SlideShare a Scribd company logo
Computer Security
MIS 604 – IT Solutions to Business Problems
Spring 2002
Principles of Computer Security
• Computer Security
• Goals of Computer Security
• Principles of Computer Security
• Security Policy
Topics
Definition:
Computer Security is the ability of a system to
protect information and system resources with
respect to confidentiality and integrity.
Aspects of Security:
– Prevention: take measures that prevent your assets
from being damaged
– Detection: take measures so that you can detect when,
how, and by whom an asset has been damaged
– Reaction: take measures so that you can recover your
assets or to recover from a damage to your assets
Analogy: Home Security
Analogy: Credit Card Security?
Computer Security
1. Confidentiality: Preventing, detecting or deterring
the improper disclosure of information
2. Integrity: Preventing, detecting, or deterring the
improper modification of data
3. Availability: Preventing, detecting, or deterring the
unauthorized denial of service or data to legitimate
users
4. Authenticity: Ensuring that users of data/resources
are the persons they claim to be
5. Accountability: Able to trace breach of security back
to responsible party
Computer Security - Goals
• Prevent unauthorised disclosure of information
• Two aspects of confidentiality
– Privacy: protection of personal data
– e.g., personal medical records, student grade information
– Secrecy: protection of data belonging to an
organisation
– e.g., Formula for a new drug, plans for the company for the next 5
years, Student Records
Confidentiality
• Detection (and correction) of intentional and
accidental modifications of data in a computer
system
• Various examples of modification
– Corruption of hard drive
– Changing course grades by breaking into
university records
– Transferring money from one account to another
account fraudulently
Integrity
• The property that a product’s services are
accessible when needed and without undue
delay
• Denial of Service is the prevention of
authorised access of resources or the delaying
of time-critical operations
• Distributed Denial of Service occurs when
multiple sources contribute to denial of service
simultaneously
Availability
• Audit information must be selectively kept and
protected so that actions affecting security can
be traced to the responsible party
• Users are identified and authenticated to have a
basis for access control decisions.
• The security system keeps an audit log (audit
trail) of security relevant events to detect and
investigate intrusions.
Accountability
• Where to focus security controls?
– Data: Format and content of data
– Operations: Operations allowed on data
– Users: Access control of data based on user
Principles of Computer Security - I
Application
Software
User
(subject)
Hardware
Resource
(object)
• Where to place security controls?
– Lower layers offer more generic control
– Higher layers allow most functionality and ease of
use
Principles of Computer Security - II
hardware
applications
services (middleware)
operating system
OS kernel
• Security, functionality and ease-of-use linked together ?
– Increasing Security hampers functionality & ease-of-use
– Most secure computer is the one not plugged in and buried in
30 cu. ft. of concrete!
Principles of Computer Security - III
Security
Functionality Ease-of-Use
• Centralized or Decentralized Security Control?
– A central security authority provides much better control
but may act as a bottleneck for productivity
– A decentralized security control provides ability to fine
tune security control for applications making system
easy to use
Principles of Computer Security - IV
• How do you stop an attacker from getting access
to a layer below your protection mechanism?
• Every protection mechanism defines a security
perimeter (boundary). Attackers try to bypass
protection mechanisms.
Principles of Computer Security - V
hardware
applications
services (middleware)
operating system
OS kernel
Hackers attack at
level below security
perimeter
• Tools to bypass protection mechanisms
– Recovery Tools: These can read the hard disks byte-to-
byte without acquiescing to high level security checks
– Unix Devices: Unix treats physical memory devices like
files, so, if improper access controls are defined a hacker
can read disks
– Backups: Backups are made to recover data in a
computer crash. If not stored properly data can be read
from the backup media
Principles of Computer Security – V cont’d.
• A definition of information security with a clear statement of
management's intentions
• An explanation of specific security requirements including:
– Compliance with legislative and contractual requirements
– Security education, virus prevention and detection, and business
continuity planning
– A definition of general and specific roles and responsibilities for the
various aspects of information security program in business
– an explanation of the requirement and process for reporting
suspected security incidents, and
– the process, including roles and responsibilities, for maintaining the
policy document.
Security Policy
Source: IBM Consulting
• Medical records pose particular security
problems. Assume that your medical records can
be accessed on-line. On the one hand, this
information is sensitive and should be protected
from disclosure. On the other hand, in an
emergency it is highly desirable that whoever
treats you has access to your records. How would
you draft your security policy and use prevention,
detection and recovery to secure your records?
Security Policy – Medical Records

More Related Content

Similar to its a computer security based ppt which is very useful (20)

DOCX
General Security ConceptsChapter 2Principles of Comput.docx
budbarber38650
 
PPTX
security introduction and overview lecture1 .pptx
nagwaAboElenein
 
PPT
chapter 1 security.ppt
girmawodajo
 
PPTX
Chapter 1 compu secur.pptx of security service
yhalemayalu
 
PPTX
Informations Security and It's Consequence By Sulav Acharya
AchSulav
 
PDF
cryptograph and computer security lecture 1.pdf
AWELHAJI2
 
PPTX
Advanced Operating System Principles.pptx
yuvapapa26
 
PPTX
UNit 7 Information Security By Sulav Acharya
nmnqknibzxthowqwzc
 
PPTX
PPT0-Computer Security Concepts.pptx
PiBits
 
PDF
Information Security Concepts.pdf
SameeraSarathchandra1
 
PPT
ch01.ppt
ROHITCHHOKER3
 
PDF
Computer security priciple and practice
YUSRA FERNANDO
 
PPTX
System protection in Operating System
sohaildanish
 
PDF
Test Bank for Computer Security: Principles and Practice, 4th Edition, Willia...
jkbsbhrjp9728
 
PDF
Basic security concepts_chapter_1_6perpage
nakomuri
 
PPTX
SECURITY PRINCIPLES AND SECURITY SERVICES.pptx
22r01a05l4
 
PPTX
security in is.pptx
selvapriyabiher
 
PPT
Information security introduction
Prachi Gulihar
 
PPTX
INFORMATION AND CYBER SECURITY
Nishant Pawar
 
PPTX
COMPUTER SECURITY in Information Security
EdFeranil
 
General Security ConceptsChapter 2Principles of Comput.docx
budbarber38650
 
security introduction and overview lecture1 .pptx
nagwaAboElenein
 
chapter 1 security.ppt
girmawodajo
 
Chapter 1 compu secur.pptx of security service
yhalemayalu
 
Informations Security and It's Consequence By Sulav Acharya
AchSulav
 
cryptograph and computer security lecture 1.pdf
AWELHAJI2
 
Advanced Operating System Principles.pptx
yuvapapa26
 
UNit 7 Information Security By Sulav Acharya
nmnqknibzxthowqwzc
 
PPT0-Computer Security Concepts.pptx
PiBits
 
Information Security Concepts.pdf
SameeraSarathchandra1
 
ch01.ppt
ROHITCHHOKER3
 
Computer security priciple and practice
YUSRA FERNANDO
 
System protection in Operating System
sohaildanish
 
Test Bank for Computer Security: Principles and Practice, 4th Edition, Willia...
jkbsbhrjp9728
 
Basic security concepts_chapter_1_6perpage
nakomuri
 
SECURITY PRINCIPLES AND SECURITY SERVICES.pptx
22r01a05l4
 
security in is.pptx
selvapriyabiher
 
Information security introduction
Prachi Gulihar
 
INFORMATION AND CYBER SECURITY
Nishant Pawar
 
COMPUTER SECURITY in Information Security
EdFeranil
 

Recently uploaded (20)

PDF
monopile foundation seminar topic for civil engineering students
Ahina5
 
PPTX
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
PDF
Biomechanics of Gait: Engineering Solutions for Rehabilitation (www.kiu.ac.ug)
publication11
 
PPTX
Day2 B2 Best.pptx
helenjenefa1
 
PDF
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
PPTX
Green Building & Energy Conservation ppt
Sagar Sarangi
 
