CSC 386 – Computer Security Scott Heggen. Agenda The Foundations of Computer Security.

Slides:



Advertisements
Similar presentations
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Advertisements

CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Course Introduction.
September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Dieter Gollmann Microsoft Research
G53SEC 1 Foundations of Computer Security. G53SEC Overview of Today’s Lecture: Definitions Fundamental Dilemma Data vs. Information Principles of Computer.
Access Control Methodologies
1 Network Security Ola Flygt Växjö University
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
Blekinge Institute of Technology, Sweden
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Applied Cryptography for Network Security
April 1, 2004ECS 235Slide #1 Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational.
Summary of Lecture 1 Security attack types: either by function or by the property being compromised Security mechanism – prevention, detection and reaction.
Henric Johnson1 Network Security /. 2 Outline Attacks, services and mechanisms Security attacks Security services Methods of Defense A model for Internetwork.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Bazara Barry1 Security on Networks and Information Systems Bazara I. A. Barry Department of Computer Science – University of Khartoum
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
CSC 386 – Computer Security Scott Heggen. Database Security How can we minimize the probability of success by attacks like the one shown in the comic?
By Hafez Barghouthi. Agenda Today Terminology(What) Security strategies Prevention – detection – reaction Security objectives Fundamental dilemma of Computer.
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
Web Services Quality Model V2.0 Business Value Quality Group Business Value Quality Cost Suitability Effect Service Measurement Quality Group Service Level.
Introduction to Computer Security1 Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st semester University of.
CSC8320. Outline Content from the book Recent Work Future Work.
© Synergetics Portfolio Security Aspecten.
CSC 386 – Computer Security Scott Heggen. Agenda A last look at OS Security Comparing Windows to Linux.
CSC 386 – Computer Security Scott Heggen. Agenda Do not wait for me; begin working right away Complete the following tasks in your code: Implement the.
10/17/20151 Computer Security Introduction. 10/17/20152 Introduction What is the goal of Computer Security? A first definition: To prevent or detect unauthorized.
Another perspective on Network Security Network Security Essentials: Applications and Standards, 4/E William Stallings ISBN-10: ISBN-13:
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Henric Johnson1 Network Security Henric Johnson Blekinge Institute of Technology, Sweden
Csci5233 computer security & integrity 1 Cryptography: an overview.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
12/18/20151 Computer Security Introduction. 12/18/20152 Basic Components 1.Confidentiality: Concealment of information (prevent unauthorized disclosure.
Network Security Introduction
Jump to first page Internet Security in Perspective Yong Cao December 2000.
Network Security and Cryptography
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Introduction to Network Systems Security Mort Anvari.
Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
SECURITY IN MOBILE NETWORKS Bharat Bhargava CERIAS and Computer Sciences Departments Purdue University, W. Lafayette, IN Supported.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Computer Security Introduction
On-Line Meeting 2 October 25, 2016.
Cryptography: an overview
Chapter 1: Introduction
COMPUTER SECURITY CONCEPTS
Foundation Of Computer Security
Chapter Three Objectives
Chapter 1: Introduction
امنیت شبکه علی فانیان
Lecture 1: Foundation of Network Security
Cryptography: an overview
Computer Security Introduction
Security.
Chapter 4: Security Policies
Confidentiality, Integrity, Nonrepudiation
Definition Of Computer Security
Access Control Evolution and Prospects
Presentation transcript:

CSC 386 – Computer Security Scott Heggen

Agenda The Foundations of Computer Security

Foundations of Computer Security Define computer security

Foundations of Computer Security Classical view of security: Prevention Detection Reaction What’s wrong with this model in the context of computer security?

Foundations of Computer Security A more modern view of security: Confidentiality Unlinkability Anonymity Integrity Availability Denial of service Accountability Authentication Logging Non-repudiation Reliability The big 3!

The Fundamental Dilemma “Security-unaware users have specific security requirements but usually no security expertise”

Data vs. Information What’s the difference?

Security-focused Design Decisions Decision 1: In a given application, should the protection mechanisms in a computer system focus on data, operations, or users?

Security-focused Design Decisions Decision 2: Where in the computing system should a security mechanism be placed?

Man-Machine Scale

Security-focused Design Decisions Decision 3: Do you prefer simplicity – and higher assurance – to a feature-rich security environment, or vice versa? What’s the trade-off?

Security-focused Design Decisions Decision 4: Who should be tasked with defining and enforcing security? A central entity, or the individual components in the system? What’s the trade-off?

Security-focused Design Decisions Decision 5: How can you prevent an attacker from getting access to a layer below the protection mechanism?

Next Class Due: Begin Homework 1 (Due Friday, 8/29) Agenda: Identification and Authentication