securitymeasure

securitymeasure - Computer Security Introduction What is...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Computer Security Introduction What is computer security? Computer Security is technology used to prevent unauthorized access, unauthorized disclosure of information, unauthorized modification of information, and unauthorized denial of service. A security breach happens when the integrity, confidentiality, authenticity or availability is compromised. Security Breach The security has been breached when any unauthorized access, disclosure, modification of information, or denial of service by any party occurs. 1. Unauthorized access: Occurs when an unauthorized party, gains access to information or a system. This threat attacks the confidentiality of the system. Stolen usernames and passwords, hacked logins, network/wireless tapping, are types of unauthorized access threats. 2. Unauthorized disclosure of information: Occurs when an unauthorized party discloses information or discloses a system. This type of breach threatens the confidentiality of a system. Stealing of credit card information, login passwords on the internet, disclosure business matters, unauthorized posting of personal files on the internet, are examples of threats of unauthorized disclosure of information. 3. Unauthorized modification of information: This threat happens when an unauthorized party tempers with information or a system. The threat is an attack to the integrity and the authenticity of the information or system. Changing email contents, unauthorized grade modification, are examples of unauthorized modification of information threat. 4. Unauthorized denial of service: Occurs when a system resource/information is destroyed, blocked, made unavailable or unusable. This is a threat to availability of services. Distributed Denial of Service (DDoS)[1], loss of data/information, crashing of hard disks, and down networks, are examples of the threats of unauthorized denial of service. Currently DDoS is popular among ISP and big enterprise online companies. A lot of reasons are behind Denial of Service attacks, most of them occurring for financial purposes.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security breaches can be categorized into two categories, accidental and intentional. Accidental threats are software errors, hardware errors, poor management of resources, fires, natural disasters, etc. Intentional threats include passive and active threats. Passive threats are non-harmful threats, such as the release of message content or traffic analysis. Active threats are harmful threats, such as data modification, delay, blocking, destruction, etc. The cause of security threats can also be divided into two categories, physical damage and damage by malicious software. Physical damages/losses are the damages caused physically. Most of these damages are lost forever and cannot be retrieved unless there is a backup. Physical damages include: Fire Natural disaster Notebook/computer stolen Crashed hard drive Hardware failure Password stolen by looking over-the-shoulder Stolen written passwords There is no better way to prevent data losses due to physical
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 14

securitymeasure - Computer Security Introduction What is...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online