SlideShare a Scribd company logo
COMPUTER SECURITY
Prof. Neeraj Bhargava
Mrs.Shubha Chaturvedi
Department of Computer Science, School of Engineering & System Science
MDS University Ajmer, Rajasthan
The NIST Computer Security defines the term
computer security as:
The protection afforded to an automated
information of system in order to attain the
applicable objectives preserving the integrity,
availability, and confidentiality of information
system resources (includes hardware, software,
firmware, information /data and
telecommunications).
Confidentiality
Integrity
Availability
This term covers two related concepts:
 Data Confidentiality: Assures that private or
confidential information is not made
available or disclosed to unauthorized
individuals.
 Privacy: Assures that individuals control or
influence what information related to them
may be collected and stored and by whom
and to whom that information may be
disclosed.
This term covers two related concepts:
 Data integrity: Assures that information and
programs are changed only in a specified and
authorized manner.

 System integrity: Assures that a system
performs its intended function in an
unimpaired manner, free from deliberate or
inadvertent unauthorized manipulation of
the system.
 Assures that systems work promptly and
service is not denied to authorized users.
COMPUTER SECURITY
 Although the use of the CIA triad to define
security objectives is well estab-lished, some
in the security field feel that additional
concepts are needed to present a complete
picture.
 Authenticity:
 Accountability:
 Authenticity: The property of being genuine
and being able to be verified and trusted;
confidence in the validity of a transmission,
a message, or message originator. This means
verifying that users are who they say they
are and that each input arriving at the
system came from a trusted source.
 Accountability: The security goal that
generates the requirement for actions of an
entity to be traced uniquely to that entity.
This supports nonrepudiation, deterrence,
fault isolation, intrusion detection and
prevention, and after-action recovery and
legal action. Because truly secure systems
are not yet an achievable goal, we must be
able to trace a security breach to a
responsible party. Systems must keep records
of their activities to permit later forensic
analysis to trace security breaches or to aid
in transaction disputes.
The OSI security architecture is useful to
managers as a way of organizing the task of
providing security. Furthermore, because this
architecture was developed as an
international standard, computer and
communications vendors have developed
security features for their products and
services that relate to this structured
definition of services and mechanisms.
The OSI security architecture focuses on security
Attacks, Mechanisms and Services. These can
be defined briefly as:
 Security Attack: Any action that compromises the
security of information owned by an organization.
 Security Mechanism: A process (or a device
incorporating such a process) that is designed to
detect, prevent, or recover from a security attack.
 Security Service: A processing or communication
service that enhances the security of the data
processing systems and the information transfers of
an organization. The services are intended to
counter security attacks, and they make use of one
or more security mechanisms to provide the
service.

More Related Content

PPTX
Cyber Security Awareness
PDF
Cyber Security Awareness Training
PDF
Penetration testing & Ethical Hacking
PDF
Malicious software
PPTX
Security threats and safety measures
PPTX
Protection and security
PPT
Ethical Hacking
Cyber Security Awareness
Cyber Security Awareness Training
Penetration testing & Ethical Hacking
Malicious software
Security threats and safety measures
Protection and security
Ethical Hacking

What's hot (20)

PPTX
System hardening - OS and Application
PPTX
Cyber security
PPT
Spywares & Keyloggers
PPTX
Black hat hackers
PPTX
Spyware powerpoint
PPTX
Cyber Security PPT.pptx
PDF
Ceh v5 module 08 denial of service
PPTX
Introduction to information security
PPT
Need for security
DOCX
Ethical hacking
PPT
PPTX
Ethical privacy and security issues
PPT
DDoS Attack PPT by Nitin Bisht
PPTX
Malicious Software
PPTX
CYBER SECURITY AND ETHICAL HACKING.pptx
PPTX
Cybersecurity Audit
PPTX
PPT
Implementing security
PPTX
Ethical Hacking & Network Security
System hardening - OS and Application
Cyber security
Spywares & Keyloggers
Black hat hackers
Spyware powerpoint
Cyber Security PPT.pptx
Ceh v5 module 08 denial of service
Introduction to information security
Need for security
Ethical hacking
Ethical privacy and security issues
DDoS Attack PPT by Nitin Bisht
Malicious Software
CYBER SECURITY AND ETHICAL HACKING.pptx
Cybersecurity Audit
Implementing security
Ethical Hacking & Network Security
Ad

Similar to COMPUTER SECURITY (20)

