introduction to security in computing

17
Introduction to Security in Computing 01204427 Computer and Network Security Semester 1, 2011 Lecture #01

Upload: ronda

Post on 14-Feb-2016

43 views

Category:

Documents


0 download

DESCRIPTION

Introduction to Security in Computing. 01204427 Computer and Network Security Semester 1, 2011. Lecture #01. What’s about Security. Why to secure something? Valuable assets to protect How to secure? Place in a safe place Guarding How strong of protection? May implement several layers - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Introduction to Security in Computing

Introduction to Security in Computing

01204427 Computer and Network SecuritySemester 1, 2011

Lecture #01

Page 2: Introduction to Security in Computing

What’s about Security Why to secure something?

Valuable assets to protect How to secure?

Place in a safe place Guarding

How strong of protection? May implement several layers May be complex locks system May need multiple parties to grant access

Page 3: Introduction to Security in Computing

Principle of Adequate Protection

Computer items must be protected to a degree consistent

with their value

Page 4: Introduction to Security in Computing

Security in Computing System Computing System

Collection of HW SW Storage Data People

Page 5: Introduction to Security in Computing

Threats, Controls, and Vulnerabilities

A threat is blocked by control of a vulnerability

Page 6: Introduction to Security in Computing

System Security Threats

Page 7: Introduction to Security in Computing

Security Goals

Page 8: Introduction to Security in Computing

Security Goal: Confidentiality

Only authorized people or system can access protected data

Ensuring the confidentiality can be difficult!

More to concern Access : a single bit or the whole collection? Disclose to other parties prohibit?

Page 9: Introduction to Security in Computing

Security Goal: Integrity Several meanings

Precise Accurate Unmodified Modified in acceptable way Consistent

May cover two or more of above properties

Page 10: Introduction to Security in Computing

Security Goal: Availability Several properties

Present in a usable form Enough capacity to meet the service’s needs Bounded waiting time Completed services in an acceptable period of time

System is well available if :- Timely response to a request Generalized fairly allocate resources Fault tolerance (graceful cessation instead of crash or

abrupt) Easily to be used Concurrency is controlled (simultaneous, deadlock

management, exclusive access)

Page 11: Introduction to Security in Computing

Vulnerabilities of Computing System

Page 12: Introduction to Security in Computing

Some of software modifications Logic Bomb Trojan Virus Trapdoor Information Leaks

Page 13: Introduction to Security in Computing

Security of Data

Page 14: Introduction to Security in Computing

Computer Criminal Armatures Crackers Career Criminals Terrorists

Page 15: Introduction to Security in Computing

Method of Defense Prevent

Blocking the attack Closing the vulnerability

Deter Making the attack harder

Deflect Making another target more attractive

Detect Discover real-time or off-line

Recover From its effects

Page 16: Introduction to Security in Computing

Multiple Controls

Page 17: Introduction to Security in Computing

Q&A