Professional Documents
Culture Documents
Chapter 1 - Is There A Security Problem
Chapter 1 - Is There A Security Problem
Chapter 1
Is There a Security Problem
in Computing?
Chapter 1
Chapter 1
2.
3.
Chapter 1
Chapter 1
Chapter 1
This chapter
Chapter 1
Chapter 1
Chapter 1
the attackers can (and will) use any means they can.
Chapter 1
Attacks
One of your jobs is to imagine how the system could
malfunction.
Then, you improve the system's design so that the
system can withstand any of the problems you have
identified.
10
Chapter 1
11
Chapter 1
12
Chapter 1
Threats
We can view any threat as being one of four
kinds: interception, interruption, modification,
and fabrication.
13
Chapter 1
Threats
14
Chapter 1
15
Chapter 1
16
Chapter 1
17
Chapter 1
18
Chapter 1
19
Chapter 1
20
Chapter 1
21
Chapter 1
Vulnerabilities
22
Chapter 1
23
Hardware Vulnerabilities
Chapter 1
Software Vulnerabilities
24
Chapter 1
25
Chapter 1
26
Chapter 1
Networks
Key People
27
Chapter 1
Computer Criminals
28
Chapter 1
Computer Criminals
Amateurs
29
Chapter 1
Computer Criminals
Career Criminals
30
Chapter 1
Methods of Defense
We can deal with harm in several ways. We can
seek to
31
Chapter 1
Methods of Defense
32
Chapter 1
Controls Available
Encryption
33
Chapter 1
Controls Available
34
Chapter 1
Controls Available
Software/Program Controls
35
Chapter 1
Controls Available
36
Chapter 1
Controls Available
Hardware Controls
37
Chapter 1
Controls Available
Physical Controls
38
Chapter 1
Effectiveness of Controls
Awareness of Problem
39
Chapter 1
Effectiveness of Controls
Likelihood of Use
40
Chapter 1
Effectiveness of Controls
Overlapping Controls
Periodic Review
41
Chapter 1
42
Chapter 1
Summary
43