BETC Security Introduction For Mid
BETC Security Introduction For Mid
Introduction
Computers and digital devices are becoming integral to
conducting business.
Security
In a perfect world, we wouldn’t need
Data
security.
But since we don’t live in that fantasy Application
world… Host
Threats to security
Network
Security talks about “hardening” systems
and resources
Making it harder to hack
Hmmm, now why does this diagram
If it’s too much of a hassle, then only small look so familiar?
percentage will even try…
، إذا كان األمر ينطوي على الكثير من المتاعب
فستحاول نسبة صغيرة فقط
There
Mohammad is
ALNimrat no perfect security 01/23/2025
3
Computer Security
Protection afforded to an automated information system in order
to attain the applicable objectives of preserving the integrity,
availability and confidentiality of information system
resources (including hardware, software, firmware,
information/data, and telecommunications)
Computer Security
This makes computer security particularly challenging because
it is hard enough just to make applications do everything
they are designed to do correctly.
Furthermore, negative requirements are deceptively
complicated to satisfy and require exhaustive testing to verify,
which is impractical for most computer programs.
For this reason, computer security is often a more technical
and mathematical field than some other computer science
fields.
Negative requirements: what the systems should not
do.
Mohammad ALNimrat 01/23/2025
5
Cybersecurity
• Cyber Security is the process and techniques involved in protecting
sensitive data, computer systems, networks and software applications from
cyber attacks.
• Information Security is the protection of information and information systems from
unauthorized access, use, disclosure, disruption, modification or destruction in
order to provide confidentiality, integrity and availability. (more on these later)|
• Cybersecurity is a challenging job that requires attention to detail at the
same time as it demands a higher-level awareness of what’s going on.
• However, like many tasks that seem complex at first glance, Cybersecurity can be
Mohammad ALNimrat 01/23/2025
broken down in to basic steps / procedures that can simplify the process.
7
Cybersecurity challenges
Example
Add fingerprint scan for our information system, for
more protection, beside the existence Password login.
This will lead to increase the Security.
• A lot of users will find out that it become harder to
use it and at the same time.
• Because of False Positive cases, it will become less
functional.
• False Positive is a case where a registered authenticated
users has been denied access to the system.
Confidentiality:
Safeguards information from being accessed by individuals without the
proper clearance, access level, and need to know.
Keeping sensitive information private.
Encryption services can protect your data at rest or in transit and prevent
unauthorized access to protected data.
Mohammad ALNimrat 01/23/2025
14
C I Information
Security
S
A
Integrity Availability
Sensitive Data
Sensitive data is confidential information that must be kept safe and
out of reach from all outsiders unless they have permission to access it.
Access to sensitive data should be limited through sufficient data
security and information security practices designed to prevent data
leaks and data breaches.
Types of sensitive information include:
Personnel
Financial
Payroll
Medical
Privacy Act information.
Mohammad ALNimrat 01/23/2025
19
• Disclosure
• Attempts to defeat confidentiality
• Alteration
• Attempts to defeat integrity
• Destruction
• Attempts to defeat availability
•
The security conundrum:
• If I don’t protect it, they can get to it.
• But if it is well protected, it might identify something worth
getting at by virtue of it being protected!
Mohammad ALNimrat 01/23/2025
The CIA
Triad