01 - July 1 2004 Computer Security Art and Science...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: July 1, 2004 Computer Security: Art and Science ©2002-2004 Matt Bishop Slide #1-1 Chapter 1: Introduction • Components of computer security • Threats • Policies and mechanisms • The role of trust • Assurance • Operational Issues • Human Issues July 1, 2004 Computer Security: Art and Science ©2002-2004 Matt Bishop Slide #1-2 Basic Components • Confdentiality – Keeping data and resources hidden • Integrity – Data integrity (integrity) – Origin integrity (authentication) • Availability – Enabling access to data and resources July 1, 2004 Computer Security: Art and Science ©2002-2004 Matt Bishop Slide #1-3 Classes of Threats • Disclosure – Snooping • Deception – ModiFcation, spooFng, repudiation of origin, denial of receipt • Disruption – ModiFcation • Usurpation – ModiFcation, spooFng, delay, denial of service July 1, 2004 Computer Security: Art and Science ©2002-2004 Matt Bishop Slide #1-4 Policies and Mechanisms • Policy says what is, and is not, allowed...
View Full Document

{[ snackBarMessage ]}

Page1 / 12

01 - July 1 2004 Computer Security Art and Science...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online