tailieunhanh - Lecture Network security: Chapter 2 - Dr. Munam Ali Shah

In this chapter, the following content will be discussed: Hackers and attackers; threats, risks, vulnerabilities and attacks; why is security difficult to achieve; threat modelling and risk assessment. | Network Security Lecture 2 Presented by Dr. Munam Ali Shah Sum mary of the previous lecture We discussed the security problem. Can you recall when a system is Secure. When resources are used and accessed as intended under all circumstances. Sum mary of the previous lecture We also discussed security violation categories Breach of Confidentiality Unauthorized reading of data Breach of Integrity Unauthorized modification of data Breach of Availability Unauthorized destruction of data Theft of service Unauthorized use of resources Denial of Service DoS Prevention of legitimate .