Introduction to Computer Security

In: Computers and Technology

Submitted By vipaddis
Words 1194
Pages 5
Introduction to Computer Security

CSE 3482

Introduction to Information/Computer Security
Instructor: N. Vlajic, Winter 2014

Learning Objectives
Upon completion of this material, you should be able to: • Describe the key security requirements of confidentiality, integrity and availability (CIA). • Describe the CNSS security model (McCumber Cube). • Identify today’s most common threats and attacks against information. • Distinguish between different main categories of malware.

Required Reading
Computer Security, Stallings: Chapter 1 Computer Security, Stallings: Chapter 6

Introduction
• Information Technology – technology involving development & use of computer systems & networks for the purpose of processing & distribution of data


in many organizations, information/data is seen as the most valuable asset categories of IT jobs:
 IT administrator - installs, maintains, repairs IT equipment  IT architect - draws up plans for IT systems and how they will be implemented  IT engineer - develops new or upgrades existing IT equipment (software or hardware)  IT manager - oversees other IT employees, has authority to buy technology and plan budgets



Introduction (cont.)
• Information System – entire set of data, software, hardware, networks, people, procedures and policies that deal with processing & distribution of information in an organization


each component has its own strengths, weaknesses, and its own security requirements

information is - stored on computer hardware, - manipulated by software, - transmitted by communication, - used by people - controlled by policies

Introduction (cont.)
• Computer Security vs. Information Security
 

terms are often used interchangeably, but … computer security (aka IT security) is mostly concerned with information in ‘digital form’ information security is concerned with…...

Similar Documents

Introduction to Security

... Introduction Student Name: University of Phoenix IT/244 Intro to IT Security Instructor’s Name: Date: October 28, 2012 Introduction Due in Week One: Give an overview of the company and the security goals to be achieved. 1 Company overview As relates to your selected scenario, give a brief 100- to 200-word overview of the company. Sunica Music and Movies is the company that I have chosen. Working independent of one another, the four locations cannot effectively service their costumer’s needs when it comes to inventory and special items, which is causing the stores to lose money due to the lack of good communication between each of the stores. By not having access to share, any customer information or inventory between the stores costumers are growing tired of the inconvenience. In other words, they do not have the best communications skills. What they are trying to do is make it very simple so that they are able to connect to each other through the internet to a central database so that customers are able to see what is available and what they have in stock. This way the stores will be able to communicate with one another through the internet and to know what is available at the other locations and what items that are being sold in order to keep the more popular items in stock and not waste time or money ordering the items that are not creating positive revenue. 2 Security policy......

Words: 735 - Pages: 3

Computer Security

...Computer Security Victoria M. Deardorff Brevard Community College April 10, 2012 This paper is written as a basic overview of computer security for the non-technical user. This paper is meant to educate the reader on practical steps that can be implemented to secure their home-based computers. Additionally, the reader will be informed of industry and government needs for and methods of computer security. With this information, the reader should gain a better understanding of why agencies and companies have their rules and regulations pertaining to computer security. What do you think when you read or hear the words “computer security”? The word security implies freedom from risk, danger, doubt, anxiety, or fear and invokes a feeling of safety and confidence. As security relates to our computers, you may immediately ask yourself if you have done everything possible to guard your personal computer as well as the information stored on that computer. Also, you may think about the companies with which you do business and ask the same question; have they done everything possible to protect my personal information? The world of computer security or information security, as it is sometimes called, continues to evolve as consumers expand the use of computer systems. “The story of network attacks, bugs, viruses, and criminal actions stretches as far as the computer industry itself. One of the first bugs to develop in a computer system was precisely that: a moth was......

