Computer-Security-LEC-1
Computer-Security-LEC-1
Lecture 1
20 % midterm
60 % Final Exam
Textbooks
Asymmetric encryption
Authentication protocols
Integrity
• Data integrity
• Assures that information and programs are changed only in a specified
and authorized manner
• System integrity
• Assures that a system performs its intended function in an unimpaired
manner, free from deliberate or inadvertent unauthorized manipulation
of the system
Availability
• Assures that systems work promptly, and service is not denied to
authorized users
© 2017 Pearson Education, Ltd., All rights reserved.
• Authenticity: The property of being genuine and being able to be
verified and trusted; confidence in the validity of a transmission, a message,
or message originator. This means verifying that users are who they say they
are and that each input arriving at the system came from a trusted source.
1. Authentication.
2. Access Control.
3. Data Confidentiality.
4. Data Integrity.
5. Nonrepudiation.
Authentication