Fundamentals of Integrated Computer Security
Control Protective measure Action, device, procedure, or technique that removes or reduces a vulnerability CS 450/650 Fundamentals of Integrated Computer Security
Threats Interception Interruption Modification Fabrication Unauthorized party has gained access to an asset Interruption An asset becomes lost, unavailable, or unusable Modification Unauthorized party tampers with an asset Fabrication Unauthorized party may create objects CS 450/650 Fundamentals of Integrated Computer Security
Security Goals Assets are accessed only by authorized people Confidentiality Integrity Availability Assets are accessible to authorized people Assets can be modified only by authorized people CS 450/650 Fundamentals of Integrated Computer Security