Words: 1938 - Pages: 8

Introductions Into Computers

...In the world of technology and computers, there has always been a way to make programs applications more advanced more simplistic and better than ever before with updates. When everything also is made into the way of life of computers, there’s always one thing to provide out the details and the simplistic trails of operating systems. Without the limitations of these operating systems, many would wonder as a society what could have happened if the operating system was never invented. Without operating systems and computers, things could and would have proceeded into the complications of today and things might not have changed if it wasn’t for the internet and different frustrations of doing many things by hand, but in the ways of introducing technology now is very simplistic. Using computers now in the present have been used as a daily important part of our lives to stay communicated to the world and to the rest of the others in real time. Running on computers have been of choice running operating systems to stay on top of programs and applications to get and take care of the other particles of tasks needed to be done or just for leisure and entertainment. Using operating systems known in short terms for “OS” is all on the society’s choice running what they think is the best for what they can get for the computer. There is all but one OS out of the major ones that is running for free without price, and that would be Linux. In today’s society, there’s a lot that Linux can......

Words: 309 - Pages: 2

Introduction to Security

...CCJS345: Introduction to Security Professor Michael A. Jackson Final Project: Case Study Presented by: James W. Johnson 04 November 2012 Table of Contents Introduction………………………………………………..……………………………………..iii Facility Overview……....…………….……………………………………………...……….......iv Current Crime Prevention and Security Measures in Place............................................................iv Physical Limitations.…………………………..…………….…………………………………….v Optional Physical Security………..………………........................................................................vi Information and Records Security………..………........................................................................vi Emergency and Response Planning...............................................................................................vii OSHA Standards and Violaton….…………………………………………….……………..….xiii Hiring Practices……………...….…………………………………………….……………..….xiii Legal Issues…..……………...….…………………………………………….……………..……ix Conclusion……………...….…………………………………………….……………..………...ix References…………………………………………………………………….……………..…….x Introduction The purpose of this paper is to design a security plan for the Maryland Public Safety Education and Training Center (MPSETC) that, at a minimum, identifies the facility assets requiring protection, the criticality of those assets, the various threats directed at the assets and the probability of......

Words: 3218 - Pages: 13

Introduction to Computer Security

...CSS150-1302B-04 Introduction to Computer Security Phase 3: Discussion Board 3 Networks, Cryptography, and Malicious Activity Professor: Shawn Murray June 5, 2013 In this paper I will discuss a malicious computer worm that spread rather quickly and affected thousands of people and targeted a company in Utah. I will discuss how the worm spread in detail. Lastly, I will discuss how to prevent / defend against such worms. On January 26, 2004 MyDoom, also known as W32.MyDoom@mm, Novarg, Mimail.R and Shimgapi was a computer worm that affected Microsoft Windows (wildammo.com, 2010). MyDoom in 2004 had set the record for spreading the fastest through email. It was said to be started by e-mail spammers through junk mail being sent. That was one way the worm was sent. MyDoom was also sent out as failure sent messages. One of the messages that MyDoom had sent out was “Andy; I’m just doing my job, nothing personal, sorry.” (wildammo.com, 2010). With messages such as that and sent failure / system error messages, one whom was not knowledgeable of such worms would foolishly open it. These messages including but not limited to the one mentioned above brought suspicion to a lot of people and it was believed that the maker of the worm was paid. To date, the author of MyDoom is not known. It is thought though that MyDoom was created in Russia by a programmer (wildammo.com, 2010). In the result of MyDoom globally internet access had slowed......

Words: 622 - Pages: 3

Computer Security

...Contents INTRODUCTION 4 SECURITY 4 Client Security 4 Server Security 5 Document Confidentiality 5 Risks and threats to E-commerce Sites 5 Hackers 5 Software/hardware failure 5 WHY SECURITY FAIL 6 Exposure of confidential data 6 Modification of Data 6 Errors in Software 6 Poor stipulation and testing 6 Repudiation 6 Solutions to E-commerce Security Risks 7 Encryption 7 Data Encryption Standard (DES) 7 RSA Public Key Algorithm 8 Digital signatures 8 Digital certificates 9 Security for Transactions 9 Secure sockets layer 10 Secure Electronic Transactions (SET) 10 Conclusions 11 INTRODUCTION Internet security is not fully understood by many. However, it is an integral part of Using the Internet safely, most of the security on the Internet is not seen nor its Existence known to the user. The importance of web security is to keep the user, the E- Commerce Merchants and Authorised third parties safe whilst carrying out normal Browsing and transactions online. SECURITY To examine web security we need to look at all the main components of a connection, which are the browser and the Server and then examine the connection between the two. The user, via their web Browser, connects to a remote web server and requests a document. The server then Returns the document, and the browser displays it. This seems a simple enough process, So what could go wrong? From the users point of...

Words: 2106 - Pages: 9

An Introduction to the Computer Security Problem

...Essay 1 What Is There to Worry About? An Introduction to the Computer Security Problem Donald L. Brinkley and Roger R. Schell This essay provides an overview of the vulnerabilities and threats to information security in computer systems. It begins with a historical presentation of past experiences with vulnerabilities in communication security along with present and future computer security experiences. The historical perspective demonstrates that misplaced confidence in the security of a system is worse than having no confidence at all in its security. Next, the essay describes four broad areas of computer misuse: (1) theft of computational resources, (2) disruption of computational services, (3) unauthorized disclosure of information in a computer, and (4) unauthorized modification of information in a computer. Classes of techniques whereby computer misuse results in the unauthorized disclosure and modification of information are then described and examples are provided. These classes are (1) human error, (2) user abuse of authority, (3) direct probing, (4) probing with malicious software, (5) direct penetration, and (6) subversion of security mechanism. The roles of Trojan horses, viruses, worms, bombs, and other kinds of malicious software are described and examples provided. In the past few decades, we have seen the implementation of myriads of computer systems of all sizes and their interconnection over computer networks. These systems handle and are required to......

Words: 13185 - Pages: 53

Introduction of Computer

...UNIT 1 A Introduction to computers Unit 1 WUC 117/03 Introduction to Computing and Internet Introduction to Computers B WAWASAN OPEN UNIVERSITY WUC 117/03 Introduction to Computing and Internet COURSE TEAM Course Team Coordinator: Mr. Kevin Tan Pooi Soo Content Writer: Ms. Parasathy Daivasigamani Instructional Designer: Ms. Jeanne Chow Academic Members: Mr. Chandarasageran a/l Natarajan and Mr. Ishan Sudeera Abeywardena COURSE COORDINATOR Mr. Kevin Tan Pooi Soo EXTERNAL COURSE ASSESSOR Associate Professor Norhaziah Md Salleh PRODUCTION Editor: Mr. Terence Too Yang-Yau In-house Editor: Ms. Jeanne Chow Graphic Designers: Ms. Patsy Yap and Ms. Leong Yin Ling Wawasan Open University is Malaysia’s first private not-for-profit tertiary institution dedicated to adult learners. It is funded by the Wawasan Education Foundation, a tax-exempt entity established by the Malaysian People’s Movement Party (Gerakan) and supported by the Yeap Chor Ee Charitable and Endowment Trusts, other charities, corporations and members of the public. The course material development of the university is funded by Yeap Chor Ee Charitable and Endowment Trusts. © 2008 Wawasan Open University First revision S1 2011 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior written permission from WOU. Wawasan......

