Note-2

Note-2 - CSE 467/598 Data and Information Security Prof....

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
CSE 467/598 Data and Information Security Prof. Gail-Joon Ahn Reading recommendation: Chapter 1 2
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
! disgruntled employee ! former employee ! contract employee Threat Natural Unintentional ! fires ! floods ! earthquakes ! hurricanes ! extreme heat ! extreme cold ! software bugs ! system overloads ! hardware failures ! poorly trained administrators ! errors and accidents Insider ! hacker ! terrorist Intentional Outsider 3 " Classes of Threats " Interruption " Malicious destruction of h/w " Interception " Illicit copying of program " Modification " Alter data being transmitted electronically " Fabricate " Additional pixel (can be detected as forgery) " Threats " Possible attacks on the systems " Vulnerabilities " Weakness that may be exploited to cause loss or harm " Risks " A measure of the possibility of security breaches and severity of the ensuing damage
Background image of page 2
may be aware of that may be reduced by that may possess to reduce wish to minimize impose Countermeasures ASSETS Threat agent leading to to risks that increase wish to abuse and/or may damage give rise to to Threats Owner that exploit Vulnerabilities 5 INTEGRITY AVAILABILITY CONFIDENTIALITY (secrecy) USAGE 6
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 11

Note-2 - CSE 467/598 Data and Information Security Prof....

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online