jan12 - CS 426 class...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
CS 426 class Jan 12, 2012 www.cs.purdue.edu/homes/ssw/cs426/{index.html,syll.pdf,outline} Read syllabus Read chapter 1 of Pfleeger Methods of Defense against computer crime risk = possibility of harm Deal with risk by trying to: prevent it - block attack deter it - make it harder to attack deflect it - make another target more attractive detect it - when it happens or soon after recover from its effects or more than one of the above Controls are countermeasures to protect computers (or castles) Some controls include: Encryption - transform data to make it unintelligible, useless if stolen It provides confidentiality and some integrity, but may hinder availability. Weak encryption may give a false sense of security. Software controls - pgms must be secure internal pgm controls - enforce security restrictions (access) OS controls - OS protects users from each other independent controls - passwd, IDS, virus scanners development controls - quality standards for pgm development Hardware controls
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/23/2012 for the course CS 426 taught by Professor Staff during the Spring '08 term at Purdue.

Page1 / 2

jan12 - CS 426 class...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online