Words: 26839 - Pages: 108

Computer Security

...CHAPTER 3 CO M P U TE R A N D I NT E R N E T C R IME QUOTE In view of all the deadly computer viruses that have been spreading lately, Weekend Update would like to remind you: when you link up to another computer, you’re linking up to every computer that that computer has ever linked up to. —Dennis Miller, Saturday Night Live, U.S. television show VIGNETTE Treatment of Sasser Worm Author Sends Wrong Message Unleashed in April 2004, the Sasser worm hit IT systems around the world hard and fast. Unlike most computer viruses before it, the Sasser worm didn’t spread through e-mail, but moved undetected across the Internet from computer to computer. It exploited a weakness in Microsoft Windows XP and Windows 2000 operating systems. By the first weekend in May, American Express, the Associated Press, the British Coast Guard, universities, and hospitals reported that the Sasser worm had swamped their systems. Computer troubles led Delta Airlines to cancel 40 flights and delay many others. Microsoft quickly posted a $250,000 reward, and by mid-May, authorities apprehended Sven Jaschen, a German teenager. Jaschen confessed and was convicted after a three-day trial. Jaschen could have received up to five years in prison, but because he was tried as a minor, the court suspended his 21-month sentence, leaving him with only 30 hours of community service. Copyright © 2007 by Thomson Course Technology. All rights reserved. This publication is protected by federal......

Words: 18526 - Pages: 75

Introduction to Computers

...Windows 7 Presentation APTECH COMPUTER EDUCATION What is an OS ? • Operating systems provide a software platform on top of which other programs, called application programs, can run. History of Microsoft Windows • 1980-MS-DOS • 1982–1985: Introducing Windows 1.0 • 1987–1992: Windows 2.0–2.11—More windows, more speed • 1990–1994: Windows 3.0–Windows NT—Getting the graphics • Windows NT • 1995–2001: Windows 95—the PC comes of age (and don't forget the Internet) • 1998–2000: Windows 98, Windows 2000, Windows Me Continue… • Windows 2000 Professional • 2001–2005: Windows XP—Stable, usable, and fast • 2006–2008: Windows Vista—Smart on security • 2009–Today: Windows 7(The version of Kernel is 7.0 or above 6.0) • Expecting Windows 8 Hardware Requirements Flavors of Windows 7 • • • • • • Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium Windows 7 Professional Windows 7 Enterprise Windows 7 Ultimate Editions of Windows 7 Windows 7 Ultimate Windows 7 Home Premium Windows 7 Enterprise Windows 7 • Standard Professional consumer edition Consumers Windows 7 Home • Does not include Premium Windows 7 Home Basic Windows 7 Starter business features Windows 7 Targeted for value PCs enthusiasts for want all all for accessing for edition in targeted markets, in environments, • Business-focused edition,emergingwhomanagedWindows 7 small factor PCs full Windows The Professional editioncustomer. and lowermeant markets7 standardtechnicalfor......

Words: 2139 - Pages: 9

Computer Security

...Computer Security Assignment 2 Solutions ECE568, Winter 2011 Introduction Answer the following questions. When a word count restriction is given for a question, exceeding it will result in marks being deducted. If your answer is more than twice the maximum length, you will get zero for the question. Please include a word count for all your answers. We recommend that you use a utility like wc on ECF to count the number of words in your answer. Your answers should be written in proper English, with full sentences. We reserve the right to deduct marks for poor English, unintelligible answers or illegible handwriting. All answers should be written in your own words - no copy-pasting! The completed assignments should be submitted in hardcopy during class on April 4, 2011. Note that all written assignments should be done individually. 1 DES and differential cryptanalysis Read http://securespeech.cs.cmu.edu/reports/coppersmith.pdf and answer the following questions: 1. Out of the 3 types of attacks an adversary can mount on a cryptographic algorithm, which ones does differential cryptanalysis utilize? [1 mark] 2. When was differential cryptanalysis first discovered? Which organization had knowledge of it at the time? [2 marks] 3. When did differential cryptanalysis first appear in public literature? List the title and the authors of the paper. [2 marks] 4. What is an active S-box as described in the article? Why is it important to maximize the number of active S-boxes? What property,...

