chapter_one computer_security (2)
chapter_one computer_security (2)
College of Informatics
Chapter 1
Lecture Notes
• Privacy Is the process of protecting he’s or her own personal files against
any intrusion.
Data Security
✓ Communicating by phone,
2. Maintaining Privacy:
With increasing data collection, ensuring computer security helps safeguard individuals' privacy and prevents
Cyberattacks can lead to significant financial losses for individuals and businesses, including theft, fraud, and recovery
costs.
Companies rely on secure systems to operate. A security breach can disrupt operations, leading to downtime and lost
revenue.
5. Safeguarding Reputation:
A security incident can damage an organization’s reputation, leading to loss of customer trust and potential long-term
05/03/2025 this slide is in 2017/24 academic year
effects on business relationships.
Con …
6. Compliance with Regulations:
Many industries are subject to regulations that require data protection. Non-compliance can result in legal
Businesses need to protect their innovations and proprietary information from competitors and cybercriminals.
Cybersecurity is crucial for protecting national infrastructure, government systems, and sensitive information
A secure digital environment fosters innovation and confidence in adopting new technologies.
As technology evolves, so do cyber threats. Staying vigilant helps organizations and individuals adapt to new
05/03/2025 this slide is in 2017/24 academic year
risks.
1.2 Goals of computer Security (pillars)
• The goals of computer security are often summarized by
the "CIA" triad, which consists of three main pillars:
• Confidentiality
• Integrity
• Availability
• The need for keeping information secret arises from the use of computers in
sensitive fields such as government and industry.
• For example, military and civilian institutions in the government often restrict
access to information to those who need that information
• It ensures that computer-related assets are accessed only by authorized
parties.
• Confidentiality is sometimes called secrecy or privacy.
Only authorized entities are allowed to view
Only sender, intended receiver should “understand” message
contents
• confidentiality covers two related concepts
Data confidentiality
Privacy
05/03/2025 this slide is in 2017/24 academic year
Integrity
• Integrity includes data integrity (the content of the information) and origin integrity (the
source of the data, often called authentication).Information needs to be changed constantly.
• Integrity means that changes need to be done only by authorized entities and through
authorized mechanisms or assets can be modified only by authorized parties or only in
authorized ways.
• Integrity can be
Data integrity
05/03/2025 this slide is in 2017/24 academic year
System integrity
Availability
• It assures that system works promptly and service is not denied for
05/03/2025 this slide is in 2017/24 academic year
authorized user.
1.3 Threats.Vulnerability,Controls.risk
• Vulnerability is a weakness in the security system.
• Weaknesses can appear in any element of a computer, both in the
hardware, operating system, and the software.
• A threat is a possibility that someone (person, s/w) would identify and exploit the
vulnerability.
• The entity that takes advantage of vulnerability is referred to as a threat agent. E.g.:
A threat agent could be an intruder accessing the network through a port on the
firewall.
• Risk is the likelihood of a threat agent taking advantage of vulnerability and the
corresponding business impact. Reducing vulnerability and/or threat reduces the risk
• E.g.: If a firewall has several ports open, there is a higher likelihood that an
system's vulnerabilities.
a. Authentication
b. Encryption
c. Auditing
d. Standards
05/03/2025 etc. this slide is in 2017/24 academic year
1.4 Security Attack
• The Open Systems Interconnection (OSI) security
architecture provides a systematic framework for defining
security attacks, mechanisms, and services.
• U2. No other user can read or change a file without the owner’s
permission.
• U4. Users shall be aware of all commands that they enter, or that
are entered on their behalf
05/03/2025 this slide is in 2017/24 academic year
1.6 Prevention,Detection,and Deterrence
• Prevention, detection, and deterrence are key strategies in computer
security that work together to protect systems and data
• Examples:
• Access Controls: Implementing user authentication and authorization
mechanisms e.g .password,MFA,Token A and timestampe certification
• Firewalls: Blocking unauthorized access to networks.
•05/03/2025
Security Policies: Establishing
this slide is inrules and guidelines
2017/24 academic year for secure behavior
2. Detection
• Definition: Identifying and recognizing security incidents as they occur.
• Examples:
activity.
real-time.
• Anomaly Detection: Using machine learning to identify unusual patterns that could
indicate
05/03/2025 a security issue. this slide is in 2017/24 academic year
3. Deterrence
…
• Examples:
• Awareness Training: Educating users about security risks and safe practices to reduce the
likelihood of human error.
• Legal and Policy Enforcement: Implementing strict policies and consequences for
violations to discourage malicious behavior.
2. Security Testing
Static Analysis: Analyzing source code for
vulnerabilities without executing it, often using
automated tools.
Dynamic Analysis: Testing running applications for
security flaws, including penetration testing and
vulnerability assessments.
Fuzz Testing: Inputting random or unexpected data to
05/03/2025 this slide is in 2017/24 academic year
Con..
• 3. Risk Management
• 6. Post-Deployment Practices
potential breaches.