Lecture 1 - 478/578 Intro. To Comp. Security Goal of the...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
478/578 Intro. To Comp. Security Goal of the course: 1. Examine the risks of computer security 2. Consider countermeasures/controls 3. Identify areas where more work must be done Principle of easiest penetration: a system must be considered to be as secure as its weakest point. You must expect an intruder to use any available means. This usually means that the attack may not be with the most obvious means. Attackers always look for vulnerabilities. Vulnerability is a weakness in the computer security system. Vulnerabilities are very closely related to threats. Threats are set of circumstances that can cause harm or loss . An attack exploits a vulnerability. A control is used to reduce a vulnerability and thus block a threat. There are 4 categories of threats: 1. Interceptions – An unauthorized party gains access to an asset 2. Interruption – An attacker blocks access to an asset (for example, a DDOS- distributed denial of service attack) 3. Modification – You access and tamper with an asset.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 2

Lecture 1 - 478/578 Intro. To Comp. Security Goal of the...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online