00 Course Overview
00 Course Overview
Security
IS-820
Lecture 0
Course Overview
5
Course Outline
6
7
Course
Objectives
Introduce the latest research in computer security area.
Books:
• Computer Security Principles and Practice, William Stallings
and Lawrie Brown. 5th edition. Pearson Education
• Introduction to Computer Security by Matt Bishop. Pearson
Education
• Computer Security Art and Science by Matt Bishop, Pearson
Education.
9
THEORY
10
• Mobile phone usage
Switch it to silent during the class
• Assignment submission
Late submissions will not be
Rules accepted.
Plagiarism is an offence and will
& Policies
result in zero marks.
• Plagiarism policy
11
• The use or presentation of the
work of another person, including
12
Let’s Start
Example: Motive is to secure the bag
Benefits of
Computer • What is the biggest hole or
the weakest point of the
Security security?
Awareness
• Answer. It is us, humans.
• Most of the security breaches
come from uninformed and
untrained persons which give
information to a third party or
publish data in Internet without
knowing the consequences
What is Security ?
• “Security” means different things to different people
• Computer Security
• ‘A computer is secured if you can depend on it and its software to behave as you expect’
• Garfinkel et al., Practical Unix & Internet Security
• Generally: the protection of Computing system (hardware, software, storage, the people
that operate them) and the information that they store and use
What is
Security ?
• Security as a process
• Security involves
• People
• Process
• Technology
Why Security ?
• Cyberspace (Internet, work environment) is becoming dangerous place for all
organizations/individuals to protect their sensitive data or reputation, Because
• Numerous people and machines are accessing it.
• E.g. Whistleblower: Edward Snowden case
• Hacking tools are available just have to Google.
• Technology at end user has been increased (processing, high speed internet)
• Access to hacking manuals
What should we do?
• Locking down all the networks is not an options.
• Networks should be hardened.
• Applications and Operating systems to provide a reasonable level of safety, plus should have
disaster recovery plan.
Potential
Losses due
to Security
Attacks
• Losing your data
• Bad usage of your computer resources
(overloaded)
• Reputation loss
• Identity theft
• ….
• ….
What to Secure ?
• First, must check the Physical Security by setting control systems
• E.g. motion alarms, door accessing systems, humidity sensors, temperature sensors.
• People having access to computer systems should have their own user id with password
protection.
• Monitors/Displays should be protected by screen saver to hide the information from being
displayed when the user is away or inactive.
• Secure Network i.e., wireless/system, should be password protected.
• Internet equipment as routers to be protected with password.
• Data that we used to store information i.e. financial, or non-financial should be protected by
Encryption.
• Information should be protected in all types of its representation in transmission by
encrypting it.
General
Key points
• Data Encryption
• Virus Protection
• Data Storage
• Secure Data Exchange
• …
• ….
• …
Basic Security
Checklist
• Check with respect to OS
• Password protected ?
• OS should be updated ?
• Antiviruses installed and updated ?
• Identify the unusual services running that consumes resources ?
• Screen Saver ?
• Computer Firewall is on or not ?
• Doing backups regularly ?
• Verify the shared, whether useful or not ?
• Account has full rights or is restricted ?
• Updates of third-party software’s ?
https://www.youtube.com/channel/UC-hMiduFmkdtw1cvKSsM7bQ
End