In week 3, we will explore Linux authentication mechanisms and how to add users and user controls to a Linux system. By the end of week 3, you should be able to demonstrate how to appropriately add users to a Linux machine and secure them. In week 4, we will explore how to harden a Linux system.
By the end of week 4, you should be able to classify different technologies to secure Linux and differentiate access control methods for Linux applications. Good system management not only requires managing the systems themselves, but requires careful planning to make systems interact with each other, auditing of the systems once the systems are built, and proactive maintenance of all systems. Organizations also rely on organizational policies, such as Acceptable Use Policies to bolster the technical aspect of system management. This course explores many of the behind the scenes requirements of good system management.
The first half of the course covers how to build security into system management process and the organization policies necessary for any enterprise to follow. The latter half of the course focuses on auditing and maintenance of systems once they have been designed, and implemented.
By the end of the course you should be able to design and construct organizational policies based on a set of requirements, audit a system based on those requirements, and make sure systems adhere technically to the set of requirements. To get started, click the course card that interests you and enroll. You can enroll and complete the course to earn a shareable certificate, or you can audit it to view the course materials for free. Visit your learner dashboard to track your progress. You can access your lectures, readings and assignments anytime and anywhere via the web or your mobile device.
This Specialization doesn't carry university credit, but some universities may choose to accept Specialization Certificates for credit. Check with your institution to learn more. The course within the specialization can be accomplished in weeks with each week being hours of study.
If you have hands on experience with some of the concepts, you may be able to shorten the time spent on learning. This is an introductory specialization. Learners will learn the fundamentals of many aspects of system management. More questions?
Cryptography and Security in Computing Systems (CS)
Visit the Learner Help Center. Browse Chevron Right. Information Technology Chevron Right. Offered By.
About this Specialization 8, recent views. Flexible Schedule. Flexible Schedule Set and maintain flexible deadlines. Beginner Level. Hours to complete. Available languages. English Subtitles: English, Korean. Chevron Left. Synopsis About this title This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of se- rity with respect to computing. From the Back Cover : With Security in Computing Systems , Joachim Biskup introduces, surveys and assesses the fundamentals of security with respect to all activities that individuals or groups directly or indirectly perform by means of computers and computer networks.
Buy New Learn more about this copy. About AbeBooks. Other Popular Editions of the Same Title.
- Faculty with secondary interest in this area;
- Is There a Security Problem in Computing? | What Does "Secure" Mean? | InformIT.
- Southern Sons: Becoming Men in the New Nation.
- This Wheels on Fire: Levon Helm and the Story of the Band.
Search for all books with this author and title. Customers who bought this item also bought. Stock Image. Published by Springer New Hardcover Quantity Available: 3. Books in my Basket New Delhi, India. Seller Rating:. New Quantity Available: 2. New Hardcover Quantity Available: Chiron Media Wallingford, United Kingdom.
Security in Computing Systems Joachim Biskup. New Paperback Quantity Available: New Hardcover Quantity Available: 1. The possibility of crime is bad enough. But worse yet, in the event of a crime, some organizations neither investigate nor prosecute for fear that the revelation will damage their public image. For example, would you feel safe depositing your money in a bank that had just suffered a several million-dollar loss through computer-related embezzlement? In fact, the breach of security makes that bank painfully aware of all its security weaknesses.
Once bitten, twice shy; after the loss, the bank will probably enhance its security substantially, quickly becoming safer than a bank that had not been recently victimized.
Even when organizations want to take action against criminal activity, criminal investigation and prosecution can be hindered by statutes that do not recognize electromagnetic signals as property. The news media sometimes portrays computer intrusion by teenagers as a prank no more serious than tipping over an outhouse. But, as we see in later chapters, computer intrusion can hurt businesses and even take lives.
The legal systems around the world are rapidly coming to grips with the nature of electronic property as intellectual property critical to organizational or mission success; laws are being implemented and court decisions declared that acknowledge the value of information stored or transmitted via computers.
But this area is still new to many courts, and few precedents have been established. Throughout this book, we look at examples of how computer security affects our lives—directly and indirectly. And we examine techniques to prevent security breaches or at least to mitigate their effects. We address the security concerns of software practitioners as well as those professionals, managers, and users whose products, services, and well-being depend on the proper functioning of computer systems.
By studying this book, you can develop an understanding of the basic problems underlying computer security and the methods available to deal with them. In this chapter, we begin by examining what kinds of vulnerabilities computing systems are prone to. We then consider why these vulnerabilities are exploited: the different kinds of attacks that are possible. This chapter's third focus is on who is involved: the kinds of people who contribute to the security problem. Finally, we introduce how to prevent possible attacks on systems. Any part of a computing system can be the target of a crime.
When we refer to a computing system , 1 we mean a collection of hardware, software, storage media, data, and people that an organization uses to perform computing tasks. Sometimes, we assume that parts of a computing system are not valuable to an outsider, but often we are mistaken.
For instance, we tend to think that the most valuable property in a bank is the cash, gold, or silver in the vault. But in fact the customer information in the bank's computer may be far more valuable.
Stored on paper, recorded on a storage medium, resident in memory, or transmitted over telephone lines or satellite links, this information can be used in myriad ways to make money illicitly. A competing bank can use this information to steal clients or even to disrupt service and discredit the bank. An unscrupulous individual could move money from one account to another without the owner's permission. A group of con artists could contact large depositors and convince them to invest in fraudulent schemes.
Conclusion | Introduction to Security in Computing, 5th Edition | InformIT
The variety of targets and attacks makes computer security very difficult. Any system is most vulnerable at its weakest point. A robber intent on stealing something from your house will not attempt to penetrate a two-inch-thick metal door if a window gives easier access. Similarly, a sophisticated perimeter physical security system does not compensate for unguarded access by means of a simple telephone line and a modem. We can codify this idea as one of the principles of computer security.
This principle implies that computer security specialists must consider all possible means of penetration. Moreover, the penetration analysis must be done repeatedly, and especially whenever the system and its security change. People sometimes underestimate the determination or creativity of attackers. Remember that computer security is a game with rules only for the defending team: The attackers can and will use any means they can. Perhaps the hardest thing for people outside the security community to do is to think like the attacker.