jan12 - CS 426 class Jan 12, 2012

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
CS 426 class Jan 12, 2012 www.cs.purdue.edu/homes/ssw/cs426/{index.html,syll.pdf,outline} Read syllabus Read chapter 1 of Pfleeger Methods of Defense against computer crime risk = possibility of harm Deal with risk by trying to: prevent it - block attack deter it - make it harder to attack deflect it - make another target more attractive detect it - when it happens or soon after recover from its effects or more than one of the above Controls are countermeasures to protect computers (or castles) Some controls include: Encryption - transform data to make it unintelligible, useless if stolen It provides confidentiality and some integrity, but may hinder availability. Weak encryption may give a false sense of security. Software controls - pgms must be secure internal pgm controls - enforce security restrictions (access) OS controls - OS protects users from each other independent controls - passwd, IDS, virus scanners development controls - quality standards for pgm development Hardware controls
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 2

jan12 - CS 426 class Jan 12, 2012

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online