- The Security Problem
- Program Threats
- System and Network Threats
- Cryptography as a Security Tool
- User Authentication
- Implementing Security Defenses
- Firewalling to Protect Systems and Networks
- Computer-Security Classifications
- An Example: Windows XP
- To discuss security threats and attacks
- To explain the fundamentals of encryption, authentication, and hashing
- To examine the uses of cryptography in computing
- To describe the various countermeasures to security attacks
- Security must consider external environment of the system, and protect the
system resources - Intruders (crackers) attempt to breach security
- Threat is potential security violation
- Attack is attempt to breach security
- Attack can be accidental or malicious
- Easier to protect against accidental than malicious misuse
- Security Violations
- Breach of confidentiality
- Breach of integrity
- Breach of availability
- Theft of service
- Denial of service
- Masquerading (breach authentication)
- Replay attack Message modification
- Man-in-the-middle attack
- Session hijacking
Security Measure Levels
- Security must occur at four levels to be effective
- Physical
- Human Avoid social engineering, phishing, dumpster diving
- Operating System
- Network
- Code segment that misuses its environment
- Exploits mechanisms for allowing programs written by users to be executed by
other users - Spyware, pop-up browser windows, covert channels
- Specific user identifier or password that circumvents normal security procedures
- Could be included in a compiler
- Program that initiates a security incident under certain circumstances
- Exploits a bug in a program (overflow either the stack or memory buffers)
0 comments:
Posting Komentar
Terimakasih atas kunjungan anda semua, sebelumnya mohon maaf kami tidak menerima komentar yang berbau tentang pornografi.
TERIMAKASIH atas partisipasinya.