Survey of secure computing

Issac, Biju and Israr, Nauman (2014) Survey of secure computing. In: Case Studies in Secure Computing. CRC Press, New York, pp. 1-26. ISBN 9781482207064

Full text not available from this repository.
Official URL:


Personal computers brought about a revolution in the use of general-purpose computers. They moved into homes and offices, and more and more people began using them, putting more and more data onto computing systems. The fact that protocols and systems were never designed to cater to this explosion in adapting the computing systems also left much vulnerability in the systems, which created threats in the computing realm. Then started parallel efforts to secure existing infrastructure, with the aim to provide three main components of security in computing, namely, confidentiality, integrity, and availability. The difference in the threats and exploits of the digital world makes traditional systems of secure measures fall short, and it is required to provide digital defense mechanisms to ensure secure computing. Secure computing spans a wide spectrum of areas, including protocol-based security issues, denial of service, web and cloud, mobile, database, and social- and multimedia-related security issues, just to name a few. Even as threats present themselves, active mechanisms and good preparation can help to minimize incidents and losses arising from them, but it is also to be noted that security in computing is still a long way from complete. This chapter aims at presenting a survey of common issues in security attacks and defenses in computing through the application of cryptography and the aid of security models for securing systems.

Item Type: Book Section
Subjects: G400 Computer Science
Department: Faculties > Engineering and Environment > Computer and Information Sciences
Depositing User: Paul Burns
Date Deposited: 21 Feb 2019 16:13
Last Modified: 10 Oct 2019 23:18

Actions (login required)

View Item View Item


Downloads per month over past year

View more statistics