




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領
文檔簡介
1、The art of war teaches us to rely not on the likelihood of the enemys not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable. The Art of War, Sun Tzu第1頁/共22頁The combination of space, time, and st
2、rength that must be considered as the basic elements of this theory of defense makes this a fairly complicated matter. Consequently, it is not easy to find a fixed point of departure. On War, Carl Von Clausewitz第2頁/共22頁Computer Security the protection afforded to an automated information system in o
3、rder to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications)第3頁/共22頁Key Security Concepts第4頁/共22頁Levels of Impact can define 3 levels of impact
4、from a security breach Low Moderate High第5頁/共22頁Examples of Security Requirements confidentiality student grades integrity patient information availability authentication service第6頁/共22頁Computer Security Challenges第7頁/共22頁OSI Security Architecture ITU-T X.800 “Security Architecture for OSI” defines
5、a systematic way of defining and providing security requirements for us it provides a useful, if abstract, overview of concepts we will studyM acintosh P IC Tim age form atis not supported第8頁/共22頁Aspects of Security consider 3 aspects of information security: security attack security mechanism secur
6、ity service note termsthreat a potential for violation of securityattack an assault on system security, a deliberate attempt to evade security services第9頁/共22頁Passive Attacks第10頁/共22頁Active Attacks第11頁/共22頁Security Service enhance security of data processing systems and information transfers of an o
7、rganization intended to counter security attacks using one or more security mechanisms often replicates functions normally associated with physical documents which, for example, have signatures, dates; need protection from disclosure, tampering, or destruction; be notarized or witnessed; be recorded
8、 or licensed第12頁/共22頁Security Services X.800:“a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers” RFC 2828:“a processing or communication service provided by a system to give a specific kind of protection to syste
9、m resources”第13頁/共22頁Security Services (X.800) Authentication - assurance that communicating entity is the one claimed have both peer-entity & data origin authentication Access Control - prevention of the unauthorized use of a resource Data Confidentiality protection of data from unauthorized disclo
10、sure Data Integrity - assurance that data received is as sent by an authorized entity Non-Repudiation - protection against denial by one of the parties in a communication Availability resource accessible/usable第14頁/共22頁Security Mechanism feature designed to detect, prevent, or recover from a securit
11、y attack no single mechanism that will support all services required however one particular element underlies many of the security mechanisms in use: cryptographic techniques hence our focus on this topic第15頁/共22頁Security Mechanisms (X.800)specific security mechanisms: encipherment, digital signatur
12、es, access controls, data integrity, authentication exchange, traffic padding, routing control, notarizationpervasive security mechanisms: trusted functionality, security labels, event detection, security audit trails, security recovery第16頁/共22頁Model for Network Security第17頁/共22頁Model for Network Se
13、curityusing this model requires us to: ldesign a suitable algorithm for the security transformation lgenerate the secret information (keys) used by the algorithm ldevelop methods to distribute and share the secret information 1.specify a protocol enabling the principals to use the transformation and
14、 secret information for a security service 第18頁/共22頁Model for Network Access Security第19頁/共22頁Model for Network Access Securityusing this model requires us to: lselect appropriate gatekeeper functions to identify users 1.implement security controls to ensure only authorised users access designated information or resources 第20頁/共22頁Summary topic
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
- 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 超神數(shù)學-高考數(shù)學總復習基礎篇(一輪)(練習冊)專題01集合(含答案或解析)
- 自動步槍斜角射擊技巧
- 中國高校新文科發(fā)展報告
- 歷史隋唐時期的民族交往與交融 課件 2024-2025學年統(tǒng)編版七年級歷史下冊
- 2025年鄉(xiāng)村文化旅游與鄉(xiāng)村旅游人才培養(yǎng)研究報告
- 2025年電商平臺內(nèi)容營銷與種草經(jīng)濟在寵物醫(yī)療行業(yè)的互動營銷報告
- 2025年海上風力發(fā)電場運維管理智能化技術(shù)創(chuàng)新路徑研究報告
- 2025年特色農(nóng)產(chǎn)品加工園區(qū)社會穩(wěn)定風險評估與農(nóng)村社會治理創(chuàng)新研究
- 數(shù)字化轉(zhuǎn)型2025年制造業(yè)供應鏈協(xié)同管理供應鏈金融創(chuàng)新報告
- 外賣平臺食品安全監(jiān)管現(xiàn)狀及發(fā)展趨勢報告2025
- 2023-2024學年景德鎮(zhèn)市珠山區(qū)數(shù)學五年級第二學期期末監(jiān)測試題含解析
- 小鎮(zhèn)文旅康養(yǎng)項目可研報告【健康養(yǎng)老】【旅游康養(yǎng)】
- 2024廣西公需課高質(zhì)量共建“一帶一路”譜寫人類命運共同體新篇章答案
- EHS專項施工EHS管理組織機構(gòu)
- 2024年南安市國有資本投資運營有限責任公司招聘筆試沖刺題(帶答案解析)
- T/CEC 143-2017 超高性能混凝土電桿完整
- MOOC 工程電磁場與波-浙江大學 中國大學慕課答案
- 清罐應急預案
- 《水泥熟料的組成》課件
- 草籽采購(牧草種子采購)投標方案(技術(shù)方案)
- 金融糾紛調(diào)解培訓課件模板
評論
0/150
提交評論