Page 8 - DCAP516_COMPUTER_SECURITY
P. 8

Computer Security




                    Notes          of the mechanisms that enforce the security policy. It also requires knowledge of the related
                                   assumptions and trust, which lead to the threats and the degree to which they may be realized.
                                   Such knowledge allows one to design better mechanisms and policies to neutralize these threats.
                                   This process leads to risk analysis. Human beings are the weakest link in the security mechanisms
                                   of any system. Therefore, policies and procedures must take people into account. This Unit
                                   discusses each of these topics.

                                   Why is Security Important?

                                   Computer security is the process of preventing or detecting unauthorized use of your computer.
                                   Malicious software on your computer can damage files, steal personal information and ultimately
                                   render your computer inoperable. Using the proper security can help prevent these types of
                                   problems.

                                   Privacy Issues

                                   Computers are used for everything from banking to shopping to communication, all things that
                                   you may not want strangers accessing. Generally when people use the Internet their activities
                                   are not private anymore. Anytime you apply for an account, register for something or purchase
                                   something online that information is saved. This information can be sold to marketing companies
                                   without your knowledge or consent. This can be either legal, or illegal, depending on the
                                   circumstances.
                                   Things like online banking and shopping are usually done through secured websites which
                                   protect the user from identity theft, but no security is foolproof and you should be aware of
                                   where you put personal information when you are on the Internet. Social networking sites are
                                   common places that private information is revealed if you are not careful.

                                   1.1 Basic Components of Security

                                   Computer security rests on confidentiality, integrity, and availability. The interpretations of
                                   these three aspects vary, as do the contexts in which they arise. The interpretation of an aspect in
                                   a given environment is dictated by the needs of the individuals, customs, and laws of the
                                   particular organization.
                                   Confidentiality, Integrity and Availability are the basic components of computer security. In
                                   this Unit you will learn briefly about these components.

                                   Confidentiality: A good example is cryptography, which traditionally is used to protect secret
                                   messages. But cryptography is traditionally used to protect data, not resources. Resources are
                                   protected by limiting information, for example by using firewalls or address translation
                                   mechanisms.

                                   Integrity: A good example here is that of an interrupted database transaction, leaving the database
                                   in an inconsistent state. Trustworthiness of both data and origin affects integrity. The term
                                   integrity is tied to trustworthiness makes it much harder to quantify than confidentiality.
                                   Cryptography provides mechanisms for detecting violations of integrity, but not preventing
                                   them (e.g., a digital signature can be used to determine if data has changed). You will study
                                   about cryptography in detail in the subsequent Unit.
                                   Availability: This is usually defined in terms of “quality of service,” in which authorized users
                                   are expected to receive a specific level of service (stated in terms of a metric). Denial of service
                                   attacks are attempts to block availability.






          2                                 LOVELY PROFESSIONAL UNIVERSITY
   3   4   5   6   7   8   9   10   11   12   13