What is Computer Security?
CSM27 Computer Security Dr Hans Georg Schaathun
University of Surrey
Autumn 2009 – Week 1
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 1 / 38
What is Computer Security? CSM27 Computer Security Dr Hans Georg - - PowerPoint PPT Presentation
What is Computer Security? CSM27 Computer Security Dr Hans Georg Schaathun University of Surrey Autumn 2009 Week 1 Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 Week 1 1 / 38 The module Security in our Department
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 1 / 38
The module
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 2 / 38
The module
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 3 / 38
The module
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 4 / 38
The module
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 4 / 38
The module
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 4 / 38
The session
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 5 / 38
The problem
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 6 / 38
The problem Three faces of security
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 7 / 38
The problem Three faces of security
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 8 / 38
The problem Three faces of security
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 8 / 38
The problem Three faces of security
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 9 / 38
The problem Three faces of security
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 9 / 38
The problem Three faces of security
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 9 / 38
The problem Three faces of security
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 9 / 38
The problem Three faces of security
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 10 / 38
The problem Three faces of security
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 10 / 38
The problem Three faces of security
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 10 / 38
The problem Three faces of security
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 11 / 38
The problem Three faces of security
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 11 / 38
The problem Three faces of security
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 12 / 38
The problem Three faces of security
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 13 / 38
The problem Two companions of security
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 14 / 38
The problem Two companions of security
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 15 / 38
The problem Two companions of security
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 16 / 38
The problem Two companions of security
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 16 / 38
The problem Two companions of security
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 16 / 38
The problem Two companions of security
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 17 / 38
Risk analysis Risk analysis
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 18 / 38
Risk analysis Risk analysis
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 19 / 38
Risk analysis Risk analysis
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 19 / 38
Risk analysis Risk analysis
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 20 / 38
Risk analysis Risk analysis
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 21 / 38
Risk analysis Threats and Vulnerabilities
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 22 / 38
Risk analysis Threats and Vulnerabilities
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 23 / 38
Risk analysis Attacks
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 24 / 38
Risk analysis Attacks
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 25 / 38
Risk analysis Solutions
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 26 / 38
Risk analysis Solutions
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 27 / 38
Risk analysis Solutions
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 28 / 38
Risk analysis Solutions
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 29 / 38
Risk analysis Solutions
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 30 / 38
Risk analysis Defining Computer Security
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 31 / 38
Risk analysis Defining Computer Security
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 32 / 38
Risk analysis Defining Computer Security
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 32 / 38
Risk analysis Defining Computer Security
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 33 / 38
Risk analysis Defining Computer Security
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 34 / 38
Risk analysis Defining Computer Security
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 34 / 38
Risk analysis Defining Computer Security
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 34 / 38
Risk analysis Defining Computer Security
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 34 / 38
Risk analysis Defining Computer Security
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 34 / 38
Exercise
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 35 / 38
Exercise
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 36 / 38
Exercise
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 37 / 38
Exercise
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 37 / 38
Exercise
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 37 / 38
Exercise
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 37 / 38
Exercise
1
2
3
Dr Hans Georg Schaathun What is Computer Security? Autumn 2009 – Week 1 38 / 38