CSIT561 Module 1 Introduction
CSIT561 Module 1 Introduction
Module 1
Introduction
Bharath K. Samanthula
Department of Computer Science
Montclair State University
Outline
C-I-A Triad
Controls
Need for Computer Security
Interesting Questions:
How do users communicate online securely?
What countermeasures need to be taken to secure
applications or networks?
1
https://www.gartner.com/en/newsroom/press-releases/
2022-10-13-gartner-identifies-three-factors-influencing-growth-i
Evolution of Computer Security
https://threatmap.checkpoint.com/
https://cybermap.kaspersky.com/
https://threatmap.checkpoint.com/
Recent Cyber Attacks
Growing cyber attacks
Financial losses
Physical attacks
Loss of credibility
Objectives
Keeping data and resources hidden
Targeted or random
Four Common Threats
Interruption
Interception
Modification
Fabrication
Interruption
Organized
Directed
Well-financed
Patient
Silent
https://www.mcafee.com/blogs/enterprise/
5-most-common-types-of-threats-you-need-to-know
https://www.techwalla.com/articles/
the-difference-between-passive-active-attacks-on