Lecture1 intro to cs

13
Computer Security I Computer Security I Unit 1: Introduction to Computer Security

Transcript of Lecture1 intro to cs

Page 1: Lecture1 intro to cs

Computer Security IComputer Security I

Unit 1: Introduction to Computer Security

Page 2: Lecture1 intro to cs

ObjectivesObjectives

Overview of Computer SecurityHighlight the principles of Computer

SecurityEvaluate the types of computer assets

and the threats, vulnerabilities and risks associated with each

Page 3: Lecture1 intro to cs

What is it?◦ Computer Security is the science of managing

malicious intent and behaviour that involves information and communication technology.

◦ Malicious Behaviour includes Fraud/Theft – Unauthorised access to $$ (credit

card, goods, services etc.) Vandalism – Causing damage for personal reasons Terrorism

Computer SecurityComputer Security

Page 4: Lecture1 intro to cs

Espionage – Stealing information to gain competitive advantage

Sabotage – Causing damage to gain competitive advantage

Spam – unsolicited marketing wasting time/resources

Page 5: Lecture1 intro to cs

Where is computer security a concern?◦ In the business environment: Cash flow,

competitive advantage, commercial image, reputation◦ In the military environment: Access to

weapons, communication secrecy◦ In the medical environment: Patient records,

equipment safety, treatment info.◦ In the household: Burglar alarms, utility bills

Page 6: Lecture1 intro to cs

Principles of Computer SecurityPrinciples of Computer SecurityThe top aspects of computer security are the

preservation of:◦ Confidentiality: Ensuring that ONLY authorized

persons can access the information◦ Integrity: safeguarding the accuracy of

information by ensuring that ONLY authorized persons are able to modify the information◦ Availability: Ensuring that if you are an

authorized person, information should be accessible to you whenever required.

Page 7: Lecture1 intro to cs
Page 8: Lecture1 intro to cs

Assets, Threats, Vulnerabilities, Assets, Threats, Vulnerabilities, Risks, CountermeasuresRisks, CountermeasuresWhat are they?◦ Asset: A useful or valuable thing. May include

hardware, software, documentation, data, communications, environment and people.

◦ Threat: Intention to inflict injury or damage. Potential to cause loss or harm. May include users, terrorist, hackers, criminals, motivated groups, acts of God

Page 9: Lecture1 intro to cs

Vulnerability: Is a weakness that might be exploited to cause loss or harm. May include the ability to be exposed, stolen, lost, deleted, contain s/ware bugs

Risk: Is a potential problem that a system or its user may experience. An asset is usually at risk when a threat exploits its vulnerabilities.

Page 10: Lecture1 intro to cs

Countermeasure: Procedures / Processess put in place to reduce or mitigate or control a risk. Countermeasures seek to do the following:

Reduce the threat Reduce the vulnerability Reduce the impact Detect a hostile event Recover from an event

Page 11: Lecture1 intro to cs

Vulnerabilities

Countermeasures

Aftercare

Assets Threats

Risk

A risk management model is used to manage threats

Page 12: Lecture1 intro to cs

Risk Assessment

A risk matrix is used to evaluate the threat and countermeasure.

High Expectancy

Low Expectancy

Low Impact

High Impact

Control & Contain Prevention

Live withContingency Plan or Insurance

Page 13: Lecture1 intro to cs

Summary