0% found this document useful (0 votes)
16 views2 pages

Chapter 2

Chapter 2 discusses computer security, defining it as the protection of information systems to ensure integrity, availability, and confidentiality. It differentiates between information security, cybersecurity, and network security, while outlining five key functionalities: confidentiality, integrity, authorization, authentication, and non-repudiation. The chapter also categorizes attacks into passive and active types, and suggests various prevention measures such as encryption, strong passwords, and firewalls.

Uploaded by

achraf allali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views2 pages

Chapter 2

Chapter 2 discusses computer security, defining it as the protection of information systems to ensure integrity, availability, and confidentiality. It differentiates between information security, cybersecurity, and network security, while outlining five key functionalities: confidentiality, integrity, authorization, authentication, and non-repudiation. The chapter also categorizes attacks into passive and active types, and suggests various prevention measures such as encryption, strong passwords, and firewalls.

Uploaded by

achraf allali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Chapter summary

Subject: security CIA Triad


Chapter 2: Definition Computer Security (NIST): SP PUBLICATION 800-12 AN INTRODUCTION TO COMPUTER SECURITY
i
(National Institute of Standards and Technology)
Pages: Computer security is the protection afforded to an automated information system in order to attain the applicable
objectives of preserving the integrity, availability, and confidentiality of information system resources (including
hardware, software, firmware, information data, and telecommunications).
key terms:
Difference between network security and cyber security and information security:
In one sense, information security dates back to when humans began keeping secrets; in the early days, physical files and
documents were kept under literal lock and key. Once the business world began using computers, network
Firmware: security became essential to protect the electronic network infrastructure of these vital systems. The advent of the
In computing, firmware is a internet changed everything, adding once-unimagined technological capabilities but also creating new vulnerabilities;
specific class of computer and giving rise to a critical new industry — cybersecurity.
software that provides the low-
cybersecurity is a subset of information security that deals with protecting an organization’s internet-connected systems
level control for a device's
from potential cyberattacks; and network security is a subset of cybersecurity that is focused on protecting an
specific hardware. Firmware, such
organization’s IT infrastructure from online threats.
as the BIOS of a personal
computer. Five types of functionalities that information security basically tries to provide:

1. Confidentiality: It means the assurance that only authorized users can read or use confidential information.
Without confidentiality, anyone with network access can use readily available tools to eavesdrop on network
traffic and intercept valuable proprietary information. If privacy or confidentiality is not guaranteed, outsiders or
Questions intruders could steal the information that is stored in plaintext. Hence, cryptosystems use different techniques
and mechanisms to ensure information confidentiality. When cryptographic keys are used on plaintext to create
ciphertext, privacy is assigned to the information.
2. Integrity: is the security aspect that confirms that the original contents of information have not been altered or
Why we need Security in our life? corrupted. If integrity is not ensured, someone might alter information or information might become corrupted,
and the alteration could be sometimes undetected. This is the reason why many cryptosystems use techniques
What is the Computational
and mechanisms to verify the integrity of information. For example, an intruder might covertly alter a file, but
security & Unconditional security?
change the unique digital thumbprint for the file, causing other users to detect the tampering by comparing the
changed digital thumbprint to the digital thumbprint for the original contents for email accounts that are
authenticated from the server.

/
3 Authorization: Authorization is a basic function of security that cryptography cannot provide. Authorization refers to the process of granting or denying
access to a network resource or service. In other words, authorization means access control to any resource used for computer networks. Most of the computer
security systems that we have today are based on a two-step mechanism. The first step is authentication, and the second step is authorization or access control,
which allows the user to access various resources based on the user’s identity.
4 Authentication: means the process of verification of the identity of the entities that communicate over a network. Without authentication, any user
with network access can use readily available tools to forge originating Internet Protocol (IP) addresses and impersonate others. Therefore, cryptosystems use
various mechanisms to authenticate both the originators and recipients of information. An example could be that a user needs to key in his or her login name
and password.
5 Non repudiation: Nonrepudiation: For information communication, assurance is needed that a party cannot falsely deny that a part of the actual
communication occurred. Nonrepudiation makes sure that each party is liable for its sent message. If nonrepudiation is not ensured, someone can
communicate and then later either falsely deny the communication entirely or claim that it occurred at a different time, or even deny receiving any piece
of information. Hence, this aspect ensures accountability of each entity taking part in any communication event.
Types of attacks:
1.passive attacks: gain unauthorized access to sensitive or confidential data or information without being detected. The attacker observes the content of
messages or copies the content of messages. Passive Attack is a danger to Confidentiality. Due to passive attack, there is no harm to the system. The most
important thing is that In a passive attack, Victim does not get informed about the attack.

2. Active attacks: are the type of attacks in which, the attacker efforts to change or modify the content of messages. Active Attack is dangerous to Integrity as
well as availability. Due to active attack system is always damaged and System resources can be changed. The most important thing is that, In an active attack,
Victim gets informed about the attack.

Patching: is a modification to a program to improve its security, performance, or other feature.

Prevention passive attacks Prevention active attacks

encryption strong passwords

security protocols two-factor authentication

network segmentation firewalls

monitoring and logging Intrusion detection systems

access control anti-malware software

and physical security security awareness training


measures
VPN’s regular software updates and
patching

You might also like