PPTX
Break Statement in Programming with 6 Real Examples
manojpoojary2004
 
PDF
GTU Civil Engineering All Semester Syllabus.pdf
Vimal Bhojani
 
PDF
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
PDF
Water Design_Manual_2005. KENYA FOR WASTER SUPPLY AND SEWERAGE
DancanNgutuku
 
PPTX
Solar Thermal Energy System Seminar.pptx
Gpc Purapuza
 
PDF
Set Relation Function Practice session 24.05.2025.pdf
DrStephenStrange4
 
PPTX
The Role of Information Technology in Environmental Protectio....pptx
nallamillisriram
 
PDF
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
PPTX
MobileComputingMANET2023 MobileComputingMANET2023.pptx
masterfake98765
 
PDF
Zilliz Cloud Demo for performance and scale
Zilliz
 
PPTX
Server Side Web Development Unit 1 of Nodejs.pptx
sneha852132
 
PPTX
Element 7. CHEMICAL AND BIOLOGICAL AGENT.pptx
merrandomohandas
 
PPTX
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
PPTX
GitOps_Repo_Structure for begeinner(Scaffolindg)
DanialHabibi2
 
monopile foundation seminar topic for civil engineering students
Ahina5
 
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
Biomechanics of Gait: Engineering Solutions for Rehabilitation (www.kiu.ac.ug)
publication11
 
Day2 B2 Best.pptx
helenjenefa1
 
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
Green Building & Energy Conservation ppt
Sagar Sarangi
 
Break Statement in Programming with 6 Real Examples
manojpoojary2004
 
GTU Civil Engineering All Semester Syllabus.pdf
Vimal Bhojani
 
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
Water Design_Manual_2005. KENYA FOR WASTER SUPPLY AND SEWERAGE
DancanNgutuku
 
Solar Thermal Energy System Seminar.pptx
Gpc Purapuza
 
Set Relation Function Practice session 24.05.2025.pdf
DrStephenStrange4
 
The Role of Information Technology in Environmental Protectio....pptx
nallamillisriram
 
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
MobileComputingMANET2023 MobileComputingMANET2023.pptx
masterfake98765
 
Zilliz Cloud Demo for performance and scale
Zilliz
 
Server Side Web Development Unit 1 of Nodejs.pptx
sneha852132
 
Element 7. CHEMICAL AND BIOLOGICAL AGENT.pptx
merrandomohandas
 
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
GitOps_Repo_Structure for begeinner(Scaffolindg)
DanialHabibi2
 
