SlideShare a Scribd company logo
1 of 13
Computer Security I
Unit 1: Introduction to Computer Security
Objectives
Overview

of Computer Security
Highlight the principles of Computer
Security
Evaluate the types of computer assets
and the threats, vulnerabilities and risks
associated with each
Computer Security
What

is it?

◦ Computer Security is the science of managing
malicious intent and behaviour that involves
information and communication technology.
◦ Malicious Behaviour includes
 Fraud/Theft – Unauthorised access to $$ (credit
card, goods, services etc.)
 Vandalism – Causing damage for personal reasons
 Terrorism
 Espionage – Stealing information to gain
competitive advantage
 Sabotage – Causing damage to gain competitive
advantage
 Spam – unsolicited marketing wasting
time/resources
Where

is computer security a concern?

◦ In the business environment: Cash flow,
competitive advantage, commercial image,
reputation
◦ In the military environment: Access to
weapons, communication secrecy
◦ In the medical environment: Patient records,
equipment safety, treatment info.
◦ In the household: Burglar alarms, utility bills
Principles of Computer Security
The

top aspects of computer security are the
preservation of:
◦ Confidentiality: Ensuring that ONLY authorized
persons can access the information
◦ Integrity: safeguarding the accuracy of
information by ensuring that ONLY authorized
persons are able to modify the information
◦ Availability: Ensuring that if you are an
authorized person, information should be
accessible to you whenever required.
Assets, Threats, Vulnerabilities,
Risks, Countermeasures
What

are they?
◦ Asset: A useful or valuable thing. May include
hardware, software, documentation, data,
communications, environment and people.
◦ Threat: Intention to inflict injury or damage.
Potential to cause loss or harm. May include
users, terrorist, hackers, criminals, motivated
groups, acts of God
Vulnerability: Is a weakness that might be
exploited to cause loss or harm. May include
the ability to be exposed, stolen, lost, deleted,
contain s/ware bugs
Risk: Is a potential problem that a system or its
user may experience. An asset is usually at risk
when a threat exploits its vulnerabilities.
Countermeasure: Procedures / Processess
put in place to reduce or mitigate or
control a risk. Countermeasures seek to
do the following:

Reduce the threat

Reduce the vulnerability

Reduce the impact

Detect a hostile event

Recover from an event
A risk management model is used to manage
threats
Assets

Vulnerabilities

Risk

Countermeasures

Aftercare

Threats
Risk Assessment
A risk matrix is used to evaluate the threat and
countermeasure.
High Expectancy
Control & Contain

Prevention

Low
Impact

High
Impact

Live with

Contingency
Plan or
Insurance

Low Expectancy
Summary

More Related Content

What's hot

Cyber Crime - What is it?
Cyber Crime - What is it?Cyber Crime - What is it?
Cyber Crime - What is it?Sovan Sinha
 
Cyber crime DAV Vasant Kunj New Delhi
Cyber crime   DAV Vasant Kunj New DelhiCyber crime   DAV Vasant Kunj New Delhi
Cyber crime DAV Vasant Kunj New DelhiNamita Jain
 
BCS ITNow 201406 - The Risk Business
BCS ITNow 201406 - The Risk BusinessBCS ITNow 201406 - The Risk Business
BCS ITNow 201406 - The Risk BusinessGareth Niblett
 
Information security
Information security Information security
Information security razendar79
 
introduction to information security
introduction to information security introduction to information security
introduction to information security ahmed sami
 
Introduction to information security - by Ivan Nganda
Introduction to information security - by Ivan NgandaIntroduction to information security - by Ivan Nganda
Introduction to information security - by Ivan NgandaSee You Rise Holdings
 
Information security principles an understanding
Information security principles an understandingInformation security principles an understanding
Information security principles an understandingHelpWithAssignment.com
 
Multimedia content security in file based environments - sami guirguis
Multimedia content security in file based environments - sami guirguisMultimedia content security in file based environments - sami guirguis
Multimedia content security in file based environments - sami guirguissamis
 
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!Kevin Fisher
 
Chapter 4 Risk Management.pptx
Chapter 4 Risk Management.pptxChapter 4 Risk Management.pptx
Chapter 4 Risk Management.pptxShruthi48
 
DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015T. J. Saotome
 

What's hot (16)

Cyber Crime - What is it?
Cyber Crime - What is it?Cyber Crime - What is it?
Cyber Crime - What is it?
 
Cyber crime DAV Vasant Kunj New Delhi
Cyber crime   DAV Vasant Kunj New DelhiCyber crime   DAV Vasant Kunj New Delhi
Cyber crime DAV Vasant Kunj New Delhi
 
BCS ITNow 201406 - The Risk Business
BCS ITNow 201406 - The Risk BusinessBCS ITNow 201406 - The Risk Business
BCS ITNow 201406 - The Risk Business
 
Networks
NetworksNetworks
Networks
 
Irm 8-blackmail
Irm 8-blackmailIrm 8-blackmail
Irm 8-blackmail
 
Information security
Information security Information security
Information security
 
introduction to information security
introduction to information security introduction to information security
introduction to information security
 
Introduction to information security - by Ivan Nganda
Introduction to information security - by Ivan NgandaIntroduction to information security - by Ivan Nganda
Introduction to information security - by Ivan Nganda
 
Information security principles an understanding
Information security principles an understandingInformation security principles an understanding
Information security principles an understanding
 
Internet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wallInternet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wall
 
Multimedia content security in file based environments - sami guirguis
Multimedia content security in file based environments - sami guirguisMultimedia content security in file based environments - sami guirguis
Multimedia content security in file based environments - sami guirguis
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum 2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
IBM X-Force Research
IBM X-Force ResearchIBM X-Force Research
IBM X-Force Research
 
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
 
Chapter 4 Risk Management.pptx
Chapter 4 Risk Management.pptxChapter 4 Risk Management.pptx
Chapter 4 Risk Management.pptx
 
DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015
 

Viewers also liked

Scripting on RouterBOARD
Scripting on RouterBOARDScripting on RouterBOARD
Scripting on RouterBOARDYousuke Saki
 
異能vationの研究計画概要
異能vationの研究計画概要異能vationの研究計画概要
異能vationの研究計画概要Yousuke Saki
 
RouterBOARDで無線LANメッシュを構築してみよう
RouterBOARDで無線LANメッシュを構築してみようRouterBOARDで無線LANメッシュを構築してみよう
RouterBOARDで無線LANメッシュを構築してみようYousuke Saki
 
RouterBOARD はじめの一歩
RouterBOARD はじめの一歩RouterBOARD はじめの一歩
RouterBOARD はじめの一歩Yousuke Saki
 
Naturopath Presentation
Naturopath Presentation Naturopath Presentation
Naturopath Presentation mikinatural
 
Globalization & managing change
Globalization & managing changeGlobalization & managing change
Globalization & managing changeKomal Sahi
 
Emotional intelligence
Emotional intelligenceEmotional intelligence
Emotional intelligenceKomal Sahi
 
Ch2 Human Resource Policies and Strategies
Ch2 Human Resource Policies and StrategiesCh2 Human Resource Policies and Strategies
Ch2 Human Resource Policies and StrategiesKomal Sahi
 
Strategic management process of HDFC Bank
Strategic management process of HDFC BankStrategic management process of HDFC Bank
Strategic management process of HDFC BankKomal Sahi
 
ネットブックに Windows 7 を入れてみた
ネットブックに Windows 7 を入れてみたネットブックに Windows 7 を入れてみた
ネットブックに Windows 7 を入れてみたYousuke Saki
 
開発環境によるGUIの違い
開発環境によるGUIの違い開発環境によるGUIの違い
開発環境によるGUIの違いYousuke Saki
 
車載PCとWindows
車載PCとWindows車載PCとWindows
車載PCとWindowsYousuke Saki
 
TYPES OF INTERVIEWS
TYPES OF INTERVIEWSTYPES OF INTERVIEWS
TYPES OF INTERVIEWSKomal Sahi
 
Afrapportering: 2. designaktivitet
Afrapportering: 2. designaktivitetAfrapportering: 2. designaktivitet
Afrapportering: 2. designaktivitetarnekaas
 
