SlideShare a Scribd company logo
Security
Lecture 1
security introduction and overview lecture1 .pptx
Introduction
• Computer security- ways and means taken to protects computer and
everything associated with it :
- Hardware
-Software
-Storage media
-Data
-Persons( authorized users)
-Information( Information Security)
• Secure computing resources against unauthorized users ( attackers,
outsider) as well as from natural disasters
Introduction
• Computer security:
• -Preventing attackers from achieving objectives through unauthorized
access or unauthorized use of computers and networks.
• -Keeping anyone from doing things you don not want them to do,
with on or from your computers or any peripheral devices
Introduction
• The protection afforded to an automated information system in order
to attain the applicable objectives of preserving the integrity,
availability and confidentiality of information system resources
(includes hardware, software, firmware, information/data, and
telecommunications)
Key Security Concepts
Network and computer security Requirements
CIA
• Confidentiality
– Data Confidentiality :protection of data from
unauthorized disclosure
• Integrity
– Data Integrity: assurance that data received is as sent by
an authorized entity
• Availability
– Systems work promptly and service is not denied to
authorized users.( resource accessible/usable)
Computer Security Challenges
1. not simple
2. must consider potential attacks
3. involve algorithms and secret info
4. battle of wits between attacker / admin
5. requires regular monitoring
6. regarded as impediment to using system
Principles of Secure Design
1. Least Priviledge
2. Fail Safe Defaults
3. Economy of Mechanism
4. Complete Mediation
5. Defense in depth
6. Open Design
7. Separation of priviledge
8. Least Common Mechanism
9. Psychological Acceptability
Principle of Least Priviledge
• Asubject should only be given the priviledges it needs to complete its
task and no more.
• The priviledges should be controlled by the function , not the identity
,similar to the right to know principle.
• Foe example, a cashier cannot write checks.
Principle of Fail-Safe Defaults
• Unless explicit acess has been granted ,access should be
denied.Moreover, if a system is unable to complete a task, it should
roll back to the start state, for safety.
• Example: A regular user may not modify other people’s mail files; in
addition, if the mail program cannot deliver mail, the only thing it can
do is report failure.
Principle of Economy of Mechanism
• Security mechanisms should be as simple as possible.
• This way, it is easier to check for errors.
Principle of Complete Mediation
• All accesses to objects must be checked to ensure that they are still
allowed.
Principle of Defense in Depth
• The more lines of defense there are against an attacker, the better the
defense, specially if the additional line(s) are of different nature.
Principle of Open Design
• The security of a mechanism should not depend on the secrecy of its
design or implementation.
• Specially important for crypto.
• Example DVD’s
Principle of Separation of Priviledge
• A system should not grant permission based on a single condition.
• Example :on BSD systems, su users must belong to the wheel group
and know the root password.
Principle of Least Common Mechanism
• Mechanisms to access resources should not be shared(because they
provide a haven for covert channels)
Principle of psychological Acceptability
• Security mechanisms should not make it more difficult to access a
resource.
• Example: ssh, login mechanism.

More Related Content

PDF
Security Principles and Protection Mechanism
PPT
ch0001 computer systems security and principles and practices
PPTX
1. Introduction to Information Security.pptx
PPTX
Dos unit 5
PPTX
Security and management
PPTX
SECURITY PRINCIPLES AND SECURITY SERVICES.pptx
PPT
its a computer security based ppt which is very useful
PPTX
Protection and security
Security Principles and Protection Mechanism
ch0001 computer systems security and principles and practices
1. Introduction to Information Security.pptx
Dos unit 5
Security and management
SECURITY PRINCIPLES AND SECURITY SERVICES.pptx
its a computer security based ppt which is very useful
Protection and security

Similar to security introduction and overview lecture1 .pptx (20)

PDF
Information Security basic introduction by professor
PDF
Chapter 1 - Introduction.pdf
PPTX
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
PPTX
Security & Protection in Operating System
PDF
Health Information Privacy and Security
PPTX
System protection in Operating System
PPT
Network security desighn principles and authentication
PPTX
Principles of Secure Design and its componetnts
PPT
Encryption and some other information and
DOCX
General Security ConceptsChapter 2Principles of Comput.docx
PPT
Protection and Security in Operating Systems
PPTX
Foundation of the information securiety
PDF
Basic security concepts_chapter_1_6perpage
PPT
Computer Securityyyyyyyy - Chapter 1.ppt
PDF
information security introduction for campus students.pdf
PPT
Overview
PDF
OPERATING SYSTEM SECURITY
PPT
20-security.ppt
PPT
basic-security-concepts-what-is-security48.ppt
DOCX
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
Information Security basic introduction by professor
Chapter 1 - Introduction.pdf
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
Security & Protection in Operating System
Health Information Privacy and Security
System protection in Operating System
Network security desighn principles and authentication
Principles of Secure Design and its componetnts
Encryption and some other information and
General Security ConceptsChapter 2Principles of Comput.docx
Protection and Security in Operating Systems
Foundation of the information securiety
Basic security concepts_chapter_1_6perpage
Computer Securityyyyyyyy - Chapter 1.ppt
information security introduction for campus students.pdf
Overview
OPERATING SYSTEM SECURITY
20-security.ppt
basic-security-concepts-what-is-security48.ppt
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
Ad

More from nagwaAboElenein (20)

