SlideShare a Scribd company logo
1 of 15
Download to read offline
SUBJECT NAME: INFORMATION SECURITY
CHAPTER NO.: 1
CHAPTER NAME: COMPUTER SECURITY FUNDAMENTALS
LECTURE NO: 1
COMPUTER SCIENCE
Computer Security Concepts
Definition
The Protection of computer system and information from harm, theft, and unauthorized
use.
The process of preventing and detecting unauthorized use of computer system.
Computer Security
NIST Definition
The protection afforded to an automated information system in order to attain the
applicable objectives of preserving the
• Integrity
• Availability
• Confidentiality
of information system resources (includes hardware, software, firmware,
information/data, and telecommunications).
Computer Security
Types
• Information Security – Securing information from access, modification, and
deletion
• Application Security – Securing application from SQL injection, DDOS, and data
breach
• Computer Security – Securing physical computer machine
• Network Security – Securing both software and hardware technologies of the
network
• Cyber Security – Protecting computer system which communicate over the
network
Computer Security
• Virus – a malicious program which is loaded into computer system without user’s
knowledge. It replicates itself and infects files and program on computer.
• Worms – a software program that can copy itself from one to another computer with
out human interaction. Potential risk is using p computer hard disk space.
• Phishing – attempts to steal sensitive financial or personal information through
fraudulent emails or instant messages.
• Rootkit – is a computer program designed to provide continuous privileged access to a
computer. After tacking control of privileged user, hacker executes files remotely and
change system configurations.
• Key Logger – tracks real time activities of a user.
Computer Security Threats
• Eavesdropping – observes traffic on your system and the work you are doing.
Examples: email, website, and file monitoring.
• Password Attack – finds password of your accounts.
• Dictionary attack
• Brute force
• Key logger
• Shoulder surfing
• Rainbow table
• SQL Injection – injects malicious i/p into SQL statement to get access to database files.
• Social Engineering – Social situation that encourages you to share your password.
Computer Security Threats
1. Confidentiality: means data, objects, and resources are protected from unauthorized access.
• Data confidentiality – assures that private or confidential information is not made
available or disclosed to unauthorized person.
• Privacy – assures that individual control what information is related to them may be
collected, stored, by whom, and to whom information is disclosed.
2. Integrity: data protected from unauthorized modification or changes. Ensures data is reliable
and correct
• Data integrity – assures that data is changed only in a specified manner and authorized
way.
• System integrity – assures that the system performs intended function in an unimpaired
way, free from deliberate / inadvertent unauthorized manipulation of the system.
3. Availability: assures that system work properly and service is not denied to the authorized
users.
Three key objectives of Computer Security
Additional two of the most commonly mentioned objectives are
1. Authenticity – is a property of being genuine , variable, and trusted.
2. Accountability – is a process of mapping action to an identity.
CIA Triad
Three levels of impact on organizations or individuals
1. Low
2. Moderate
3. High
Impact of breach of security
Computer Security Terminology
Adversary (threat agent) – an entity that attacks or is a threat to a system may be a
individuals, systems, or programs. Example: Hacker, organized crime, nation state
Attack – an assault on a system security that drives from an intelligent threat.
Countermeasure – an action, device, procedure or technique that reduces a threat, a
vulnerability, an attack by eliminating or preventing it.
Risk – an expectation of loss expressed as the probability that a particular threat will
exploit a particular vulnerability with a particular harmful result.
Security Policy – a set of rules and practices that specifies / regulate how a system /
organization provides security services to protect system resources.
A Model for Computer Security
Computer Security Terminology
System Resource (Asset) – data contained in a information systems.
Threat – a potential for violation of security or is a possible danger that might exploit a
vulnerability.
Vulnerability – a flaw / weakness in a system design, implementation, operation and
maintenance that could be violated system security.
A Model for Computer Security
System Resource or Asset
1. Hardware
2. Software
3. Data
4. Communication facilities and
networks
A Model for Computer Security
Categories of vulnerabilities
1. Corrupted – does wrong thing
or gives wrong answers.
2. Leaky – information may be
disclosed.
3. Unavailable – system or
network becomes impossible or
impractical.
A Model for Computer Security
Types of Attacks
1. Active attack – an attempt to alter system resources or affect their resources.
2. Passive attack – an attempt to learn or make use of information from the system.
Attacks based on the origin of the attack
1. Inside attack – initiated by an entity inside security perimeter. Insider is
authorized to access system resources but use them in a way not approved.
2. Outside attack - initiated by an entity from outside security perimeter.
Example: Hacker, Terrorist, etc.
A Model for Computer Security

More Related Content

Similar to 20210629_104540Information Security L1.pdf

PPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptxPPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptxPiBits
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecuritylearnt
 
CH01-CompSec4e.pptx
CH01-CompSec4e.pptxCH01-CompSec4e.pptx
CH01-CompSec4e.pptxams1ams11
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedBule Hora University
 
Protection and security
Protection and securityProtection and security
Protection and securitymbadhi
 
Data information and security unit 1.pdf
Data information and security unit 1.pdfData information and security unit 1.pdf
Data information and security unit 1.pdfdeepakbharathi16
 
security system by desu star chapter 1.pptx
security system by desu star chapter 1.pptxsecurity system by desu star chapter 1.pptx
security system by desu star chapter 1.pptxdesalewminale
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issuesHaseeb Ahmed Awan
 
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavurS.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavurvkarthi314
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)Zara Nawaz
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lectureZara Nawaz
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdfNdheh
 
