SlideShare a Scribd company logo
COMPUTER SECURITY
Prof. Neeraj Bhargava
Mrs.Shubha Chaturvedi
Department of Computer Science, School of Engineering & System Science
MDS University Ajmer, Rajasthan
The NIST Computer Security defines the term
computer security as:
The protection afforded to an automated
information of system in order to attain the
applicable objectives preserving the integrity,
availability, and confidentiality of information
system resources (includes hardware, software,
firmware, information /data and
telecommunications).
Confidentiality
Integrity
Availability
This term covers two related concepts:
 Data Confidentiality: Assures that private or
confidential information is not made
available or disclosed to unauthorized
individuals.
 Privacy: Assures that individuals control or
influence what information related to them
may be collected and stored and by whom
and to whom that information may be
disclosed.
This term covers two related concepts:
 Data integrity: Assures that information and
programs are changed only in a specified and
authorized manner.

 System integrity: Assures that a system
performs its intended function in an
unimpaired manner, free from deliberate or
inadvertent unauthorized manipulation of
the system.
 Assures that systems work promptly and
service is not denied to authorized users.
COMPUTER SECURITY
 Although the use of the CIA triad to define
security objectives is well estab-lished, some
in the security field feel that additional
concepts are needed to present a complete
picture.
 Authenticity:
 Accountability:
 Authenticity: The property of being genuine
and being able to be verified and trusted;
confidence in the validity of a transmission,
a message, or message originator. This means
verifying that users are who they say they
are and that each input arriving at the
system came from a trusted source.
 Accountability: The security goal that
generates the requirement for actions of an
entity to be traced uniquely to that entity.
This supports nonrepudiation, deterrence,
fault isolation, intrusion detection and
prevention, and after-action recovery and
legal action. Because truly secure systems
are not yet an achievable goal, we must be
able to trace a security breach to a
responsible party. Systems must keep records
of their activities to permit later forensic
analysis to trace security breaches or to aid
in transaction disputes.
The OSI security architecture is useful to
managers as a way of organizing the task of
providing security. Furthermore, because this
architecture was developed as an
international standard, computer and
communications vendors have developed
security features for their products and
services that relate to this structured
definition of services and mechanisms.
The OSI security architecture focuses on security
Attacks, Mechanisms and Services. These can
be defined briefly as:
 Security Attack: Any action that compromises the
security of information owned by an organization.
 Security Mechanism: A process (or a device
incorporating such a process) that is designed to
detect, prevent, or recover from a security attack.
 Security Service: A processing or communication
service that enhances the security of the data
processing systems and the information transfers of
an organization. The services are intended to
counter security attacks, and they make use of one
or more security mechanisms to provide the
service.

More Related Content

PDF
API Security Best Practices & Guidelines
PPT
Introduction to Web Application Penetration Testing
PDF
Web Application Penetration Testing - 101
PDF
Introduction to Cyber Security
PPTX
Introduction To Vulnerability Assessment & Penetration Testing
PPT
Security testing
PPTX
Web Application Penetration Testing Introduction
PPTX
What is security testing and why it is so important?
API Security Best Practices & Guidelines
Introduction to Web Application Penetration Testing
Web Application Penetration Testing - 101
Introduction to Cyber Security
Introduction To Vulnerability Assessment & Penetration Testing
Security testing
Web Application Penetration Testing Introduction
What is security testing and why it is so important?

What's hot (15)

PDF
Application Security | Application Security Tutorial | Cyber Security Certifi...
PPTX
Cyber Security PPT.pptx
PPT
Secure payment systems
PPTX
Git for jenkins faster and better
PDF
API Security Best Practices & Guidelines
PPT
Scanning web vulnerabilities
PPTX
Sonarqube
PDF
Security testing presentation
PPT
ETHICAL HACKING
PPT
PPTX
Security testing
PPTX
Secure coding practices
PPTX
Pen Testing Explained
PPTX
What is Ad-Hoc Testing
PPT
Ia 124 1621324160 ia_124_lecture_02
Application Security | Application Security Tutorial | Cyber Security Certifi...
Cyber Security PPT.pptx
Secure payment systems
Git for jenkins faster and better
API Security Best Practices & Guidelines
Scanning web vulnerabilities
Sonarqube
Security testing presentation
ETHICAL HACKING
Security testing
Secure coding practices
Pen Testing Explained
What is Ad-Hoc Testing
Ia 124 1621324160 ia_124_lecture_02
Ad

