Unit 1-2 Trusted Computer Systems [Compatibility Mode]

Unit 1-2 Trusted Computer Systems [Compatibility Mode] -...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 12/19/2010 1 Trusted Computer Systems Trusted Computer Systems Unit 1- Part 2 Click Here to Start Audio Security Security Services Services (NSTISSI (NSTISSI 4011) 4011) c Confidentiality - protection from disclosure c Integrity -Quality of Information c Availability - information is available when needed Threats Threats c Trojan Horse Programs c Hackers c Unauthorized Users c Denial of Service c Legal Liabilities 12/19/2010 2 Threat Classes Threat Classes c Disclosure - Unauthorized Access c Deception - Acceptance of False Data c Disruption - Interruption of Operation c Usurpation- Unauthorized Control Security Policy Security Policy c What are you going to protect? c From Whom? c Using what mechanisms? Information Technology Information Technology c How does the Security Policy apply to IT? c How can it be implemented efficiently? c Will users accept it? 12/19/2010 3 Security Policy and States Security Policy and States c English Policies are ambiguous c Finite State Machines conveniently represent computer...
View Full Document

This note was uploaded on 02/20/2011 for the course TECH 7375 taught by Professor June during the Spring '11 term at University of Arkansas for Medical Sciences.

Page1 / 5

Unit 1-2 Trusted Computer Systems [Compatibility Mode] -...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online