Esson: Computer Security
Esson: Computer Security
Esson: Computer Security
COMPUTER SECURITY
TOPICS
1. Computer Security Concepts
2. Threats, Assets, and Attacks
3. Security Functional Requirements
4. Fundamental Security Design and Principles
5. Attack Surfaces and Attack Trees
6. Computer Security Strategies
LEARNING OUTCOMES
INTEGRITY
A hospital patient’s allergy information (high integrity data): a doctor should be able to trust
that the info is correct and current - If a nurse deliberately falsifies the data, the database
should be restored to a trusted basis and the falsified information traced back to the person
who did it
• An online newsgroup registration data: moderate level of integrity
• An example of low integrity requirement: anonymous online poll (inaccuracy is well
understood)
AVAILABILITY
• A system that provides authentication: high availability requirement - If customers cannot
access resources, the loss of services could result in financial loss
• A public website for a university: a moderate availably requirement; not critical but causes
embarrassment
• An online telephone directory lookup: a low availability requirement because unavailability is
mostly annoyance (there are alternative sources)
ELEMENTS OF SECURITY
Non-
Confidentiality Authenticity Integrity Availability
repudiation
THE
Security
(Restrictions)
Functionality
Ease of Use
(Features)
MAINTENANCE – managing all the changes in the computer applications and keep them
up to date
REACTION – acting timely when security incidents occur.