Computer Security Chapter 1or
Computer Security Chapter 1or
Welcome to COSC4035
Computer Security
Chapter One
Introduction to Computer Security
A vulnerability is a weakness in
the system, for example, in procedures,
design, or implementation, that might be exploited to
cause loss or harm.
– lock
• -(human) guards
– passwords
– network protocols
Alice Bob
data, control
channel
messages
Trudy
Leweyehu Y. Department of Computer Science
Computer Security and Privacy/Attacks
Categories of Attacks
• Interruption: An attack on availability
• Interception: An attack on confidentiality
• Modification: An attack on integrity
• Fabrication: An attack on authenticity
• potential impact they could have on the software and its users.
• This helps to ensure that security is not left to chance and that the
same level of