La descarga está en progreso. Por favor, espere

La descarga está en progreso. Por favor, espere

CS 450/650 Fundamentals of Integrated Computer Security

Presentaciones similares


Presentación del tema: "CS 450/650 Fundamentals of Integrated Computer Security"— Transcripción de la presentación:

1 CS 450/650 Fundamentals of Integrated Computer Security
Lecture 1 Introduction CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini

2 Trustworthy Systems Trustworthiness = Reliability + Security + Privacy + Usability Meetings of Pres. Bush and Pres. Fox have focused on a Common Development Agenda Partnership for prosperity was launched in 2002 and aims to build Mexico’s strong regional development efforts, increased macroeconomic stability, and gowing international trade and investment by developing new strategies to foster growth in less developed areas of Mexico En marzo de 2002, el Presidente Bush y el Presidente Fox anunciaron en Monterrey la Sociedad para la Prosperidad, un plan creado para promover el desarrollo económico de México. Él Presidente Bush dijo: "Los recursos naturales más importantes de una nación están en las mentes y las capacidades y el espíritu emprendedor de sus ciudadanos". CS 450/650 Fundamentals of Integrated Computer Security

3 The Role of Security Security is like adding brakes to cars.
The purpose of brakes is not to stop you; it is to enable you to go faster. Brakes help avoid accidents caused by mechanical failures in other cars, rude drivers, and road hazards. Better security is an enabler for greater freedom and confidence in the Cyber world. CS 450/650 Fundamentals of Integrated Computer Security

4 Computer-Based System
Hardware Software Data Vulnerability Weakness (to be exploited) Threat Circumstances (Potential to cause harm) Attack Exploits vulnerabilities CS 450/650 Fundamentals of Integrated Computer Security

5 Control Protective measure
Action, device, procedure, or technique that removes or reduces a vulnerability CS 450/650 Fundamentals of Integrated Computer Security

6 Threats Interception Interruption Modification Fabrication
Unauthorized party has gained access to an asset Interruption An asset becomes lost, unavailable, or unusable Modification Unauthorized party tampers with an asset Fabrication Unauthorized party may create objects CS 450/650 Fundamentals of Integrated Computer Security

7 Security Goals Assets are accessed only by authorized people
Confidentiality Integrity Availability Assets are accessible to authorized people Assets can be modified only by authorized people CS 450/650 Fundamentals of Integrated Computer Security


Descargar ppt "CS 450/650 Fundamentals of Integrated Computer Security"

Presentaciones similares


Anuncios Google