Note-3

Note-3 - CSE 467/598 Data and Information Security Prof....

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: CSE 467/598 Data and Information Security Prof. Gail-Joon Ahn INTEGRITY AVAILABILITY CONFIDENTIALITY (secrecy) USAGE 2 P D R P D R P D R P D R Prevention Prevent attackers from violating security policy Detection Detect attackers violation of security policy Recovery Stop attack, assess and repair damage Continue to function correctly even if attack succeeds based on the slides for "Computer Security: Art and Science" 3 Q: Classify each of the following as a violation of confidentiality, of integrity, of availability, or of some combination thereof ! John copies Marys homework ! Carol changes the amount of Angelos check from $100 to $1,000 ! Gina forges Rogers signature on a deed ! Ronda shares Peters medical information with an unknown health insurance company without obtaining a consent from Peter ! Henry crashes Julies personal computer based on the slides for "Computer Security: Art and Science" 4 Q: Identify mechanisms for implementing the following. State what policy or policies they might be enforcing ! A password changing problem will reject passwords that are less than five characters long or that are found in the dictionary ! The permissions of the file containing Carols homework will prevent Robert from cheating and copying it ! Annie, a system analyst, will be able to detect a student using a program to scan her system for vulnerabilities ! A program used to submit homework will be able to maintain and restore its copy in/from the backup storage 5 based on the slides for "Computer Security: Art and Science" 6 Policies and Mechanisms ! Policy says what is, and is not, allowed ! This defines security for the site/system/ etc ....
View Full Document

This note was uploaded on 03/09/2011 for the course CSE 497 taught by Professor Ahn during the Spring '11 term at ASU.

Page1 / 12

Note-3 - CSE 467/598 Data and Information Security Prof....

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online