PPTX
Ch1 Cryptography network security slides.pptx
PPTX
Introduction to Cryptography
PPT
ch1-1.ppt
PPT
VIT311 Network Security Essentials Unit 1.ppt
PPTX
System Security-Chapter 1
PDF
Network security chapter 1
PPT
Network and Information Security unit 1.ppt
PPTX
CYBER LAW & ETHICS (PART OF THE JNTUH SYLLABUS
PPT
Cryptography - Unit I | Introduction to Security Concepts
PDF
Introduction to security
PPT
lecture2-1 part one about cryptography.ppt
PDF
Ch01 NetSec5e.pdf
PPTX
abc.pptx
PPT
ch01_overview_nemo.ppt
PPT
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
PPT
ch01_overview_nemo.ppt
PPT
ch01_overview_nemo.ppt
PPT
Ch01 overview nemo
PPT
ch01_overview.ppt
PPT
ch01_overview.ppt
Ch1 Cryptography network security slides.pptx
Introduction to Cryptography
ch1-1.ppt
VIT311 Network Security Essentials Unit 1.ppt
System Security-Chapter 1
Network security chapter 1
Network and Information Security unit 1.ppt
CYBER LAW & ETHICS (PART OF THE JNTUH SYLLABUS
Cryptography - Unit I | Introduction to Security Concepts
Introduction to security
lecture2-1 part one about cryptography.ppt
Ch01 NetSec5e.pdf
abc.pptx
ch01_overview_nemo.ppt
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
ch01_overview_nemo.ppt
ch01_overview_nemo.ppt
Ch01 overview nemo
ch01_overview.ppt
ch01_overview.ppt
Ad

More from SHUBHA CHATURVEDI (20)

PPT
Shell and its types in LINUX
PPT
Unix and its Components
PPT
Linux Advantages and Disadvantages
PPT
Linux Features
PPT
Architecture of Linux
PPT
Introduction and history of linux
PPTX
Block Cipher and Operation Modes
PPT
Block Cipher and its Design Principles
POTX
Stream Ciphers
PPT
Symmetric Key Algorithm
PPTX
Product Cipher
PPTX
Transposition cipher techniques
PPTX
Polygraphic Substitution Cipher - Part 2
PPTX
Polygraphic Substitution Cipher -Part 1
PPT
Homophonic Substitution Cipher
PPT
Polyalphabetic Substitution Cipher
PPT
Monoalphabetic Substitution Cipher
PPT
Classical encryption techniques
PPT
Types of attack -Part3 (Malware Part -2)
PPT
CLASSICAL ENCRYPTION TECHNIQUE- PART 1
Shell and its types in LINUX
Unix and its Components
Linux Advantages and Disadvantages
Linux Features
Architecture of Linux
Introduction and history of linux
Block Cipher and Operation Modes
Block Cipher and its Design Principles
Stream Ciphers
Symmetric Key Algorithm
Product Cipher
Transposition cipher techniques
Polygraphic Substitution Cipher - Part 2
Polygraphic Substitution Cipher -Part 1
Homophonic Substitution Cipher
Polyalphabetic Substitution Cipher
Monoalphabetic Substitution Cipher
Classical encryption techniques
Types of attack -Part3 (Malware Part -2)
CLASSICAL ENCRYPTION TECHNIQUE- PART 1

Recently uploaded (20)

PDF
Classroom Observation Tools for Teachers
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
Computing-Curriculum for Schools in Ghana
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
Hazard Identification & Risk Assessment .pdf
PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PDF
advance database management system book.pdf
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
History, Philosophy and sociology of education (1).pptx
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
Complications of Minimal Access Surgery at WLH
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
Classroom Observation Tools for Teachers
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Computing-Curriculum for Schools in Ghana
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
Hazard Identification & Risk Assessment .pdf
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
advance database management system book.pdf
Practical Manual AGRO-233 Principles and Practices of Natural Farming
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
LDMMIA Reiki Yoga Finals Review Spring Summer
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
History, Philosophy and sociology of education (1).pptx
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Complications of Minimal Access Surgery at WLH
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Final Presentation General Medicine 03-08-2024.pptx

COMPUTER SECURITY

  • 1. COMPUTER SECURITY Prof. Neeraj Bhargava Mrs.Shubha Chaturvedi Department of Computer Science, School of Engineering & System Science MDS University Ajmer, Rajasthan
  • 2. The NIST Computer Security defines the term computer security as: The protection afforded to an automated information of system in order to attain the applicable objectives preserving the integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information /data and telecommunications).
  • 4. This term covers two related concepts:  Data Confidentiality: Assures that private or confidential information is not made available or disclosed to unauthorized individuals.  Privacy: Assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.
  • 5. This term covers two related concepts:  Data integrity: Assures that information and programs are changed only in a specified and authorized manner.   System integrity: Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.
  • 6.  Assures that systems work promptly and service is not denied to authorized users.
  • 8.  Although the use of the CIA triad to define security objectives is well estab-lished, some in the security field feel that additional concepts are needed to present a complete picture.  Authenticity:  Accountability:
  • 9.  Authenticity: The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or message originator. This means verifying that users are who they say they are and that each input arriving at the system came from a trusted source.
  • 10.  Accountability: The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity. This supports nonrepudiation, deterrence, fault isolation, intrusion detection and prevention, and after-action recovery and legal action. Because truly secure systems are not yet an achievable goal, we must be able to trace a security breach to a responsible party. Systems must keep records of their activities to permit later forensic analysis to trace security breaches or to aid in transaction disputes.
  • 11. The OSI security architecture is useful to managers as a way of organizing the task of providing security. Furthermore, because this architecture was developed as an international standard, computer and communications vendors have developed security features for their products and services that relate to this structured definition of services and mechanisms.
  • 12. The OSI security architecture focuses on security Attacks, Mechanisms and Services. These can be defined briefly as:  Security Attack: Any action that compromises the security of information owned by an organization.  Security Mechanism: A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack.  Security Service: A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the service.