15-Computer Privacy and Security Principles
15-Computer Privacy and Security Principles
At the end of the day, the goals are simple: safety and security.
(Jodi Rell)
Week 14 Topic: Introduction to Computer
Privacy and Security Principles
• Recap of Last Lecture:
• Computer Privacy, Information Security
• Common ways used to secure our Devices etc.
• Information Security Principles
• Confidentiality
• Integrity
• Availability
• Access Control
• Principles of Computer Security
What does “Secure” Computer System mean?
To decide whether a computer system is “secure”, we should think
about the meaning of “secure” first in order to identify the threats to
our information.
Integrity
C I
S
A
Availability
S = Secure
1. Confidentiality
• Who is authorized to use data?
• Confidentiality is about protecting the information against
unintentional, unlawful, or unauthorized access, disclosure, or theft.
• Example:
• The Passwords, PINs and Patterns that we often use must to protect devices
and accounts should remain confidential.
1. Confidentiality
Confidentiality
• “Need to know” basis for data access
• How do we know who needs what data?
• Approach: access control specifies who can access what
Confidentiality
• Analogously: “Need to access/use” basis for physical assets
• For example access to a computer room, use of a desktop
• Confidentiality is:
• Difficult to ensure
• Easy to assess in terms of success (binary in nature: Yes / No)
1. Confidentiality
Integrity as a Professional:
o Keep your promises even if it takes extra effort.
o Go back to a store and pay for something you forgot to pay for.
o Never betray a friend's trust even if you get in trouble.
o Inform the cashier he gave you too much change back.
2. Integrity
Data integrity might compromise through:
CIAAAN
More components are added to CIA
Non-repudiation: