Lecture2_SecConcepts

Lecture2_SecConcepts - ITP 125 Lecture 2: Security Concepts...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ITP 125 Lecture 2: Security Concepts Recap Security Concepts CIA Host vs. Network Security Security Tactics Outline Hacker = computer security expert Not necessarily for malicious intent Black hats, white hats, grey hats Inside vs. Outside threats Hacker methodology Recap Computer security seeks to protect the CIA Confidentiality Data is only seen by individuals with the proper authorization Integrity Only authorized individuals may create and/or modify the data Availability The data is available to authorized individuals at the necessary times CIA Recently, two more concepts have been added to the purpose of computer security Authentication Proving an individuals identity Also proving datas identity Nonrepudiation Ensuring that a message has been sent to the authorized individual or received from the authorized individual Additions to the CIA Today, nearly every computer worldwide is...
View Full Document

This note was uploaded on 03/21/2011 for the course ITP 125 taught by Professor Greenfield during the Spring '11 term at USC.

Page1 / 14

Lecture2_SecConcepts - ITP 125 Lecture 2: Security Concepts...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online