Computer security in essence…
deals with computer-related assets that are subject to a variety of threats and for which various measures are taken to protect those assets.
CIA triad + extra properties
Confidentiality
Loss:
Unauthorized disclosure of information
Integrity
Loss:
Unauthorized modification or destruction of information
Availability
Loss:
Disruption of access or use of information
Authenticity
Loss:
Impersonation and modification of the system
Accountability
Security breaches should be traced back to a responsible party.
Loss:
Impersonation and modification of the system
Impacts CIA (FIPS) - Low
Low: minor
Moderate: Significant
High: major, to individuals loss of life or serious-life threatening
Challenges of Security
Difference between Data integrity and System Integrity
Data: information and programs are changed in the specified manner
System: system performs intended function free from unauthorized manipulation
Data focuses on information/programs content and System focuses in how it should work/function.