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...NISHASOMSCS113
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityShafaan Khaliq Bhatti
 
Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01ITNet
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1osama elfar
 

Similar to 20210629_104540Information Security L1.pdf (20)

PPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptxPPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptx
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
CH01-CompSec4e.pptx
CH01-CompSec4e.pptxCH01-CompSec4e.pptx
CH01-CompSec4e.pptx
 
Ch1 cse
Ch1 cseCh1 cse
Ch1 cse
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Protection and security
Protection and securityProtection and security
Protection and security
 
Data information and security unit 1.pdf
Data information and security unit 1.pdfData information and security unit 1.pdf
Data information and security unit 1.pdf
 
security system by desu star chapter 1.pptx
security system by desu star chapter 1.pptxsecurity system by desu star chapter 1.pptx
security system by desu star chapter 1.pptx
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavurS.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdf
 
Lec 01.pdf
Lec 01.pdfLec 01.pdf
Lec 01.pdf
 
Unit v
Unit vUnit v
Unit v
 
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
 
Module -5 Security.pdf
Module -5 Security.pdfModule -5 Security.pdf
Module -5 Security.pdf
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
 
Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
 

Recently uploaded

Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxnada99848
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 

Recently uploaded (20)

Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptx
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 

20210629_104540Information Security L1.pdf

  • 1. SUBJECT NAME: INFORMATION SECURITY CHAPTER NO.: 1 CHAPTER NAME: COMPUTER SECURITY FUNDAMENTALS LECTURE NO: 1 COMPUTER SCIENCE
  • 3. Definition The Protection of computer system and information from harm, theft, and unauthorized use. The process of preventing and detecting unauthorized use of computer system. Computer Security
  • 4. NIST Definition The protection afforded to an automated information system in order to attain the applicable objectives of preserving the • Integrity • Availability • Confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications). Computer Security
  • 5. Types • Information Security – Securing information from access, modification, and deletion • Application Security – Securing application from SQL injection, DDOS, and data breach • Computer Security – Securing physical computer machine • Network Security – Securing both software and hardware technologies of the network • Cyber Security – Protecting computer system which communicate over the network Computer Security
  • 6. • Virus – a malicious program which is loaded into computer system without user’s knowledge. It replicates itself and infects files and program on computer. • Worms – a software program that can copy itself from one to another computer with out human interaction. Potential risk is using p computer hard disk space. • Phishing – attempts to steal sensitive financial or personal information through fraudulent emails or instant messages. • Rootkit – is a computer program designed to provide continuous privileged access to a computer. After tacking control of privileged user, hacker executes files remotely and change system configurations. • Key Logger – tracks real time activities of a user. Computer Security Threats
  • 7. • Eavesdropping – observes traffic on your system and the work you are doing. Examples: email, website, and file monitoring. • Password Attack – finds password of your accounts. • Dictionary attack • Brute force • Key logger • Shoulder surfing • Rainbow table • SQL Injection – injects malicious i/p into SQL statement to get access to database files. • Social Engineering – Social situation that encourages you to share your password. Computer Security Threats
  • 8. 1. Confidentiality: means data, objects, and resources are protected from unauthorized access. • Data confidentiality – assures that private or confidential information is not made available or disclosed to unauthorized person. • Privacy – assures that individual control what information is related to them may be collected, stored, by whom, and to whom information is disclosed. 2. Integrity: data protected from unauthorized modification or changes. Ensures data is reliable and correct • Data integrity – assures that data is changed only in a specified manner and authorized way. • System integrity – assures that the system performs intended function in an unimpaired way, free from deliberate / inadvertent unauthorized manipulation of the system. 3. Availability: assures that system work properly and service is not denied to the authorized users. Three key objectives of Computer Security
  • 9. Additional two of the most commonly mentioned objectives are 1. Authenticity – is a property of being genuine , variable, and trusted. 2. Accountability – is a process of mapping action to an identity. CIA Triad
  • 10. Three levels of impact on organizations or individuals 1. Low 2. Moderate 3. High Impact of breach of security
  • 11. Computer Security Terminology Adversary (threat agent) – an entity that attacks or is a threat to a system may be a individuals, systems, or programs. Example: Hacker, organized crime, nation state Attack – an assault on a system security that drives from an intelligent threat. Countermeasure – an action, device, procedure or technique that reduces a threat, a vulnerability, an attack by eliminating or preventing it. Risk – an expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result. Security Policy – a set of rules and practices that specifies / regulate how a system / organization provides security services to protect system resources. A Model for Computer Security
  • 12. Computer Security Terminology System Resource (Asset) – data contained in a information systems. Threat – a potential for violation of security or is a possible danger that might exploit a vulnerability. Vulnerability – a flaw / weakness in a system design, implementation, operation and maintenance that could be violated system security. A Model for Computer Security
  • 13. System Resource or Asset 1. Hardware 2. Software 3. Data 4. Communication facilities and networks A Model for Computer Security
  • 14. Categories of vulnerabilities 1. Corrupted – does wrong thing or gives wrong answers. 2. Leaky – information may be disclosed. 3. Unavailable – system or network becomes impossible or impractical. A Model for Computer Security
  • 15. Types of Attacks 1. Active attack – an attempt to alter system resources or affect their resources. 2. Passive attack – an attempt to learn or make use of information from the system. Attacks based on the origin of the attack 1. Inside attack – initiated by an entity inside security perimeter. Insider is authorized to access system resources but use them in a way not approved. 2. Outside attack - initiated by an entity from outside security perimeter. Example: Hacker, Terrorist, etc. A Model for Computer Security