Computer Security and Cryptography
Computer Security and Cryptography
SECURITY AND
CRYPTOGRAPHY
CCE 302
PART 1
COMPUTER SECURITY
Introduction
Computer Security is the process of detecting and preventing any unauthorized
use of your laptop/computer. It involves the process of safeguarding against
trespassers from using your personal or office based computer resources with
malicious intent or for their own gains, or even for gaining any access to them
accidentally.
In this section, we will treat the concept of computer security which can be a
laptop, a workstation, a server or even a network device. This is an
introductory tutorial that covers the basics of Computer Security and how to
deal with its various components and sub-components.
Why Security?
Cyberspace (internet, work environment, intranet) is becoming a dangerous place for all
organizations and individuals to protect their sensitive data or reputation. This is because
of the numerous people and machines accessing it. It is important to mention that the
recent studies have shown a big danger is coming from internal threats or from
disappointed employees like the Edward Snowden case, another internal threat is that
information material can be easy accessible over the intranet.
One important indicator is the IT skills of a person that wants to hack or to breach your
security has decreased but the success rate of it has increased, this is because of three main
factors
Hacking tools that can be found very easily by everyone just by googling and
they are endless.
Technology with the end-users has increased rapidly within these years, like
internet bandwidth and computer processing speeds.
Access to hacking information manuals.
All this can make even a school boy with the curiosity, a potential hacker for your
organization.
Since locking down all networks is not an available option, the only response the security
managers can give is to harden their networks, applications and operating systems to a
reasonable level of safety, and conducting a business disaster recovery plan.
The following graph gives us a basic idea.
What to Secure?
Lets see this case, you are an IT administrator in a small company having two small
servers staying in a corner and you are very good at your job. You are doing updates
regularly, setting up firewalls, antiviruses, etc. One day, you see that the organization
employees are not accessing the systems anymore. When you go and check, you see the
cleaning lady doing her job and by mistake, she had removed the power cable and
unplugged the server.
What I mean by this case is that even physical security is important in computer security,
as most of us think it is the last thing to take care of.
Now lets go directly to the point of what all to secure in a computer environment
First of all, is to check the physical security by setting control systems like
motion alarms, door accessing systems, humidity sensors, temperature sensors.
All these components decrease the possibility of a computer to be stolen or
damaged by humans and environment itself.
People having access to computer systems should have their own user id with
password protection.
Monitors should be screen saver protected to hide the information from being
displayed when the user is away or inactive.
Secure your network especially wireless, passwords should be used.
Internet equipment as routers to be protected with password.
Data that you use to store information which can be financial, or non-financial
by encryption.
Information should be protected in all types of its representation in transmission
by encrypting it.
Potential Losses due to Security Attacks
The potential loses in this cyberspace are many even if you are using a single computer in
your room. Here, I will be listing some examples that have a direct impact on you and on
others
Losing you data If your computer has been hacked or infected, there is a big
chance that all your stored data might be taken by the attacker.
Bad usage of your computer resources This means that your network or
computer can go in overload so you cannot access your genuine services or in a
worst case scenario, it can be used by the hacker to attack another machine or
network.
Reputation loss Just think if your Facebook account or business email has
been owned by a social engineering attack and it sends fake information to your
friends, business partners. You will need time to gain back your reputation.
4
Identity theft This is a case where your identity is stolen (photo, name
surname, address, and credit card) and can be used for a crime like making false
identity documents.
Availability refers to the ability to access data of a resource when it is needed, as such the
information has value only if the authorized people can access at right time. Denying
access to data nowadays has become a common attack. Imagine a downtime of a live
server how costly it can be.
Example in real life Lets say a hacker has compromised a webserver of a bank and put
it down. You as an authenticated user want to do an e-banking transfer but it is impossible
to access it, the undone transfer is a money lost for the bank.
Terminologies
In this section, we will discuss about the different terminology used in terms of Computer
Security.
Hacker Is a Person that tries and exploits a computer system for a reason which
can be money, a social cause, fun etc.
Threat Is an action or event that might compromise the security.
Vulnerability It is a weakness, a design problem or implementation error in a
system that can lead to an unexpected and undesirable event regarding security
system.
Attack Is an assault on the system security that is delivered by a person or a
machine to a system. It violates security.
Antivirus or Antimalware Is a software that operates on different OS which is
used to prevent from malicious software.
Social Engineering Is a technique that a hacker uses to stole data by a person for
different for purposes by psychological manipulation combined with social scenes.
Virus It is a malicious software that installs on your computer without your
consent for a bad purpose.
Firewall It is a software or hardware which is used to filter network traffic based
on rules.
Securing OS
In this section we will treat how to secure or harden (harden is another word used
for securing OS) a workstation from the practical point of view and what are the
steps to follow. We will treat the Windows OS because most of the computers
have this two operating systems, but the logic of securing is same for all the other
operating systems like Linux or Android or MAC OS.
7
Put your Windows System Firewall up, this will block all the unauthorized services
that make traffic. To set this up, go to Control Panel System and Security
Windows Firewall.
9
Avast Antivirus
AVG Antivirus
Panda Antivirus 2016
Bitdefender Antivirus
Microsoft Security Essentials
Kaspersky Antivirus
McAfee Antivirus Plus and many more
11