Similar to COMPUTER SECURITY (20)

PDF
Network security chapter 1
PPT
Cryptography and Network Security_Chapter 1.ppt
PPTX
Security Ch-1.pptx
PPTX
Advanced Operating System Principles.pptx
PDF
Introduction to security
PDF
Information Security Management
PPTX
1.pptx
PDF
Network security - OSI Security Architecture
PPTX
Computer Security Chapter 1
PDF
Network Security Fundamentals presentation
PPT
ch01-4.ppt
PPT
Nw sec
PDF
Cryptography and Network Security ppt . pdf
PDF
Exploring the Seven Key Attributes of Security Testing.pdf
PPTX
Osi security architecture in network.pptx
PPT
Computer Security
PDF
CSI-503 - 10. Security & Protection (Operating System)
PPTX
osi-security-architectureppt.pptx
PPT
Network security chapter 1
Cryptography and Network Security_Chapter 1.ppt
Security Ch-1.pptx
Advanced Operating System Principles.pptx
Introduction to security
Information Security Management
1.pptx
Network security - OSI Security Architecture
Computer Security Chapter 1
Network Security Fundamentals presentation
ch01-4.ppt
Nw sec
Cryptography and Network Security ppt . pdf
Exploring the Seven Key Attributes of Security Testing.pdf
Osi security architecture in network.pptx
Computer Security
CSI-503 - 10. Security & Protection (Operating System)
osi-security-architectureppt.pptx
Ad

More from SHUBHA CHATURVEDI (20)

PPT
Shell and its types in LINUX
PPT
Unix and its Components
PPT
Linux Advantages and Disadvantages
PPT
Linux Features
PPT
Architecture of Linux
PPT
Introduction and history of linux
PPTX
Block Cipher and Operation Modes
PPT
Block Cipher and its Design Principles
POTX
Stream Ciphers
PPT
Symmetric Key Algorithm
PPTX
Product Cipher
PPTX
Transposition cipher techniques
PPTX
Polygraphic Substitution Cipher - Part 2
PPTX
Polygraphic Substitution Cipher -Part 1
PPT
Homophonic Substitution Cipher
PPT
Polyalphabetic Substitution Cipher
PPT
Monoalphabetic Substitution Cipher
PPT
Classical encryption techniques
PPT
Types of attack -Part3 (Malware Part -2)
PPT
CLASSICAL ENCRYPTION TECHNIQUE- PART 1
Shell and its types in LINUX
Unix and its Components
Linux Advantages and Disadvantages
Linux Features
Architecture of Linux
Introduction and history of linux
Block Cipher and Operation Modes
Block Cipher and its Design Principles
Stream Ciphers
Symmetric Key Algorithm
Product Cipher
Transposition cipher techniques
Polygraphic Substitution Cipher - Part 2
Polygraphic Substitution Cipher -Part 1
Homophonic Substitution Cipher
Polyalphabetic Substitution Cipher
Monoalphabetic Substitution Cipher
Classical encryption techniques
Types of attack -Part3 (Malware Part -2)
CLASSICAL ENCRYPTION TECHNIQUE- PART 1

Recently uploaded (20)

