Introduction-1
Introduction-1
Lecture - 1
Topics
• Computer Security
• Goals of Computer Security
• Principles of Computer Security
• Security Policy
Computer Security
Definition:
Computer Security is the ability of a system to
protect information and system resources with
respect to confidentiality and integrity.
Aspects of Security:
– Prevention: take measures that prevent your assets
from being damaged
– Detection: take measures so that you can detect when,
how, and by whom an asset has been damaged
– Reaction: take measures so that you can recover your
assets or to recover from a damage to your assets
Computer Security - Goals
1. Confidentiality: Preventing, detecting or deterring
the improper disclosure of information
2. Integrity: Preventing, detecting, or deterring the
improper modification of data
3. Availability: Preventing, detecting, or deterring the
unauthorized denial of service or data to legitimate
users
4. Authenticity: Ensuring that users of data/resources
are the persons they claim to be
5. Accountability: Able to trace breach of security back
to responsible party
Confidentiality
• Prevent unauthorised disclosure of information
• Two aspects of confidentiality
– Privacy: protection of personal data
– e.g., personal medical records, student grade information
– Secrecy: protection of data belonging to an
organisation
– e.g., Formula for a new drug, plans for the company for the next 5
years, Student Records
Integrity
• Detection (and correction) of intentional and
accidental modifications of data in a computer
system
• Various examples of modification
– Corruption of hard drive
– Changing course grades by breaking into
university records
– Transferring money from one account to another
account fraudulently
Availability
• The property that a product’s services are
accessible when needed and without undue
delay
• Denial of Service is the prevention of
authorised access of resources or the delaying
of time-critical operations
• Distributed Denial of Service occurs when
multiple sources contribute to denial of service
simultaneously
Accountability
• Audit information must be selectively kept and
protected so that actions affecting security can
be traced to the responsible party
• Users are identified and authenticated to have a
basis for access control decisions.
• The security system keeps an audit log (audit
trail) of security relevant events to detect and
investigate intrusions.
Principles of Computer Security - I
Application
Software
User Resource
(subject) (object)
Hardware
applications
services (middleware)
operating system
OS kernel
hardware
Functionality Ease-of-Use
applications
services (middleware)
operating system
Hackers attack at
OS kernel level below security
perimeter
hardware