انت هنا الان : شبكة جامعة بابل > موقع الكلية > نظام التعليم الالكتروني > مشاهدة المحاضرة

Lecture2 of Computing SecurityI 2018-2019

الكلية كلية العلوم للبنات     القسم قسم الحاسبات     المرحلة 4
أستاذ المادة محمد عبد الله ناصر الزبيدي       15/10/2018 17:39:42
Lecture 2 Outlines:
• Important terms of Computer Security
• Model for Computer Security
• Security Attacks: General Introduction
1. Important terms of Computer Security
There are different terms used in computer security:
• Unauthorized access: this means not to be allow to have access to some data.
• Adversary (threat agent): An entity that attacks, or is a threat to, a system.
• Hacker: Is a Person that tries and exploits a computer system for a reason which can be money, a social cause, fun etc.
• Threat: Is an action or event that might compromise the security (i.e. potential for violation of security).
• Vulnerability: It is a weakness, a design problem or implementation error in a system that can lead to an unexpected and undesirable event regarding security system.
• Attack: Is an assault on the system security that is delivered by a person or a machine to a system. It violates security.
• Countermeasure: An action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that corrective action can be taken.
• Risk: An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result.

المادة المعروضة اعلاه هي مدخل الى المحاضرة المرفوعة بواسطة استاذ(ة) المادة . وقد تبدو لك غير متكاملة . حيث يضع استاذ المادة في بعض الاحيان فقط الجزء الاول من المحاضرة من اجل الاطلاع على ما ستقوم بتحميله لاحقا . في نظام التعليم الالكتروني نوفر هذه الخدمة لكي نبقيك على اطلاع حول محتوى الملف الذي ستقوم بتحميله .