1 / 22

Computer Security G53SEC

G53SEC. written examination60 %Coursework40 %. 6. Grading. G53SEC. People protect their property and privacy for generations (Locks, Fences, Signatures, Seals, etc

saul
Download Presentation

Computer Security G53SEC

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. Computer Security G53SEC

    4. What is This Course About? Learn how to prevent attacks and/or limit their consequences. No silver bullet; man-made complex systems will have errors; errors may be exploited Large number of ways to attack Large collection of specific methods for specific purposes Learn to think about security when doing things Learn to understand and apply security principles

    6. Ideally read the relevant chapter from the course text before coming to the lecture, this will make it much easier to remember and learn the actual contents.Ideally read the relevant chapter from the course text before coming to the lecture, this will make it much easier to remember and learn the actual contents.

    13. Security awareness – why security is important - what is expected of each member - which good practices should be followed Security awareness – why security is important - what is expected of each member - which good practices should be followed

    16. More about ISO in Gollmann More about ISO in Gollmann

    17.

    20. Identification – insider/outsider/contractor/fired employee Attack Graphs – Tedesco’s ResearchIdentification – insider/outsider/contractor/fired employee Attack Graphs – Tedesco’s Research

    21. Scaling – critical – very important – important – not importantScaling – critical – very important – important – not important

    22. RA not possible due to cost, time, unjustifiable to managementRA not possible due to cost, time, unjustifiable to management

More Related