SlideShare a Scribd company logo
1 of 11
CRYPTOGRAPHY AND CYBER
SECURITY
Computer Security
Concepts
A definition of computer security
 Computer security: The protection
afforded to an automated information
system in order to attain the applicable
objectives of preserving the integrity,
availability and confidentiality of
information system resources (includes
hardware, software, firmware,
information/data, and
telecommunications)
NIST 1995
Three key objectives (the CIA triad)
 Confidentiality
 Data confidentiality: Assures that confidential
information is not disclosed to unauthorized
individuals
 Privacy: Assures that individual control or influence
what information may be collected and stored
 Integrity
 Data integrity: assures that information and
programs are changed only in a specified and
authorized manner
 System integrity: Assures that a system performs its
operations in unimpaired manner
 Availability: assure that systems works
promptly and service is not denied to
authorized users
Other concepts to a complete
security picture
 Authenticity: the property of being
genuine and being able to be verified and
trusted; confident in the validity of a
transmission, or a message, or its
originator
 Accountability: generates the
requirement for actions of an entity to be
traced uniquely to that individual to
support nonrepudiation, deference, fault
isolation, etc
COMPUTER SECURITY
CONCEPTS
Levels of security breach impact
 Low: the loss will have a limited impact,
e.g., a degradation in mission or minor
damage or minor financial loss or minor
harm
 Moderate: the loss has a serious effect,
e.g., significance degradation on mission
or significant harm to individuals but no
loss of life or threatening injuries
 High: the loss has severe or catastrophic
adverse effect on operations,
organizational assets or on individuals
(e.g., loss of life)
Examples of security requirements:
Confidentiality
 Student grade information is an asset
whose confidentiality is considered to be
very high
 The US FERPA Act: grades should only be
available to students, their parents, and their
employers (when required for the job)
 Student enrollment information: may
have moderate confidentiality rating; less
damage if enclosed
 Directory information: low confidentiality
rating; often available publicly
Examples of security requirements:
Integrity
 A hospital patient’s allergy information
(high integrity data): a doctor should be
able to trust that the info is correct and
current
 If a nurse deliberately falsifies the data, the
database should be restored to a trusted
basis and the falsified information traced
back to the person who did it
 Inaccurate information could result in
serious harm or death to a patient and
expose the hospital to massive liability
Examples of security requirements:
Availability
 A system that provides authentication: high availability
requirement
 If customers cannot access resources, the loss of services could
result in financial loss
 A public website for a university: a moderate availably
requirement; not critical but causes embarrassment
 Web site provides information for current and
prospective students and donors
 Unavailability cause some embarrassment
 An online telephone directory lookup: a low availability
requirement because unavailability is mostly annoyance
(there are alternative sources such as hardcopy directory)
Challenges of computer security
1. Computer security is not simple
2. One must consider potential (unexpected) attacks
3. Procedures used are often counter-intuitive
4. Must decide where to deploy mechanisms
5. Involve algorithms and secret info (keys)
6. A battle of wits between attacker / admin
7. It is not perceived on benefit until fails
8. Requires constant monitoring
9. Too often an after-thought (not integral)
10. Regarded as impediment to using system

More Related Content

Similar to CCS TOPIC 1.pptx

Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01
ITNet
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1
limsh
 
Database Security—Concepts,Approaches, and ChallengesElisa
Database Security—Concepts,Approaches, and ChallengesElisaDatabase Security—Concepts,Approaches, and ChallengesElisa
Database Security—Concepts,Approaches, and ChallengesElisa
OllieShoresna
 
1 introit security
1 introit security1 introit security
1 introit security
richarddxd
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
stevemeltzer
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
stevemeltzer
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
stevemeltzer
 

Similar to CCS TOPIC 1.pptx (20)

Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01
 
Confidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.pptConfidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.ppt
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1
 
Database Security—Concepts,Approaches, and ChallengesElisa
Database Security—Concepts,Approaches, and ChallengesElisaDatabase Security—Concepts,Approaches, and ChallengesElisa
Database Security—Concepts,Approaches, and ChallengesElisa
 