Words: 2608 - Pages: 11

Introduction to Computers

...Introduction to Computers and the Internet 2 1) Basic browser buttons: The same picture is blown up twice below, so that the labels are easier to read. 2) Favorites: A favorite (or a bookmark, depending on your browser) is a link to a page that you store in your web browser. This makes it easier to pull up that page because you do not have to remember its full address, search for it, or click through links on a page to get to it. If there is a page you want to remember or like to go to a lot, you may want to add it to your favorites. Here you can see the pages that are currently saved on your computer or add a new one. 3) Home Page(s): The home page is the page or pages that the browser pulls up when you first open it. You can set it to open more than one, and you can choose what it opens first. To do this, you will want to use the “home” icon. [pic] Clicking on the icon will make the browser pull up the home page, but by clicking on the arrow immediately to the left of it, you can set a new home page. Here you can see the current home page highlighted and the options to change or remove home pages. If you choose to add or change, you will see this: You can either make the page you are currently on the home page, or tell the browser to bring it up in addition to the page(s) it is already opening. If you find that you have too many home pages, you may want to remove some, like......

Words: 355 - Pages: 2

Computer Security

...TITLE: PERSONAL NETWORK SECURITY INTRODUCTION: Computer security is the process of detecting unauthorised use of your computer or PC . As the old saying goes “prevention is better than cure” , going by this we realise that if we learn about the possible loopholes in the security we can prevent it in the first place. But the big question is 'why should i care about my computer security?' . We use computers for everything from banking and investing to shopping and communicating with others through email or chat programs.Although we may not consider our communiction a 'top secret' ,but you dont want others to eavesdrop on you conversations, read your mails, use your computer to attack others system , send forged mails from your computer to others or check the stuff from your computer hard drive. There are many people who whould want to break into you computer system they are generally known as hackers or crackers . More often they do this because they want to launch an attack on some computer system through your computer and other times it is done by some teenage kid who want to showcase his skills and feel proud of himself and maybe even gain some limelight. If your computer is connected to the internet then you dont need some hacker to personally attack your system . There are thousand of computer programs to do this job on the net. Even if you use your internet just to check your e-mails you could still be a huge target for attackers. Is it easy to break into......

Words: 1142 - Pages: 5

Introduction to Computer

...1) A computer is unique compared to any other machine because of its ability to ________. process large amounts of information simultaneously process complex math functions change its programming use many different types of software Score: 1 2) Bits are used to measure ________. storage capacity data transfer and Internet connection rates the size of files the amount of time a user is connected to the Internet Score: 1 3) The smallest, most lightweight, and inexpensive computer is the ________. notebook laptop netbook client Score: 0 4) Distributed computing distributes ________. the processing of tasks across a group of computers power ability across all users Internet usage across the entire network disk storage for all computer users Score: 1 5) Smartphones use ________ technology, allowing users to perform several functions with one device. embedded design invisible computing convergence grid computing Score: 1 6) The intersection of a row and a column in a spreadsheet is called a ________. field text cell record Score: 1 7) Shaynia has been working with her colleagues on a......

Words: 2580 - Pages: 11

Computer Security

...Computer Security Protecting Your Computer System Do’s and Don’ts Abstract This paper explores the computer security process of preventing and detecting unauthorized use of computers. I will also discuss: A. The prevention measures (do’s and don’ts) to help you stop unauthorized users (also known as “intruders”) from accessing any part of your computer system. B. Detections methods that help you to determine whether or not someone attempted to break into your system; a. If an attack was successful b. If so, what they may have done.   Computer Security Protecting Your Computer System Do’s and Don’ts We use computers for everything from banking and investing to shopping and communicating with others through email or chat programs. Although you may not consider your communications “top secret,” you probably do not want strangers reading your email, using your computer to attack other systems, sending forged emails from your computer, or examining personal information stored on your computer (such as financial statements). Intruders (also referred to as hackers, attackers, or crackers) may not care about your identity. Often they want to gain control of your computer so they can use it to launch attacks on other computer systems. Once an intruder takes control of your computer, they have the ability to hide their true location as they launch attacks, often against high-profile computer systems such as government or financial systems. Even if you......

Words: 1909 - Pages: 8

Album, na které se těšíte | Oliver Platt | FreeFlix HQ Pro v1.8.0 modded apk