PPTX
Onica Farming 24rsclub profitable farm business
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
How to Manage Starshipit in Odoo 18 - Odoo Slides
PDF
UTS Health Student Promotional Representative_Position Description.pdf
PDF
Piense y hagase Rico - Napoleon Hill Ccesa007.pdf
PDF
Cell Biology Basics: Cell Theory, Structure, Types, and Organelles | BS Level...
PPTX
Cardiovascular Pharmacology for pharmacy students.pptx
DOCX
UPPER GASTRO INTESTINAL DISORDER.docx
PDF
LDMMIA Reiki Yoga Workshop 15 MidTerm Review
PDF
The Final Stretch: How to Release a Game and Not Die in the Process.
PPTX
Nursing Management of Patients with Disorders of Ear, Nose, and Throat (ENT) ...
PPTX
Software Engineering BSC DS UNIT 1 .pptx
PPTX
Strengthening open access through collaboration: building connections with OP...
PDF
3.The-Rise-of-the-Marathas.pdfppt/pdf/8th class social science Exploring Soci...
PPTX
Revamp in MTO Odoo 18 Inventory - Odoo Slides
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PPTX
ACUTE NASOPHARYNGITIS. pptx
PDF
Landforms and landscapes data surprise preview
PPTX
Skill Development Program For Physiotherapy Students by SRY.pptx
PPTX
UNDER FIVE CLINICS OR WELL BABY CLINICS.pptx
Onica Farming 24rsclub profitable farm business
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
How to Manage Starshipit in Odoo 18 - Odoo Slides
UTS Health Student Promotional Representative_Position Description.pdf
Piense y hagase Rico - Napoleon Hill Ccesa007.pdf
Cell Biology Basics: Cell Theory, Structure, Types, and Organelles | BS Level...
Cardiovascular Pharmacology for pharmacy students.pptx
UPPER GASTRO INTESTINAL DISORDER.docx
LDMMIA Reiki Yoga Workshop 15 MidTerm Review
The Final Stretch: How to Release a Game and Not Die in the Process.
Nursing Management of Patients with Disorders of Ear, Nose, and Throat (ENT) ...
Software Engineering BSC DS UNIT 1 .pptx
Strengthening open access through collaboration: building connections with OP...
3.The-Rise-of-the-Marathas.pdfppt/pdf/8th class social science Exploring Soci...
Revamp in MTO Odoo 18 Inventory - Odoo Slides
Week 4 Term 3 Study Techniques revisited.pptx
ACUTE NASOPHARYNGITIS. pptx
Landforms and landscapes data surprise preview
Skill Development Program For Physiotherapy Students by SRY.pptx
UNDER FIVE CLINICS OR WELL BABY CLINICS.pptx

COMPUTER SECURITY

  • 1. COMPUTER SECURITY Prof. Neeraj Bhargava Mrs.Shubha Chaturvedi Department of Computer Science, School of Engineering & System Science MDS University Ajmer, Rajasthan
  • 2. The NIST Computer Security defines the term computer security as: The protection afforded to an automated information of system in order to attain the applicable objectives preserving the integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information /data and telecommunications).
  • 4. This term covers two related concepts:  Data Confidentiality: Assures that private or confidential information is not made available or disclosed to unauthorized individuals.  Privacy: Assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.
  • 5. This term covers two related concepts:  Data integrity: Assures that information and programs are changed only in a specified and authorized manner.   System integrity: Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.
  • 6.  Assures that systems work promptly and service is not denied to authorized users.
  • 8.  Although the use of the CIA triad to define security objectives is well estab-lished, some in the security field feel that additional concepts are needed to present a complete picture.  Authenticity:  Accountability:
  • 9.  Authenticity: The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or message originator. This means verifying that users are who they say they are and that each input arriving at the system came from a trusted source.
  • 10.  Accountability: The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity. This supports nonrepudiation, deterrence, fault isolation, intrusion detection and prevention, and after-action recovery and legal action. Because truly secure systems are not yet an achievable goal, we must be able to trace a security breach to a responsible party. Systems must keep records of their activities to permit later forensic analysis to trace security breaches or to aid in transaction disputes.
  • 11. The OSI security architecture is useful to managers as a way of organizing the task of providing security. Furthermore, because this architecture was developed as an international standard, computer and communications vendors have developed security features for their products and services that relate to this structured definition of services and mechanisms.
  • 12. The OSI security architecture focuses on security Attacks, Mechanisms and Services. These can be defined briefly as:  Security Attack: Any action that compromises the security of information owned by an organization.  Security Mechanism: A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack.  Security Service: A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the service.