Introduction to Computer Security: Components, Threats, Policies, and Mechanisms
This chapter provides an introduction to computer security, covering the basic components, common threats, policies, and mechanisms. It also discusses operational and human issues in maintaining security.
Introduction to Computer Security: Components, Threats, Policies, and Mechanisms
E N D
Presentation Transcript
Chapter 1: Introduction • Components of computer security • Threats • Policies and mechanisms • Operational Issues • Human Issues
Basic Components (CIA) https://www.researchgate.net/profile/Ali_Aldallal2/post/What_is_information_security/attachment/59d640f979197b807799d189/AS%3A433099327709184%401480270334665/download/opentext-graphic-for-web-information-security-en.jpg
Integrity • Data integrity (integrity, correctness) • Origin integrity (authentication, trustworthiness)
Encrypt text information in music score, each note corresponds to a letter. --- Schott (1608 – 1666) Text Encryption & Image Encryption Image Encryption with SCAN (Bourbakis)
Information Hiding - Examples • APPARENTLY NEUTRAL’S PROTEST IS THOROUGHLY DISCOUNTED AND IGNORED. ISMAN HARD HIT. BLOCKADE ISSUE AFFECTS PRETEXT FOR EMBARGO ON BY-PRODUCTS, EJECTING SUETS AND VEGETABLE OILS. • A message sent by a spy in World War II. • PERSHING SAILS FROM NY JUNE 1. • Extract the second letter from each word.
Information Hiding - Examples (Maniccam & Bourbakis)
Classes of Threats • Threat: potential violation of security; • Attack: the actual violation; • Attacker: people who execute the violation; http://datasmithnetworks.com/site/wp-content/uploads/2016/06/Screen-Shot-2016-06-16-at-10.25.22-AM.png
Classes of Threats • Disclosure: unauthorized access to information • Deception: acceptance of false data • Disruption: interruption or prevention of correct operation • Usurpation: unauthorized control of a part of a system
Policies and Mechanisms http://images.slideplayer.com/15/4818128/slides/slide_4.jpg
Goals of Security https://image.slidesharecdn.com/securing-microservices-151023111758-lva1-app6892/95/beta-securing-microservices-20-638.jpg?cb=1445599262
Types of Mechanisms http://images.slideplayer.com/16/5133500/slides/slide_30.jpg