Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Class notes

CYBERSECURITY FOR BEGINNERS

Rating
-
Sold
-
Pages
3
Uploaded on
02-04-2024
Written in
2023/2024

Ethical hacking, also known as penetration testing or white-hat hacking, is the practice of intentionally penetrating computer systems, networks, or applications with permission from the owner, to identify security vulnerabilities and weaknesses. The goal of ethical hacking is to improve the security posture of the target system by uncovering potential threats before malicious hackers can exploit them. Ethical hackers use the same techniques and tools as malicious hackers, but they do so in a lawful and responsible manner, adhering to strict ethical guidelines and obtaining proper authorization before conducting any tests. Once vulnerabilities are identified, ethical hackers provide recommendations and solutions to help organizations strengthen their defenses and protect against cyber threats. Ethical hacking plays a crucial role in ensuring the security and integrity of digital assets in an increasingly interconnected world.

Show more Read less
Institution
Course

Content preview

DENNIS OSADEBAY UNIVERSITY, ANWAI, ASABA

FACULTY OF COMPUTING - DEPARTMENT OF CYBER SECURITY

CYB315: SYSTEM SECURITY

COMPUTER/SYSTEM SECURITY OVERVIEW

RECAP THE FOLLOWING; Basics Of Hardware; Operating Systems Access Controls; Memory
Protection; The OS Interface As Well As The Shortcomings Of Traditional OS And Hardware
Security. (SEE FUNDAMENTALS OF CYBER-SECURITY II)

When we talk about system security two things comes to mind which are;

 Hardware
 System software

Security means freedom from risk or danger: thus we define security by the risks and dangers we
want to avoid. In computer systems, these risks include unavailability of a system or
unauthorized behavior by users; in communications systems they include unauthorized
eavesdropping, tampering, or redirection of messages. It includes both prevention and detection.
We restrict our attention to malicious behavior by so called attackers, leaving computer
reliability to hardware experts and communications fidelity to engineers.

Computer security is an extremely wide field, and dificult to define. It includes purely
mathematical topics such as cryptography, and abstract quantifications of cryptographic
security, through to rather non-technical subjects such as access policy and resource
allocation. Computer security is primarily concerned with information ow, and some
people define computer security as that subset of information security which pertains to
computers. In this course we stick mainly to matters of network communications security.

There are a number of particular aspects of security which we want to consider here. We will
look at each in turn.

Authorization
Authorization specifies the rights of actors to access resources. This includes the rights
to view or change information on a shared system or database, as well as rights to know
or alter the content of certain communications. It is the most basic element of computer
security, as the policies which circumscribe these rights also define the security threats.
The word attacker is synonymous with unauthorized actor.
It is normally policed by the operating system, database management service, or other
program which administers the information. (Ensuring authorization in the absence
of a so-called reference monitor is particularly challenging.) The main difficulty with
authorization is less often about ensuring that the policies are followed, than in describing
and maintaining them correctly.

Confidentiality
Confidentiality means that information is not disclosed to unauthorized entities. It is

Written for

Institution
Course

Document information

Uploaded on
April 2, 2024
Number of pages
3
Written in
2023/2024
Type
Class notes
Professor(s)
Mr clement
Contains
All classes

Subjects

$18.39
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
divineikediashi

Get to know the seller

Seller avatar
divineikediashi Dennis Osadebay University
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
2 year
Number of followers
0
Documents
6
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions