Tutorial 1: Security ResearchSecurityTable 1 shows the CIA categories for computer security (as per lecture). Once youread through this you will then be asked to complete table 2 which contains somedevices or software that are either specifically used for security or ‘may’ be used inorder to help secure computer systems. Computer security has many aspects. In order to keep things relatively simple, wehave briefly considered the main tenets of computer security CIA (Confidentiality,Integrity and Availability). This is also often called the CIA Triangle.CIA Triangle As is evident CIA stands for Confidentiality, Integrity, and Availability. These are thethree tenets or cornerstones of information security objectives. Virtually all practiceswithin the umbrella called “Information Security” are designed to provide theseobjectives. They are relatively simple to understand and common-sense notions,yet very often misunderstood, leading to systems that do not protect information asthey should. To become a ‘good’ computer scientist you should understand CIA verywell in order to understand the reasoning behind later practices as well as helpingyou to consider security during your personal use of computer systems. Dr. Pannu
Table 1 CIA Categories.CategoryDescriptionConfidentialityPrevention of unauthorised disclosureof information (keep it secret or private). Only those ‘authorised’ should see it.IntegrityPrevention of unauthorised modification of information (don’t allow it to be changed). Only those ‘authorised’ should be allowed to change it.AvailabilityPrevention of unauthorised withholding of information or resources. Information or resources should be available to authorised users whom wish to use them in a timely fashion.