انت هنا الان : شبكة جامعة بابل > موقع الكلية > نظام التعليم الالكتروني > مشاهدة المحاضرة

Lecture1 of Computing SecurityI 2018-2019

الكلية كلية العلوم للبنات     القسم قسم الحاسبات     المرحلة 4
أستاذ المادة محمد عبد الله ناصر الزبيدي       08/10/2018 20:47:29
Lecture 1 Outlines:

• What is Computer Security?
• Why Security?
• Security Goals
• Computer Security Challenges

1. What is Computer Security?
Computer Security is the process of detecting and preventing any unauthorized use of your laptop/computer. It includes the way toward protecting against trespassers from using your personal or office-based computer resources with malicious intent or for their own gains, or even for gaining any access to them accidentally.
The NIST (National Institute of Standards and Technology) defines the term computer security as follows: The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications).
The concept of computer security which can be a laptop, a workstation, a server or even a network device. So, this is an introductory tutorial that covers the basics of Computer Security and how to deal with its various components and sub-components.
2. Why Security?
Cyberspace (internet, work environment, intranet) is becoming a dangerous place for all organizations and individuals to protect their sensitive data. This is because of the numerous people and machines accessing it. It is important to mention that the recent studies have shown a big danger is coming from internal threats or external, another internal threat is that information material can be easy accessible over the intranet.
One important indicator is the IT skills of a person that wants to hack or to breach your security has decreased but the success rate of it has increased, this is because of three main factors:
1. Hacking tools that can be found very easily by everyone just by googling and they are endless.
2. Technology with the end-users has increased rapidly within these years, like internet bandwidth and computer processing speeds.
3. Access to hacking information manuals.
All this can make up school boy from potential hackers for your organization. The following graph gives us a basic idea.


المادة المعروضة اعلاه هي مدخل الى المحاضرة المرفوعة بواسطة استاذ(ة) المادة . وقد تبدو لك غير متكاملة . حيث يضع استاذ المادة في بعض الاحيان فقط الجزء الاول من المحاضرة من اجل الاطلاع على ما ستقوم بتحميله لاحقا . في نظام التعليم الالكتروني نوفر هذه الخدمة لكي نبقيك على اطلاع حول محتوى الملف الذي ستقوم بتحميله .