0% found this document useful (0 votes)
39 views

Definitions and Challenges of Security

This document discusses key topics in information and system security. It defines computer security as protecting integrity, availability, and confidentiality of system resources. Network security aims to protect these through software and hardware. Security objectives include confidentiality, integrity, availability, authenticity, and accountability. Breaches are classified as high, moderate, or low severity. Challenges include complexity, attacks, implementation decisions, monitoring, perceptions of security, and usability trade-offs.

Uploaded by

Dharma Reddy
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views

Definitions and Challenges of Security

This document discusses key topics in information and system security. It defines computer security as protecting integrity, availability, and confidentiality of system resources. Network security aims to protect these through software and hardware. Security objectives include confidentiality, integrity, availability, authenticity, and accountability. Breaches are classified as high, moderate, or low severity. Challenges include complexity, attacks, implementation decisions, monitoring, perceptions of security, and usability trade-offs.

Uploaded by

Dharma Reddy
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

SWE3002

Information and System Security


Prof. Selva Rani B
Module-I
Fundamentals of Security

Topic-I
Definitions and Challenges of Security
Computer Security
The NIST Computer Security Handbook defines the
term computer security as:
“the protection afforded to an automated
information system in order to attain the
applicable objectives of preserving the integrity,
availability and confidentiality of information
system resources”
Network Security
• Network security is a broad term that covers a
multitude of technologies, devices and
processes.
• In its simplest term,
“a set of rules and configurations designed
to protect the integrity, confidentiality and
accessibility of computer networks and data using
both software and hardware technologies”
Security Objectives (1/5)
• Confidentiality
– Preserving authorized restrictions on information
access and disclosure, including means for
protecting personal privacy and proprietary
information.
– A loss of confidentiality is the unauthorized
disclosure of information.
Security Objectives (2/5)
• Integrity
– Guarding against improper information
modification or destruction, including ensuring
information nonrepudiation and authenticity.
– A loss of integrity is the unauthorized modification
or destruction of information.
Security Objectives (3/5)
• Availability
– Ensuring timely and reliable access to and use of
information.
– A loss of availability is the disruption of access to
or use of information or an information system.
Security Objectives (4/5)
• Authenticity
– The property of being genuine and being able to
be verified and trusted; confidence in the validity
of a transmission, a message, or message
originator.
– This means verifying that users are who they say
they are and that each input arriving at the system
came from a trusted source.
Security Objectives (5/5)
• Accountability
– Systems must keep records of their activities to
permit later forensic analysis to trace security
breaches or to aid in transaction disputes.
Security Objectives
Security Breach Levels
• High
– The loss could be expected to have a severe or
catastrophic adverse effect on organizational operations,
organizational assets, or individuals
• Moderate
– The loss could be expected to have a serious adverse effect
on organizational operations, organizational assets, or
individuals
• Low
– The loss could be expected to have a limited adverse effect
on organizational operations, organizational assets, or
individuals
Security Challenges
• Security is not simple
• Potential attacks on the security features need to be considered
• It is necessary to decide where to use the various security
mechanisms
• Requires constant monitoring
• Security mechanisms typically involve more than a particular
algorithm or protocol
• Little benefit from security investment is perceived until a
security failure occurs
• Strong security is often viewed as an impediment to efficient
and user-friendly operation

You might also like