TAILIEUCHUNG - Computer Security: Chapter 1 - Introduction to Computer Security

Computer Security: Chapter 1 - Introduction to Computer Security includes Examples – Security in Practice, What is Security? Pillars of Security; Vulnerabilities, Threats, and Controls; ttackers; How to React to an Exploit? Methods of Defense, Principles of Computer Security. | 1. Introduction to Computer Security Prof. Bharat Bhargava Department of Computer Sciences, Purdue University August 2006 In collaboration with: Prof. Leszek T. Lilien, Western Michigan University Slides based on Security in Computing. Third Edition by Pfleeger and Pfleeger. © by Bharat Bhargava, 2006 Requests to use original slides for non-profit purposes will be gladly granted upon a written request. Introduction to Security Outline 1. Examples – Security in Practice 2. What is „Security?” 3. Pillars of Security: Confidentiality, Integrity, Availability (CIA) 4. Vulnerabilities, Threats, and Controls 5. Attackers 6. How to React to an Exploit? 7. Methods of Defense 8. Principles of Computer Security [cf. Csilla Farkas, University of South Carolina] Information hiding Privacy Security Trust Applications Policy making Formal models Negotiation Network security Anonymity Access control Semantic web security Encryption Data mining System monitoring Computer epidemic Data provenance Fraud Biometrics Integrity Vulnerabilities Threats 1. Examples – Security in Practice From CSI/FBI Report 2002 90% detected computer security breaches within the last year 80% acknowledged financial losses 44% were willing and/or able to quantify their financial losses. These 223 respondents reported $455M in financial losses. The most serious financial losses occurred through theft of proprietary information and financial fraud: 26 respondents: $170M 25 respondents: $115M For the fifth year in a row, more respondents (74%) cited their Internet connection as a frequent point of attack than cited their internal systems as a frequent point of attack (33%). 34% reported the intrusions to law enforcement. (In 1996, only 16% acknowledged reporting intrusions to law enforcement.) Barbara Edicott-Popovsky and Deborah Frincke, CSSE592/492, U. Washington] More from CSI/FBI 2002 40% detected external penetration 40% detected denial of service attacks. 78% detected employee .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.