jan10 - first class Jan 10, 2012

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
first class Jan 10, 2012 www.cs.purdue.edu/homes/ssw/cs426/{index.html,syll.pdf,outline} Read syllabus Read chapter 1 of Pfleeger Past: wealth in banks; so rob banks and VP Now: wealth in computers; so attack computers: 1. steal the computer (or cell phone) 2. steal $ via computer network (from a bank) 3. steal valuable data from a computer 2 and 3 avoid physical contact some businesses and banks do not prosecute or report We study computer vulnerabilities and how they are exploited. An intruder will attack the weakest point. Therefore, computer security people must protect everything. kinds of breaches: exposure = a possible loss or harm (in a computer) vulnerability = weakness in a system that could be exploited threat = a set of circumstances that may cause loss or harm Example: water behind wall; man on other side exposure - man could get wet or drown vulnerability - crack in wall threat - water rises above crack level A human who exploits a vulnerability makes an attack. Example: Human adds water behind wall up to crack level. control = protective measure to reduce vulnerability Example: seal the crack; prevent people from adding water; those are controls A threat is blocked by control of a vulnerability. Much of this class studies controls and how well they enhance security.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/23/2012 for the course CS 426 taught by Professor Staff during the Spring '08 term at Purdue University-West Lafayette.

Page1 / 3

jan10 - first class Jan 10, 2012

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online