CMPSC 443 - Lecture 1 - Overview CMPSC 443 - Spring 2012...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
CMPSC 443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger Lecture 1 - Overview CMPSC 443 - Spring 2012 Introduction to Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CMPSC 443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger Page From small vulnerabilities come . .. 2
Background image of page 2
CMPSC 443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger Page People are part of the problem . .. 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CMPSC 443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger Page And the rest . .. • Hardware – E.g., Ford Pinto – E.g., ext2 • Physical Access – E.g., ATMs • Users – E.g., Phishing – E.g., Social engineering – E.g., Misplaced trust 4
Background image of page 4
CMPSC 443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger Page Where is all of this going? • We are at a unique point in history. – We have little security. – We have little usable theory on what is secure. – We have little knowledge of how to get it. – Workable tools are rudimentary, but sometimes effective. • However, we have a huge amount of risk riding on computer and network security. – Financial – Medical – Personal . .. • Every computing system we use is insecure . .. 5
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Page This course … • We are going to explore the tools that the address these frequent and expected vulnerabilities. Why are we doing so poorly in computing systems at protecting our users and data from inadvertent or intentional harm? The answer: stay tuned!
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/11/2012 for the course CSE 443 taught by Professor Trentjaeger during the Spring '11 term at Pennsylvania State University, University Park.

Page1 / 15

CMPSC 443 - Lecture 1 - Overview CMPSC 443 - Spring 2012...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online