Chapter 1
Chapter 1
Sem. II - 2018
Honelet E. (MSc)
Department of Computer Science
Institute of Technology
Ambo University
Computer Security and Privacy
Not Sufficient!!
Internet
Course Outline
1. Fundamentals of computer security & privacy
Overview: history, vulnerabilities, countermeasures, physical security
2. Computer security attacks/threats
Viruses, Worms, Trojan horses, Crackers, Spy-wares …
3. Cryptography and Encryption Techniques
4. Network security concepts and mechanisms
Transport and Application layer security, IP security, …
Evaluation: 30% assignments/projects , 30% test & 40%
final exam.
References
1. Computer security basics, D. Russel and G. Gangemi
2. Security Complete, BPB Publications
3. Computer Security Fundamentals, Chuck Easttom
4. Network Security Essentials, W. Stallings
5. Effective Physical Security, Lawrence Fennelly
6. Information Security Policies and Procedures, Thomas R.
Peltier
7. Physical Security for IT, Erbschloe Michael
8. Computer Security: Art and Science, Matt Bishop
Computer Security and Privacy
Security Goals
Prevention of unauthorized
disclosure of information
Confidentiality
Prevention of unauthorized
Prevention of unauthorized
withholding of information
modification of information
or resource
Integrity
Availaibility
Computer Security and Privacy/ Overview
Definitions
Security: The protection of computer assets from
unauthorized access, use, alteration, degradation,
destruction, and other threats.
Early Efforts
1960s: Marked as the beginning of true
computer security
1970s: Tiger teams
Government and industry sponsored crackers who attempted
to break down defenses of computer systems in order to
uncover vulnerabilities so that patches can be developed
Categories of Attacks
Destination
Normal flow of information
Attack
Interruption Interception
Modification Fabrication
Computer Security and Privacy/Vulnerabilities
Types of Vulnerabilities
Today
Computers are more and more portable (PC, laptop,
PDA, Smartphone)
There are too many of them to have good physical
security for each of them
They are not “too expensive” to justify spending more
money on physical security until a major crisis occurs
Users don’t accept restrictions easily
Accessories (ex. Network components) are not
considered as important for security until there is a problem
Access to a single computer may endanger many more
computers connected through a network
Computer Security and Privacy/ Physical Security
=>
Physical security is much more difficult to
achieve today than some decades ago
Computer Security and Privacy/ Physical Security
Solution
Avoid having servers in areas often hit by Natural Disasters!
Computer Security and Privacy/ Physical Security
External thieves
Portable computing devices can be stolen outside the
organization’s premises
Loss of a computing device
Mainly laptop
Computer Security and Privacy/ Physical Security
Safe area