-Saravana Kumar R
UNIT 1.1. –COMPUTER SECURITY, THREATS,
VULNERABILITIES AND CONTROLS
Agenda
1.Introduction to Computer Security
2.Threats in Computer Security
3.Harm
4.Vulnerabilities in Computer Security
5.Controls in Computer Security
6.Conclusion
Q&A
3. Cryptography
Def:Cryptographysecuresinformationbytransformingitintoanunreadableformat,ensuringconfidentiality,
integrity,andauthenticity.
ProblemsAddressedbyEncryption
Confidentiality:Preventsunauthorizedaccesstodata.
Integrity:Ensuresdataisnotalteredduringtransmission.
Authentication:Verifiestheidentityofcommunicatingparties.
Non-repudiation:Provestheoriginandintegrityofdata.
Terminology
Plaintext: Original, readable data.
Ciphertext: Encrypted, unreadable data.
Key: Secret value used to encrypt/decrypt data.
Encryption: Process of converting plaintext to ciphertext.
Decryption: Process of converting ciphertext back to plaintext.