Introduction to Computer Security
Introduction to Computer SecurityIntroduction to Computer Security
Introduction to Computer Security
 
Enhancing Your Data Security: Closing the Gap on Unsecured Communications
Enhancing Your Data Security: Closing the Gap on Unsecured CommunicationsEnhancing Your Data Security: Closing the Gap on Unsecured Communications
Enhancing Your Data Security: Closing the Gap on Unsecured Communications
 
1 introit security
1 introit security1 introit security
1 introit security
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
Data security
Data securityData security
Data security
 
Website security
Website securityWebsite security
Website security
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information Security
 
PPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptxPPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptx
 
Healthcare and Cyber security
Healthcare and Cyber securityHealthcare and Cyber security
Healthcare and Cyber security
 
Threats of E-Commerce in Database
Threats of E-Commerce in DatabaseThreats of E-Commerce in Database
Threats of E-Commerce in Database
 
Introduction of network security
Introduction of network securityIntroduction of network security
Introduction of network security
 
CS-1,2.pdf
CS-1,2.pdfCS-1,2.pdf
CS-1,2.pdf
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
 
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
 

Recently uploaded

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 

Recently uploaded (20)

Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 

CCS TOPIC 1.pptx

  • 3. A definition of computer security  Computer security: The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications) NIST 1995
  • 4. Three key objectives (the CIA triad)  Confidentiality  Data confidentiality: Assures that confidential information is not disclosed to unauthorized individuals  Privacy: Assures that individual control or influence what information may be collected and stored  Integrity  Data integrity: assures that information and programs are changed only in a specified and authorized manner  System integrity: Assures that a system performs its operations in unimpaired manner  Availability: assure that systems works promptly and service is not denied to authorized users
  • 5. Other concepts to a complete security picture  Authenticity: the property of being genuine and being able to be verified and trusted; confident in the validity of a transmission, or a message, or its originator  Accountability: generates the requirement for actions of an entity to be traced uniquely to that individual to support nonrepudiation, deference, fault isolation, etc
  • 7. Levels of security breach impact  Low: the loss will have a limited impact, e.g., a degradation in mission or minor damage or minor financial loss or minor harm  Moderate: the loss has a serious effect, e.g., significance degradation on mission or significant harm to individuals but no loss of life or threatening injuries  High: the loss has severe or catastrophic adverse effect on operations, organizational assets or on individuals (e.g., loss of life)
  • 8. Examples of security requirements: Confidentiality  Student grade information is an asset whose confidentiality is considered to be very high  The US FERPA Act: grades should only be available to students, their parents, and their employers (when required for the job)  Student enrollment information: may have moderate confidentiality rating; less damage if enclosed  Directory information: low confidentiality rating; often available publicly
  • 9. Examples of security requirements: Integrity  A hospital patient’s allergy information (high integrity data): a doctor should be able to trust that the info is correct and current  If a nurse deliberately falsifies the data, the database should be restored to a trusted basis and the falsified information traced back to the person who did it  Inaccurate information could result in serious harm or death to a patient and expose the hospital to massive liability
  • 10. Examples of security requirements: Availability  A system that provides authentication: high availability requirement  If customers cannot access resources, the loss of services could result in financial loss  A public website for a university: a moderate availably requirement; not critical but causes embarrassment  Web site provides information for current and prospective students and donors  Unavailability cause some embarrassment  An online telephone directory lookup: a low availability requirement because unavailability is mostly annoyance (there are alternative sources such as hardcopy directory)
  • 11. Challenges of computer security 1. Computer security is not simple 2. One must consider potential (unexpected) attacks 3. Procedures used are often counter-intuitive 4. Must decide where to deploy mechanisms 5. Involve algorithms and secret info (keys) 6. A battle of wits between attacker / admin 7. It is not perceived on benefit until fails 8. Requires constant monitoring 9. Too often an after-thought (not integral) 10. Regarded as impediment to using system

Editor's Notes

  1. FERPA: Family Education Right and Privacy Act
  2. FERPA: Family Education Right and Privacy Act
  3. FERPA: Family Education Right and Privacy Act