Unit 1
Unit 1
One way to ascertain the similarities and differences among Computer Security is
by asking what is being secured. For example,
● Hardware, the physical part of the computer, like the system memory and
disk drive
● Firmware, permanent software that is etched into a hardware
device’s nonvolatile memory and is mostly invisible to the user
● Software, the programming that offers services, like operating system, word
processor, internet browser to the user
Computer security is mainly concerned with three main areas. Computer and
network security are built on three pillars, commonly referred to by the C-I-A
acronym:
● Confidentiality
● Integrity
● Availability
Following shortly on the heels of C-I-A are a host of other terms and acronyms.
Each of these has its own shade of meaning, but all of them are part of the C-I-A
model:
Identification
Who do you say you are?
Authentication
How do I know it’s really you?
Authorization
Now that you are here, what are you allowed to do?
Accountability
Who did what, and, perhaps, who pays the bill?