You are on page 1of 9

1.

H , ,

. , .
,
, .
,

.

.

1.1
,
. , ,
: secrecy, security, safety, insurance,
assurance, dependability.
H (Information Security)
,
. , ,
.
, ,
:

1.1 (3) .


, .

,
. , ,
1.1:



(CCTV)

1.1 .

(), .
, ,
1.2:



(username
password).

1.2 .

,
. :

:
,
.

: Merriam-Webster,
.

, ,
. ,
:

(Computer Security):

.

(Communication Security):

.

,
(3) , :

(Confidentiality):
() .

(Integrity):
( ) .

(Availability): (
) , .

,
:

(Identification):
(.. ) (.. ).

(Authentication):
.

(Authorization):

,
.

(Non-Repudiation):
.

( )
. ,
,
.

1.2
,
, :

(asset) ( , )
(value) (owner)
.

(user),
(grant) / (privilege)
(access) .
(controller)
.

(danger).
.
(harm).

, ,
(interception) , (modification) , (fabrication)

(interruption) ,
(threat) . :

,
.

,
.

, ()
.

(attack).
.
(vulnerability)
.
:
o

(Human):
()
, (insiders),
.

: ,
(hardware)
(software).

(Media):
,
.

(Communications): ,
, .

(Physical):
(.. datacenters).

(Natural): (..
), ..

(impacts) ,
/
.

(controls)
(countermeasures), (.. , ,
)
. (cost)
.
,
1.2:

1.2 .

,
( )

.

1.3

,
.
, , ..
, ,
, (Internet).
( 1960),

, . ,
ARPANET . ,

,
, , ,
.
, 4 (Internet Protocol version
4), ,
.
, ,
, .
, IPv4,
. ,
,
.

, ,
:

(masquerading):


.

(passive tapping):
, ..
.

(active tapping):
.

(repudiation):
(.. ) .

(denial of service):

.

(replay):
(playback)
(.. ).

(traffic analysis):
( ), /

.

(viruses, Trojan horses, worms):



.


,
. ,
, :

:

..

:
,
..

:

( )
.
, ,

: ,
.
()
() .

:
. , ,

,
, .


.
,
.

1.4

, 2
.
3,
, (firewalls) (IDS),
.
, (Web
applications). 4 5, ,
, .
,
, . 6,
. ,
, 7
,
.
, 8
, ,
9


(PKI).
10,

(VPN) .
11, ,
, .
(),
(digital forensics) ,

,
( , , , ..),
12.

, 13,

.

., . (2002). . :
.
., ., . (2004). . :
.



.
.
1. :
) , .
) , .
) , -.
) , .
2. :
) .
) .
) .
) .
3. :
) .
) .
) .
) .
4. :
) : .
) : .
) : .
) : .
5. :
) .
) .
) .
) .

6. :
) .
) .
) .
) .
7. :
) Security.
) Assurance.
) Insurance.
) Police.
8. :
) .
) .
) .
)
9. - :
) .
) .
) .
)
10. :
) .
) .
) .
)

You might also like