Tutorial_1 (1) (1).doc - Tutorial 1 Security Research...

This preview shows page 1 - 3 out of 5 pages.

Tutorial 1: Security Research Security Table 1 shows the CIA categories for computer security (as per lecture). Once you read through this you will then be asked to complete table 2 which contains some devices or software that are either specifically used for security or ‘may’ be used in order to help secure computer systems. Computer security has many aspects. In order to keep things relatively simple, we have briefly considered the main tenets of computer security CIA (Confidentiality, Integrity and Availability). This is also often called the CIA Triangle. CIA Triangle As is evident CIA stands for Confidentiality, Integrity, and Availability. These are the three tenets or cornerstones of information security objectives. Virtually all practices within the umbrella called “Information Security” are designed to provide these objectives. They are relatively simple to understand and common-sense notions, yet very often misunderstood, leading to systems that do not protect information as they should. To become a ‘good’ computer scientist you should understand CIA very well in order to understand the reasoning behind later practices as well as helping you to consider security during your personal use of computer systems. Dr. Pannu
Table 1 CIA Categories . Category Description Confidentiality Prevention of unauthorised disclosure of information (keep it secret or private). Only those ‘authorised’ should see it. Integrity Prevention of unauthorised modification of information (don’t allow it to be changed). Only those ‘authorised’ should be allowed to change it. Availability Prevention of unauthorised withholding of information or resources. Information or resources should be available to authorised users whom wish to use them in a timely fashion.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture