DS&C 01
DS&C 01
Dr Danish Shehzad
Associate Professor
CS & IT
1
Today’s Lecture
• Introduction
• Course Introduction and Marks Distribution
• Motivation
• Foundations of Security
• Security Levels
• Security Goals
• CNSS Security Model
• ITU-T X.800 “Security Architecture for OSI”
• Model for Network Security
2
Marks distribution
– Quiz: 10
– Assignment: 10
– Mid term exam : 20
– Research Work: 25
– Final exam: 35
– Total: 100
Office#:17
Email-ID: [email protected]
3
Cybersecurity Jobs Report: 3.5
Million Unfilled Positions In 2025
4
Introduction
6
Information Security &
Cryptography
• Information Security, often referred to as InfoSec, refers to the practice of
protecting resources, information and data from unauthorized access, use,
disclosure, disruption, modification, or destruction.
8
Information Systems
• A healthcare example, from
• http://wiki.ihe.net/images/b/b6/CareManagementDiagram.jpg
• Components:
• Hardware
• Networks
• Software
• Data
• Procedures
• Policies
9
Information Security
Three Foundations Of IT Security
Security Levels
Governmental
Personal Organizational
12
Security Goals
Integrity
• C.I.A.
Confidentiality Availability
13
I. Confidentiality
• Confidentiality is the avoidance of the
unauthorized disclosure of information.
– confidentiality involves the protection of data,
– providing access for those who are allowed to see
it while disallowing others from learning anything
about its content.
14
15
Tools for Confidentiality
16
Tools for Confidentiality
2. Access control: rules and policies that limit
access to confidential information to those
people and/or systems with a “need to know.”
– This may be determined by identity, such as a
person’s name or a computer’s serial number, or
by a role that a person has, such as being a
manager or a computer security specialist.
17
Tools for Confidentiality
3. Authentication: the determination of the identity or
role that someone has. This determination can be done in
a number of different ways, but it is usually based on a
combination of
– something the person has (like a smart card or a radio key
storing secret keys),
– something the person knows (like a password),
– something the person is (like a human with a fingerprint).
password=ucIb()w1V
mother=Jones
human with fingers pet=Caesar
and eyes
Something you know
Something you are
radio token with
secret keys
Something you have
19
Tools for Confidentiality
4. Authorization: the determination if a person or system is allowed
access to resources, based on an access control policy.
– Such authorizations should prevent an attacker from tricking the
system into letting him have access to protected resources.
25
26
27
Research Timeline
Total 25