Security in Computing, Fifth Edition Chapter 1:
Author : giovanna-bartolotta | Published Date : 2025-07-16
Description: Security in Computing Fifth Edition Chapter 1 Introduction 1 About the Module The core book is Security in Computing by Charles Pfleeger and Shari Pfleeger Pearson COM535 Home page is really Blackboard but also mirrored below
Presentation Embed Code
Download Presentation
Download
Presentation The PPT/PDF document
"Security in Computing, Fifth Edition Chapter 1:" is the property of its rightful owner.
Permission is granted to download and print the materials on this website for personal, non-commercial use only,
and to display it on your personal computer provided you do not modify the materials and that you retain all
copyright notices contained in the materials. By downloading content from our website, you accept the terms of
this agreement.
Transcript:Security in Computing, Fifth Edition Chapter 1::
Security in Computing, Fifth Edition Chapter 1: Introduction 1 About the Module The core book is Security in Computing by Charles Pfleeger and Shari Pfleeger, Pearson COM535 Home page is really Blackboard but also mirrored below: https://kevincurran.org/teaching/systems-security/ Please remember optional means optional. Practicals: Placed on Blackboard each week. Examination: Coursework 100% - Essay on security topic for week 7 and class test in labs where you will demonstrate aspects of the lab Core module text on Blackboard Content Covered in labs https://kevincurran.org/com535/LabContents.pdf Objectives for this lecture Define computer security as well as basic computer security terms Introduce the C-I-A Triad Introduce basic access control terminology Explain basic threats, vulnerabilities, and attacks Show how controls map to threats Define the Internet of Things and discuss associated emerging security issues Discuss nascent efforts to financially measure cybersecurity to make sound investment decisions Explore the evolving field of electronic voting, which has been an important and open security research problem for over a decade Study potential examples of cyber warfare and their policy implications 4 What’s in a Tweet? What Is Computer Security? The protection of the assets of a computer system Hardware Software Data 6 Assets 7 Values of Assets 8 Basic Terms Vulnerability Threat Attack Countermeasure or control From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. 9 Threat and Vulnerability 10 Common Threats and Attacks The CIA Triad The National Institute of Standards and technology (NIST) Computer Security Handbook defines the term Computer Security as: “The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources” (includes hardware, software, firmware, information/data, and telecommunications). Access Control From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. 13 Types of Threats From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. 14 Advanced Persistent Threat (APT) Organized Directed Well financed Patient Silent From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. 15 Types of Attackers From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson
Download Document
Here is the link to download the presentation.
"Security in Computing, Fifth Edition Chapter 1:"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.
Related Presentations
Cloud Computing
North American Precis Syndicate,Inc.,35O Fifth Avenue,Suite 6500,New Y
The Fifth Monarchy Movement. THE term "Fifth Monarchy" serves as a sum
Cloud Computing
Chapter 7: Mobile Computing
Quantum Computing: The Future of Computing
8 Social Computing CHAPTER OUTLINE
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
C loud computing DSC340
Security Attacks and Cyber Crime:
Cloud Computing Members
(BOOK)-Cryptography and Network Security: Demystifying the ideas of Network Security,
Cloud computing In Cloud Computing