Ad

its a computer security based ppt which is very useful

  • 1. Computer Security MIS 604 – IT Solutions to Business Problems Spring 2002 Principles of Computer Security
  • 2. • Computer Security • Goals of Computer Security • Principles of Computer Security • Security Policy Topics
  • 3. Definition: Computer Security is the ability of a system to protect information and system resources with respect to confidentiality and integrity. Aspects of Security: – Prevention: take measures that prevent your assets from being damaged – Detection: take measures so that you can detect when, how, and by whom an asset has been damaged – Reaction: take measures so that you can recover your assets or to recover from a damage to your assets Analogy: Home Security Analogy: Credit Card Security? Computer Security
  • 4. 1. Confidentiality: Preventing, detecting or deterring the improper disclosure of information 2. Integrity: Preventing, detecting, or deterring the improper modification of data 3. Availability: Preventing, detecting, or deterring the unauthorized denial of service or data to legitimate users 4. Authenticity: Ensuring that users of data/resources are the persons they claim to be 5. Accountability: Able to trace breach of security back to responsible party Computer Security - Goals
  • 5. • Prevent unauthorised disclosure of information • Two aspects of confidentiality – Privacy: protection of personal data – e.g., personal medical records, student grade information – Secrecy: protection of data belonging to an organisation – e.g., Formula for a new drug, plans for the company for the next 5 years, Student Records Confidentiality
  • 6. • Detection (and correction) of intentional and accidental modifications of data in a computer system • Various examples of modification – Corruption of hard drive – Changing course grades by breaking into university records – Transferring money from one account to another account fraudulently Integrity
  • 7. • The property that a product’s services are accessible when needed and without undue delay • Denial of Service is the prevention of authorised access of resources or the delaying of time-critical operations • Distributed Denial of Service occurs when multiple sources contribute to denial of service simultaneously Availability
  • 8. • Audit information must be selectively kept and protected so that actions affecting security can be traced to the responsible party • Users are identified and authenticated to have a basis for access control decisions. • The security system keeps an audit log (audit trail) of security relevant events to detect and investigate intrusions. Accountability
  • 9. • Where to focus security controls? – Data: Format and content of data – Operations: Operations allowed on data – Users: Access control of data based on user Principles of Computer Security - I Application Software User (subject) Hardware Resource (object)
  • 10. • Where to place security controls? – Lower layers offer more generic control – Higher layers allow most functionality and ease of use Principles of Computer Security - II hardware applications services (middleware) operating system OS kernel
  • 11. • Security, functionality and ease-of-use linked together ? – Increasing Security hampers functionality & ease-of-use – Most secure computer is the one not plugged in and buried in 30 cu. ft. of concrete! Principles of Computer Security - III Security Functionality Ease-of-Use
  • 12. • Centralized or Decentralized Security Control? – A central security authority provides much better control but may act as a bottleneck for productivity – A decentralized security control provides ability to fine tune security control for applications making system easy to use Principles of Computer Security - IV
  • 13. • How do you stop an attacker from getting access to a layer below your protection mechanism? • Every protection mechanism defines a security perimeter (boundary). Attackers try to bypass protection mechanisms. Principles of Computer Security - V hardware applications services (middleware) operating system OS kernel Hackers attack at level below security perimeter
  • 14. • Tools to bypass protection mechanisms – Recovery Tools: These can read the hard disks byte-to- byte without acquiescing to high level security checks – Unix Devices: Unix treats physical memory devices like files, so, if improper access controls are defined a hacker can read disks – Backups: Backups are made to recover data in a computer crash. If not stored properly data can be read from the backup media Principles of Computer Security – V cont’d.
  • 15. • A definition of information security with a clear statement of management's intentions • An explanation of specific security requirements including: – Compliance with legislative and contractual requirements – Security education, virus prevention and detection, and business continuity planning – A definition of general and specific roles and responsibilities for the various aspects of information security program in business – an explanation of the requirement and process for reporting suspected security incidents, and – the process, including roles and responsibilities, for maintaining the policy document. Security Policy Source: IBM Consulting
  • 16. • Medical records pose particular security problems. Assume that your medical records can be accessed on-line. On the one hand, this information is sensitive and should be protected from disclosure. On the other hand, in an emergency it is highly desirable that whoever treats you has access to your records. How would you draft your security policy and use prevention, detection and recovery to secure your records? Security Policy – Medical Records

Editor's Notes

  • #2: Prevention: locks at doors, window bars, walls round the property Detection: stolen items are missing, burglar alarms, closed circuit TV Reaction: call the police, replace stolen items, make an insurance claim … Prevention: encrypt your orders, rely on the merchant to perform checks on the caller, don’t use the Internet (?) … Detection: an unauthorized transaction appears on your credit card statement Reaction: complain, ask for a new card number, etc.
  • #3: Prevention: locks at doors, window bars, walls round the property Detection: stolen items are missing, burglar alarms, closed circuit TV Reaction: call the police, replace stolen items, make an insurance claim … Prevention: encrypt your orders, rely on the merchant to perform checks on the caller, don’t use the Internet (?) … Detection: an unauthorized transaction appears on your credit card statement Reaction: complain, ask for a new card number, etc.
  • #10: Visualize security mechanisms as concentric protection rings, with hardware mechanisms in the centre and application mechanisms at the outside Mechanisms towards the centre tend to be more generic while mechanisms at the outside are more likely to address individual user requirements