Computer Security
Computer Security
+233543360606
Do not figure on
opponents not
attacking; worry about
your own lack of
preparation.
PROFFESIONAL COURSES
1.CISSP
2.CERTIFIED ETHICAL HACKER
3.CCNA
4.CISA
5.CISM
6.CRISC
FUNCTIONAL
CODING
VRS
SPEED
VRS
SECURITY
What Is Security?
• In general, security is “the quality or state of being secure
—to be free from danger.” In other words, protection
against adversaries—from those who would do harm,
intentionally or otherwise—is the objective. National
security, for example, is a multilayered system that
protects the sovereignty of a state, its assets, its
resources, and its people. Achieving the appropriate level
of security for an organization also requires a
multifaceted system.
What Is Information Security ?
•The Committee on National Security
Systems (CNSS) defines information
security as the protection of information
and its critical elements, including the
systems and hardware that use, store,
and transmit that information.
AREAS OF SECURITY
Personal Computer Security
Organizational Security
Internet Security
Network Security
Total Security
Key Information Security Concepts
1. ACCESS:
A subject or object’s ability to use,
manipulate, modify, or affect another
subject or object. Authorized users have
legal access to a system, whereas hackers
have illegal access to a system. Access
Key Information Security Concepts
2. Asset:
The organizational resource that is being protected.
An asset can be logical, such as a Web site,
information, or data; or an asset can be physical, such
as a person, computer system, or other tangible
object. Assets, and particularly information assets,
are the focus of security efforts; they are what those
efforts are attempting to protect.
Key Information Security Concepts
3. Attack:
An intentional or unintentional act that
can cause damage to or otherwise
compromise information and/or the
systems that support it.
Key Information Security Concepts
3. Attack:
Attacks can be ACTIVE or PASSIVE, INTENTIONAL or
UNINTENTIONAL, and DIRECT or INDIRECT.
Key Information Security Concepts
3. Attack:
Someone casually reading sensitive
information not intended for his or
her use is a passive attack.
Key Information Security Concepts
3. Attack:
3. Attack:
3. Attack:
An indirect attack is a hacker
compromising a system and using it to
attack other systems, for example, as part
of a botnet (slang for robot network).
Key Information Security Concepts
3. Attack:
This group of compromised computers, running software of
the attacker’s choosing, can operate autonomously or under
the attacker’s direct control to attack systems and steal user
information or conduct distributed denial-of-service
attacks. Direct attacks originate from the threat itself.
Indirect attacks originate from a compromised system or
resource that is malfunctioning or working under the
control of a threat.
Key Information Security Concepts
4. Control, safeguard, or countermeasure: