Professional Documents
Culture Documents
Lecture 1,2,3
Lecture 1,2,3
Lecture 1,2,3
Security
Lecture 01,02,03
Introduction
Areesha Sajjad
NCBA&E FLC
Security???
What is security
• Security revolves around CIA
Confidentiality
• Right to Access
• Privileges defined by the owner on the resource.
• Legislations (HIPPA/US Laws/EU laws)
Other Terms
• Masquerade
• Pretending to be a different entity
Active Attacks
• Replay Attacks (to trick the system into accepting the re transmission
of the data as legitimate one)
Active Attacks
• Denial of service (A denial-of-service (DoS) attack occurs when
legitimate users are unable to access information systems, devices,
or other network resources due to the actions of a malicious cyber
threat actor.)
• Easy to detect
• Hard to prevent
Passive Attacks
• Confidentiality (privacy)
• Availability
• Denial of Service Attacks
• Virus that deletes files
Methods of Defence
• Encryption
• Software Controls (access limitations in a database, in operating
system protect each user from other users)
• Hardware Controls (smartcard)
• Policies (frequent changes of passwords)
• Physical Controls
Internet RFC Publication Process
Recommended Reading