Sie sind auf Seite 1von 3

Faculty of Sciences – I 19/12/2018

COMPUTER SYSTEMS SECURITY


I* Introduction --------------------------------------------------------------- 1

II* Security Objectives ------------------------------------------------------- 1

III* Technical and security mechanisms ----------------------------------- 1

III.a) Security Policies----------------------------------------------------- 1

III.b) Internal security policies ------------------------------------------- 2

III.c) Technical security policies ------------------------------------------ 2

III.d) System security policies -------------------------------------------- 2

IV* Cryptographic mechanisms ---------------------------------------------- 2

V* Firewalls ------------------------------------------------------------------- 2

I* Introduction
We begin by detailing the objectives of security of information systems.
Then, we describe some techniques used for security of information
systems.

II* Security Objectives


Ensuring the security of a system returns to provide the three
critical characteristics of the system and the information it
processes, namely confidentiality, integrity, and availability.

III* Technical and security mechanisms


III.a) Security Policies

1 | Page
Faculty of Sciences – I 19/12/2018
Security policies are classified into three categories: internal security
policies, technical security policies, and system security policies.

III.b) Internal security policies

The internal security with all who are security from an organizational
policy is represented point of view such as the distribution of tasks
by a set of and responsibilities between users.
procedures dealing
III.c) Technical security policies

T
echnical security policy concerns the aspects related to hardware or
software of the system to protect. It identifies measures to be taken, for
example, natural disasters, fire, etc.

III.d) System security policies

The System Security Policy specifies the set of laws, regulations, and
practices governing how to manage, protect, and disseminate information
and other sensitive resources within the system.

IV* Cryptographic mechanisms


The word cryptography is a generic term designating the set of techniques
used to encrypt messages.

V*Firewalls
A firewall is a system that protects a computer from intrusions from the
network (or a LAN from attacks from the internet). This is an intermediate
system between the local network (or local machine) and the "outside
world".

TABLES

2 | Page
Faculty of Sciences – I 19/12/2018
Group A
Courses Semester 1 Semester 2
I2260 I2261 I2262 I2263
Student 1 Midterm 8 3 7 12
Final 14 9 15 16
Total 22 12 22 28
Student 2 Midterm 12 11 17 13
Final 15 14 13 14
Total 27 25 30 27

3 | Page

Das könnte Ihnen auch gefallen