Definition Of Computer Security

Slides:



Advertisements
Similar presentations
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Advertisements

Cryptography and Network Security Sixth Edition by William Stallings.
Cryptography and Network Security Chapter 1
System integrity The term system integrity has the following meanings: That condition of a system where in its specified operational and technical parameters.
Chapter 1 This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 1: Overview.
Lecture 1: Overview modified from slides of Lawrie Brown.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Editied by R. Newman.
“Network Security” Introduction. My Introduction Obaid Ullah Owais Khan Obaid Ullah Owais Khan B.E (I.T) – Hamdard University(2003), Karachi B.E (I.T)
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
CS 432 Computer and Network Security Spring 2015
C OMPUTER S ECURITY C ONCEPTS By: Qubilah D’souza TE computer.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”.
Cryptography and Network Security Chapter 1
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings.
Introduction (Based on Lecture slides by J. H. Wang)
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
Network Security Essentials Chapter 1
Lecture 1: Overview modified from slides of Lawrie Brown.
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Introduction to Computer and Network Security
Network Security Essentials Chapter 1
Another perspective on Network Security Network Security Essentials: Applications and Standards, 4/E William Stallings ISBN-10: ISBN-13:
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
NETWORK SECURITY. TextBook William Stallings, Cryptography and Network Security: Principles and Practice, ? Edition.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Security in Networks Single point of failure Resillence or fault tolerance CS model.
T.A 2013/2014. Wake Up Call! Malware hijacks your , sends death threats. Found in Japan (Oct 2012) Standford University Recent Network Hack May Cost.
Copyright © 2013 – Curt Hill Computer Security An Overview.
Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.
CST 312 Pablo Breuer. measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
UNIT-4 Computer Security Classification 2 Online Security Issues Overview Computer security – The protection of assets from unauthorized access, use,
COMPUTER SECURITY COMP424 1 ST LECTURE OVERVIEW AND TERMINOLOGIES Dr. Sarah Mustafa Eljack
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Information Management System Ali Saeed Khan 29 th April, 2016.
Network Security Overview
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Information Security Principles course “Cryptology” Based of: “Cryptography and network Security” by William Stalling, 5th edition. Eng. Mohamed Adam Isak.
CS457 Introduction to Information Security Systems
Computer and Network Security
Information Security, Theory and Practice.
COMPUTER SECURITY CONCEPTS
Information Security.
Chapter 1 This chapter provides an overview of computer security. We begin with a discussion of what we mean by computer security. In essence, computer.
Data & Network Security
Network Security Overview
CNET334 - Network Security
BINF 711 Amr El Mougy Sherif Ismail.
Introduction to Computer Security Chapter 1
NET 311 Information Security
Computer and Network Security
Introduction to Computer and Network Security
Another perspective on Network Security
IoTSec Taxonomy Proposal
Introduction to Cryptography
Chapter 4: Security Policies
CS 432/532 Computer and Network Security Spring 2019
Security Mechanisms Network Security.
Digital Signatures Network Security.
Confidentiality, Integrity, Nonrepudiation
A Model For Network Security
Challenges Of Network Security
Impact Of A Security Breach
Message Authentication
Security in Computing, Fifth Edition
Presentation transcript:

Definition Of Computer Security Network Security

Definition Of Computer Security Objectives of the Topic After completing this topic, a student will be able to describe a definition of the computer security.

Definition Of Computer Security Figures and material in this topic have been adapted from “Network Security Essentials: Applications and Standards”, 2014, by William Stallings.

Definition Of Computer Security The National Institute of Standards and Technology (NIST) Computer Security Handbook defines the term computer security as follows:

Definition Of Computer Security The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources.

Definition Of Computer Security Resources include hardware, software, firmware, information/data, and telecommunications.

Definition Of Computer Security Computer Security: Three Key Objectives Confidentiality Integrity Availability

Definition Of Computer Security Confidentiality a) Data confidentiality: Assures that private or confidential information is not made available or disclosed to unauthorized individuals.

Definition Of Computer Security Confidentiality b) Privacy: Assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.

Definition Of Computer Security Integrity a) Data integrity: Assures that information and programs are changed only in a specified and authorized manner.

Definition Of Computer Security Integrity b) System integrity: Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.

Definition Of Computer Security Availability Assures that systems work promptly and service is not denied to authorized users.

Definition Of Computer Security The Security Requirements Triad: CIA Triad

Definition Of Computer Security Possible Additional Concepts: Authenticity Accountability

Definition Of Computer Security Authenticity: The property of being genuine and being able to be verified and trusted. verifying that users are who they say they are and that each input arriving at the system came from a trusted source.

Definition Of Computer Security Accountability: The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity. This supports nonrepudiation, intrusion detection and prevention etc.

Definition Of Computer Security Accountability: Systems must keep records of their activities to permit later forensic analysis to trace security breaches or to aid in transaction disputes. End