Security in Computing, Fifth Edition Chapter 1:
1 / 1

Security in Computing, Fifth Edition Chapter 1:

Author : giovanna-bartolotta | Published Date : 2025-07-16

Description: Security in Computing Fifth Edition Chapter 1 Introduction 1 About the Module The core book is Security in Computing by Charles Pfleeger and Shari Pfleeger Pearson COM535 Home page is really Blackboard but also mirrored below

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Security in Computing, Fifth Edition Chapter 1:" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Transcript:Security in Computing, Fifth Edition Chapter 1::
Security in Computing, Fifth Edition Chapter 1: Introduction 1 About the Module The core book is Security in Computing by Charles Pfleeger and Shari Pfleeger, Pearson COM535 Home page is really Blackboard but also mirrored below: https://kevincurran.org/teaching/systems-security/ Please remember optional means optional. Practicals: Placed on Blackboard each week. Examination: Coursework 100% - Essay on security topic for week 7 and class test in labs where you will demonstrate aspects of the lab Core module text on Blackboard Content Covered in labs https://kevincurran.org/com535/LabContents.pdf Objectives for this lecture Define computer security as well as basic computer security terms Introduce the C-I-A Triad Introduce basic access control terminology Explain basic threats, vulnerabilities, and attacks Show how controls map to threats Define the Internet of Things and discuss associated emerging security issues Discuss nascent efforts to financially measure cybersecurity to make sound investment decisions Explore the evolving field of electronic voting, which has been an important and open security research problem for over a decade Study potential examples of cyber warfare and their policy implications 4 What’s in a Tweet? What Is Computer Security? The protection of the assets of a computer system Hardware Software Data 6 Assets 7 Values of Assets 8 Basic Terms Vulnerability Threat Attack Countermeasure or control From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. 9 Threat and Vulnerability 10 Common Threats and Attacks The CIA Triad The National Institute of Standards and technology (NIST) Computer Security Handbook defines the term Computer Security as: “The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources” (includes hardware, software, firmware, information/data, and telecommunications). Access Control From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. 13 Types of Threats From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. 14 Advanced Persistent Threat (APT) Organized Directed Well financed Patient Silent From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. 15 Types of Attackers From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson

Download Document

Here is the link to download the presentation.
"Security in Computing, Fifth Edition Chapter 1:"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Presentations

Cloud Computing North American Precis Syndicate,Inc.,35O Fifth Avenue,Suite 6500,New Y The Fifth Monarchy Movement. THE term Cloud Computing Chapter 7: Mobile Computing Quantum Computing:  The Future of Computing 8 Social Computing CHAPTER OUTLINE MANAGEMENT of INFORMATION SECURITY, Fifth Edition C loud  computing  DSC340 Security Attacks and Cyber Crime: Cloud Computing   Members (BOOK)-Cryptography and Network Security: Demystifying the ideas of Network Security, Cloud computing  In  Cloud Computing