Registro de cuentas de Miriam Esteban
Registro de cuentas de Miriam EstebanRegistro de cuentas de Miriam Esteban
Registro de cuentas de Miriam EstebanMiriamEsteban
 

Viewers also liked (18)

Scripting on RouterBOARD
Scripting on RouterBOARDScripting on RouterBOARD
Scripting on RouterBOARD
 
異能vationの研究計画概要
異能vationの研究計画概要異能vationの研究計画概要
異能vationの研究計画概要
 
RouterBOARDで無線LANメッシュを構築してみよう
RouterBOARDで無線LANメッシュを構築してみようRouterBOARDで無線LANメッシュを構築してみよう
RouterBOARDで無線LANメッシュを構築してみよう
 
RouterBOARD はじめの一歩
RouterBOARD はじめの一歩RouterBOARD はじめの一歩
RouterBOARD はじめの一歩
 
Naturopath Presentation
Naturopath Presentation Naturopath Presentation
Naturopath Presentation
 
Globalization & managing change
Globalization & managing changeGlobalization & managing change
Globalization & managing change
 
Emotional intelligence
Emotional intelligenceEmotional intelligence
Emotional intelligence
 
Ch2 Human Resource Policies and Strategies
Ch2 Human Resource Policies and StrategiesCh2 Human Resource Policies and Strategies
Ch2 Human Resource Policies and Strategies
 
Brand tracking
Brand trackingBrand tracking
Brand tracking
 
Strategic management process of HDFC Bank
Strategic management process of HDFC BankStrategic management process of HDFC Bank
Strategic management process of HDFC Bank
 
ネットブックに Windows 7 を入れてみた
ネットブックに Windows 7 を入れてみたネットブックに Windows 7 を入れてみた
ネットブックに Windows 7 を入れてみた
 
開発環境によるGUIの違い
開発環境によるGUIの違い開発環境によるGUIの違い
開発環境によるGUIの違い
 
車載PCとWindows
車載PCとWindows車載PCとWindows
車載PCとWindows
 
TYPES OF INTERVIEWS
TYPES OF INTERVIEWSTYPES OF INTERVIEWS
TYPES OF INTERVIEWS
 
Afrapportering: 2. designaktivitet
Afrapportering: 2. designaktivitetAfrapportering: 2. designaktivitet
Afrapportering: 2. designaktivitet
 
Examen tic te47
Examen tic te47Examen tic te47
Examen tic te47
 
Registro de cuentas de Miriam Esteban
Registro de cuentas de Miriam EstebanRegistro de cuentas de Miriam Esteban
Registro de cuentas de Miriam Esteban
 
MIRIAM ESTEBAN
MIRIAM ESTEBANMIRIAM ESTEBAN
MIRIAM ESTEBAN
 

Similar to Lecture1 intro to cs

Computer security ppt for computer science student.pptx
Computer security ppt for computer science student.pptxComputer security ppt for computer science student.pptx
Computer security ppt for computer science student.pptxdagiabebe267
 
E sec chaptr-1
E sec chaptr-1E sec chaptr-1
E sec chaptr-1123aleena
 
Ch07 Managing Risk
Ch07 Managing RiskCh07 Managing Risk
Ch07 Managing Riskphanleson
 
Introduction to Computer Security
Introduction to Computer SecurityIntroduction to Computer Security
Introduction to Computer SecurityKamal Acharya
 
Management Information Systems
Management Information SystemsManagement Information Systems
Management Information Systemsmsd11
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security BackgroundNicholas Davis
 
Information security background
Information security backgroundInformation security background
Information security backgroundNicholas Davis
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksMatthew Rosenquist
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Data Breaches and Prevention of the Data breaches
Data Breaches and Prevention of the Data breachesData Breaches and Prevention of the Data breaches
Data Breaches and Prevention of the Data breachesDeepakDeepu503835
 
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.IGN MANTRA
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overviewdr_edw777
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxTikdiPatel
 
IT Security & Risk
IT Security & Risk IT Security & Risk
IT Security & Risk Tanujpandey5
 