PDF
Cryptographic Hash Functions message auhentication
PDF
Difference between Active attack and Passive
PPTX
Difference between Active attack and Passive attack
PPTX
Chapter 1: Computer Vision Introduction.pptx
PPTX
Chapter 1: Computer Vision Introduction.pptx
PPTX
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
PPT
研究生学位论文在线提交Electronic thesis online submission(20210527).ppt
PPTX
brain tumor.pptx
PDF
Lec_9_ Morphological ImageProcessing .pdf
PDF
Lec_8_Image Compression.pdf
PDF
Semantic Segmentation.pdf
PPTX
lecture1.pptx
PDF
Lec_4_Frequency Domain Filtering-I.pdf
PDF
Lec_3_Image Enhancement_spatial Domain.pdf
PDF
Lec_2_Digital Image Fundamentals.pdf
PDF
Lec_1_Introduction.pdf
PPTX
Lecture3.pptx
PDF
Image Segmentation Techniques for Remote Sensing Satellite Images.pdf
PDF
Fundamentals_of_Digital image processing_A practicle approach with MatLab.pdf
PDF
Lec_1_Introduction.pdf
Cryptographic Hash Functions message auhentication
Difference between Active attack and Passive
Difference between Active attack and Passive attack
Chapter 1: Computer Vision Introduction.pptx
Chapter 1: Computer Vision Introduction.pptx
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
研究生学位论文在线提交Electronic thesis online submission(20210527).ppt
brain tumor.pptx
Lec_9_ Morphological ImageProcessing .pdf
Lec_8_Image Compression.pdf
Semantic Segmentation.pdf
lecture1.pptx
Lec_4_Frequency Domain Filtering-I.pdf
Lec_3_Image Enhancement_spatial Domain.pdf
Lec_2_Digital Image Fundamentals.pdf
Lec_1_Introduction.pdf
Lecture3.pptx
Image Segmentation Techniques for Remote Sensing Satellite Images.pdf
Fundamentals_of_Digital image processing_A practicle approach with MatLab.pdf
Lec_1_Introduction.pdf
Ad

Recently uploaded (20)

PPTX
Welding lecture in detail for understanding
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
DOCX
573137875-Attendance-Management-System-original
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
additive manufacturing of ss316l using mig welding
PPT
Mechanical Engineering MATERIALS Selection
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
PPT on Performance Review to get promotions
PPTX
Geodesy 1.pptx...............................................
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Welding lecture in detail for understanding
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
UNIT 4 Total Quality Management .pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
573137875-Attendance-Management-System-original
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
additive manufacturing of ss316l using mig welding
Mechanical Engineering MATERIALS Selection
Model Code of Practice - Construction Work - 21102022 .pdf
PPT on Performance Review to get promotions
Geodesy 1.pptx...............................................
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
CYBER-CRIMES AND SECURITY A guide to understanding
Embodied AI: Ushering in the Next Era of Intelligent Systems
Foundation to blockchain - A guide to Blockchain Tech
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Strings in CPP - Strings in C++ are sequences of characters used to store and...
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT

security introduction and overview lecture1 .pptx

  • 3. Introduction • Computer security- ways and means taken to protects computer and everything associated with it : - Hardware -Software -Storage media -Data -Persons( authorized users) -Information( Information Security) • Secure computing resources against unauthorized users ( attackers, outsider) as well as from natural disasters
  • 4. Introduction • Computer security: • -Preventing attackers from achieving objectives through unauthorized access or unauthorized use of computers and networks. • -Keeping anyone from doing things you don not want them to do, with on or from your computers or any peripheral devices
  • 5. Introduction • The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications)
  • 7. Network and computer security Requirements CIA • Confidentiality – Data Confidentiality :protection of data from unauthorized disclosure • Integrity – Data Integrity: assurance that data received is as sent by an authorized entity • Availability – Systems work promptly and service is not denied to authorized users.( resource accessible/usable)
  • 8. Computer Security Challenges 1. not simple 2. must consider potential attacks 3. involve algorithms and secret info 4. battle of wits between attacker / admin 5. requires regular monitoring 6. regarded as impediment to using system
  • 9. Principles of Secure Design 1. Least Priviledge 2. Fail Safe Defaults 3. Economy of Mechanism 4. Complete Mediation 5. Defense in depth 6. Open Design 7. Separation of priviledge 8. Least Common Mechanism 9. Psychological Acceptability
  • 10. Principle of Least Priviledge • Asubject should only be given the priviledges it needs to complete its task and no more. • The priviledges should be controlled by the function , not the identity ,similar to the right to know principle. • Foe example, a cashier cannot write checks.
  • 11. Principle of Fail-Safe Defaults • Unless explicit acess has been granted ,access should be denied.Moreover, if a system is unable to complete a task, it should roll back to the start state, for safety. • Example: A regular user may not modify other people’s mail files; in addition, if the mail program cannot deliver mail, the only thing it can do is report failure.
  • 12. Principle of Economy of Mechanism • Security mechanisms should be as simple as possible. • This way, it is easier to check for errors.
  • 13. Principle of Complete Mediation • All accesses to objects must be checked to ensure that they are still allowed.
  • 14. Principle of Defense in Depth • The more lines of defense there are against an attacker, the better the defense, specially if the additional line(s) are of different nature.
  • 15. Principle of Open Design • The security of a mechanism should not depend on the secrecy of its design or implementation. • Specially important for crypto. • Example DVD’s
  • 16. Principle of Separation of Priviledge • A system should not grant permission based on a single condition. • Example :on BSD systems, su users must belong to the wheel group and know the root password.
  • 17. Principle of Least Common Mechanism • Mechanisms to access resources should not be shared(because they provide a haven for covert channels)
  • 18. Principle of psychological Acceptability • Security mechanisms should not make it more difficult to access a resource. • Example: ssh, login mechanism.