Chapter 1 What is Security Engineering?. Security Engineering Building systems that remain stable Malice Error Mischance Focuses on Tool Processes Methods.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Chapter 1  Introduction 1 Chapter 1: Introduction.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
Class 1 Background, Tools, and Trust CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Security+ Guide to Network Security Fundamentals
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
Chapter 1  Introduction 1 Overview  What is a secure computer system?  Concerns of a secure system o Data: Privacy, Integrity, Availability o Users:
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
DATABASES FROM HCT LIBRARIES. HCT has many online databases for students to use to find information. A database is a collection of information organized.
David L. Wasley Office of the President University of California Maybe it’s not PKI … Musings on the business case for PKI EDUCAUSEEDUCAUSE PKI Summit.
Securing Information Systems
Thomas Levy. Agenda 1.Aims: CIAN 2.Common Business Attacks 3.Information Security & Risk Management 4.Access Control 5.Cryptography 6.Physical Security.
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Security in Computer System 491 CS-G(172) By Manesh T
Becoming a Digital Citizen Acknowledgments Thanks to UNC: The Graduate School for this PowerPoint Layout, Microsoft gallery for photos, and Commonsense.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
Security Engineering Assurance & Control Objectives Priyanka Vanjani ASU Id #
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
©Ian Sommerville 2004Software Engineering Case Studies Slide 1 The Internet Worm Compromising the availability and reliability of systems through security.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
CMSC 414 Computer (and Network) Security Lecture 11 Jonathan Katz.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
Lesson 15 : Networks And The Internet
Energize Your Workflow! ©2006 Merge eMed. All Rights Reserved User Group Meeting “Energize Your Workflow” May 7-9, Security.
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
12/18/20151 Computer Security Introduction. 12/18/20152 Basic Components 1.Confidentiality: Concealment of information (prevent unauthorized disclosure.
Ingredients of Security
Intro to Computer Security For COP3502, Intro to Computer Science Lecture 1 1.
Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean, Responsible Conduct of Research Weill Medical College of Cornell.
Bruce Schneier. Article to read mann mann Systems must fail smartly.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.
For the University of Kansas Medical Center How to sign up for RAVE Emergency Text Messaging.
SECURITY REQUIREMENTS AND MANAGEMENT: Presentation By: Guillermo Dijk.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Database Security Threats. Database An essential corporate resource Data is a valuable resource Must be strictly controlled, managed and secured May have.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill/Irwin Chapter 6 The Privacy and Security of Electronic Health Information.
Information Security, Theory and Practice.
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Security
Computer Literacy – Grade 8
Chapter 17 Risks, Security and Disaster Recovery
Chapter 5 Electronic Commerce | Security
Intercepting Communications
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Chapter 5 Electronic Commerce | Security
Prepared By : Binay Tiwari
Computer Literacy – Grade 8
Presentation transcript:

Chapter 1 What is Security Engineering?

Security Engineering Building systems that remain stable Malice Error Mischance Focuses on Tool Processes Methods

Expertise for security Engineering Cryptography Computer security Hardware tamper resistance Applied Psychology Audit methods Law System engineering Business process analysis Software engineering

Critical assurance requirements Human life and environment Nuclear safety Military Economic infrastructure Bank systems Personal privacy Medical system Business sectors Pay TV Internet sale Crime Burglar and car alarms

Security v software engineering Software Ensuring that certain things can happen and happen properly Security Ensuring that certain things can not happen

A Secure system needs User authentication Transaction integrity Accountability Fault-tolerance Message secrecy Covertness

Review of 4 systems Bank Banks have been a driving force in security and accounting controls Air force base Military has been motivator of technology Healthcare Patient safety and privacy Home More and more important

Terms and uses System Subject, Principal, Identity Trust, Trustworthy Confidentiality, Privacy, Secrecy Authenticity, Integrity Vulnerability, Threat, Security failure

Articles for Friday 1/21 What is security engineering Documentation of “system” like in text Confidentiality versus privacy versus secrecy System used for domestic spying (Wiretaps) Find article to classmates before Thursday noon prepare to lead discussion.

Previous articles An interesting discussion of the FBI's Carnivore system and its confidentiality. A news article on the latest version of iTunes; Privacy concerns over the 'Ministore' Talking about tailoring data to specific people... Speaks about a changing threat and people who pose as others... (Sort of a long article, sorry) (A lot to do with Echelon) Intelligence info in plain site Cell phone Privacy

Links to resources What is Security Engineering (author links) A few great BLOGS to get started

Links to resources What do secure systems need: Ross Andersons Home page