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...Morakinyo Animasaun
 
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNBAtlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNBDavid Shipley
 

Similar to Lecture1 intro to cs (20)

Computer security ppt for computer science student.pptx
Computer security ppt for computer science student.pptxComputer security ppt for computer science student.pptx
Computer security ppt for computer science student.pptx
 
E sec chaptr-1
E sec chaptr-1E sec chaptr-1
E sec chaptr-1
 
Ch07 Managing Risk
Ch07 Managing RiskCh07 Managing Risk
Ch07 Managing Risk
 
Introduction to Computer Security
Introduction to Computer SecurityIntroduction to Computer Security
Introduction to Computer Security
 
Management Information Systems
Management Information SystemsManagement Information Systems
Management Information Systems
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Information security background
Information security backgroundInformation security background
Information security background
 
Security - Chapter 1.ppt
Security - Chapter 1.pptSecurity - Chapter 1.ppt
Security - Chapter 1.ppt
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity Risks
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Data Breaches and Prevention of the Data breaches
Data Breaches and Prevention of the Data breachesData Breaches and Prevention of the Data breaches
Data Breaches and Prevention of the Data breaches
 
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
Cissp combined notes
Cissp combined notesCissp combined notes
Cissp combined notes
 
Cyber Security Briefing
Cyber Security BriefingCyber Security Briefing
Cyber Security Briefing
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
 
IT Security & Risk
IT Security & Risk IT Security & Risk
IT Security & Risk
 
1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf
 
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
 
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNBAtlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
 

Recently uploaded

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Lecture1 intro to cs

  • 1. Computer Security I Unit 1: Introduction to Computer Security
  • 2. Objectives Overview of Computer Security Highlight the principles of Computer Security Evaluate the types of computer assets and the threats, vulnerabilities and risks associated with each
  • 3. Computer Security What is it? ◦ Computer Security is the science of managing malicious intent and behaviour that involves information and communication technology. ◦ Malicious Behaviour includes  Fraud/Theft – Unauthorised access to $$ (credit card, goods, services etc.)  Vandalism – Causing damage for personal reasons  Terrorism
  • 4.  Espionage – Stealing information to gain competitive advantage  Sabotage – Causing damage to gain competitive advantage  Spam – unsolicited marketing wasting time/resources
  • 5. Where is computer security a concern? ◦ In the business environment: Cash flow, competitive advantage, commercial image, reputation ◦ In the military environment: Access to weapons, communication secrecy ◦ In the medical environment: Patient records, equipment safety, treatment info. ◦ In the household: Burglar alarms, utility bills
  • 6. Principles of Computer Security The top aspects of computer security are the preservation of: ◦ Confidentiality: Ensuring that ONLY authorized persons can access the information ◦ Integrity: safeguarding the accuracy of information by ensuring that ONLY authorized persons are able to modify the information ◦ Availability: Ensuring that if you are an authorized person, information should be accessible to you whenever required.
  • 7.
  • 8. Assets, Threats, Vulnerabilities, Risks, Countermeasures What are they? ◦ Asset: A useful or valuable thing. May include hardware, software, documentation, data, communications, environment and people. ◦ Threat: Intention to inflict injury or damage. Potential to cause loss or harm. May include users, terrorist, hackers, criminals, motivated groups, acts of God
  • 9. Vulnerability: Is a weakness that might be exploited to cause loss or harm. May include the ability to be exposed, stolen, lost, deleted, contain s/ware bugs Risk: Is a potential problem that a system or its user may experience. An asset is usually at risk when a threat exploits its vulnerabilities.
  • 10. Countermeasure: Procedures / Processess put in place to reduce or mitigate or control a risk. Countermeasures seek to do the following:  Reduce the threat  Reduce the vulnerability  Reduce the impact  Detect a hostile event  Recover from an event
  • 11. A risk management model is used to manage threats Assets Vulnerabilities Risk Countermeasures Aftercare Threats
  • 12. Risk Assessment A risk matrix is used to evaluate the threat and countermeasure. High Expectancy Control & Contain Prevention Low Impact High Impact Live with Contingency Plan or Insurance Low Expectancy