01 - July 1, 2004 Computer Security: Art and Science...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: July 1, 2004 Computer Security: Art and Science 2002-2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational Issues Human Issues July 1, 2004 Computer Security: Art and Science 2002-2004 Matt Bishop Slide #1-2 Basic Components Confdentiality Keeping data and resources hidden Integrity Data integrity (integrity) Origin integrity (authentication) Availability Enabling access to data and resources July 1, 2004 Computer Security: Art and Science 2002-2004 Matt Bishop Slide #1-3 Classes of Threats Disclosure Snooping Deception ModiFcation, spooFng, repudiation of origin, denial of receipt Disruption ModiFcation Usurpation ModiFcation, spooFng, delay, denial of service July 1, 2004 Computer Security: Art and Science 2002-2004 Matt Bishop Slide #1-4 Policies and Mechanisms Policy says what is, and is not, allowed...
View Full Document

Page1 / 12

01 - July 1, 2004 Computer Security: Art and Science...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online