Intro to AI STRIPS Planning & Applications in Video-games Lecture1-Part2
Lecture1 intro to cs
-
Upload
doneisha-mckenzie -
Category
Technology
-
view
63 -
download
5
Transcript of Lecture1 intro to cs
Computer Security IComputer Security I
Unit 1: Introduction to Computer Security
ObjectivesObjectives
Overview of Computer SecurityHighlight the principles of Computer
SecurityEvaluate the types of computer assets
and the threats, vulnerabilities and risks associated with each
What is it?◦ Computer Security is the science of managing
malicious intent and behaviour that involves information and communication technology.
◦ Malicious Behaviour includes Fraud/Theft – Unauthorised access to $$ (credit
card, goods, services etc.) Vandalism – Causing damage for personal reasons Terrorism
Computer SecurityComputer Security
Espionage – Stealing information to gain competitive advantage
Sabotage – Causing damage to gain competitive advantage
Spam – unsolicited marketing wasting time/resources
Where is computer security a concern?◦ In the business environment: Cash flow,
competitive advantage, commercial image, reputation◦ In the military environment: Access to
weapons, communication secrecy◦ In the medical environment: Patient records,
equipment safety, treatment info.◦ In the household: Burglar alarms, utility bills
Principles of Computer SecurityPrinciples of Computer SecurityThe top aspects of computer security are the
preservation of:◦ Confidentiality: Ensuring that ONLY authorized
persons can access the information◦ Integrity: safeguarding the accuracy of
information by ensuring that ONLY authorized persons are able to modify the information◦ Availability: Ensuring that if you are an
authorized person, information should be accessible to you whenever required.
Assets, Threats, Vulnerabilities, Assets, Threats, Vulnerabilities, Risks, CountermeasuresRisks, CountermeasuresWhat are they?◦ Asset: A useful or valuable thing. May include
hardware, software, documentation, data, communications, environment and people.
◦ Threat: Intention to inflict injury or damage. Potential to cause loss or harm. May include users, terrorist, hackers, criminals, motivated groups, acts of God
Vulnerability: Is a weakness that might be exploited to cause loss or harm. May include the ability to be exposed, stolen, lost, deleted, contain s/ware bugs
Risk: Is a potential problem that a system or its user may experience. An asset is usually at risk when a threat exploits its vulnerabilities.
Countermeasure: Procedures / Processess put in place to reduce or mitigate or control a risk. Countermeasures seek to do the following:
Reduce the threat Reduce the vulnerability Reduce the impact Detect a hostile event Recover from an event
Vulnerabilities
Countermeasures
Aftercare
Assets Threats
Risk
A risk management model is used to manage threats
Risk Assessment
A risk matrix is used to evaluate the threat and countermeasure.
High Expectancy
Low Expectancy
Low Impact
High Impact
Control & Contain Prevention
Live withContingency Plan or Insurance
Summary