Introduction To Information and Computer Security
Introduction To Information and Computer Security
INTRODUCTION TO
INFORMATION AND
COMPUTER
SECURITY
CHAPTER 1
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
Introduction to Information Security (IT200)
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
Introduction to Information Security (IT200)
Chapter Outline
• Information Security History
• Definition
− Security
− Information Security
• The CIA Concepts
• Critical Characteristics of Information
• Type of security threats
• Type of Attacker
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
4
Introduction
• Information security: a “well-informed sense of
assurance that the information risks and controls
are in balance.” — Jim Anderson, Inovant (2002)
The History of
Information Security
• Computer security began immediately after
the first mainframes were developed
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
7
The 1960s
• Advanced Research Project Agency (ARPA)
began to examine feasibility of redundant
networked communications
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
Principles of Information Security, 3rd Edition
8
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
9
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
Principles of Information Security, 3rd Edition
10
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
Principles of Information Security, 3rd Edition
11
MULTICS
• Early focus of computer security research
was a system called Multiplexed Information
and Computing Service (MULTICS)
• First operating system created with security as
its primary goal
• Mainframe, time-sharing OS developed in mid-
1960s by General Electric (GE), Bell Labs, and
Massachusetts Institute of Technology (MIT)
• Several MULTICS key players created UNIX
− Primary purpose of UNIX was text
processing
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
Principles of Information Security, 3rd Edition
12
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
Principles of Information Security, 3rd Edition
13
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
Principles of Information Security, 3rd Edition
14
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
Principles of Information Security, 3rd Edition
16
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
Introduction to Information Security (IT200)
Information Security
• Information is an asset which, like other important business
assets, has value to an organization and consequently needs to
be suitably protected
• Definition:
− Preservation of confidentiality, integrity and availability of
information; in addition, other properties such as authenticity,
accountability, non-repudiation and reliability can also be
involved (ISO27001:2005)
• InfoSec also is The process of protecting the confidentiality,
availability and integrity (CIA) of data from accidental or
intentional misuse
• InfoSec is the Combination of technical and non-technical
approaches to reduce risks to information systems
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
Introduction to Information Security (IT200)
Security concepts –
information
✓ Confidentiality
✓ Integrity
✓ Availability
Security Concept –
People
✓ Authorization
✓ Authentication
✓ Accountability / Non-
repudiation
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
Introduction to Information Security (IT200)
Operational Model of Computer
Security
• The operational model of computer security includes two
additions to the original security equation:
• Protection = Prevention + (Detection + Response)
• Every security technique and technology falls into at least
one of the three elements of the equation.
PROTECTION =
PREVENTION + ( DETECTION + RESPONSE )
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
Principles of Information Security, 3rd Edition
20
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
Principles of Information Security, 3rd Edition
21
Securing Components
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
Principles of Information Security, 3rd Edition
22
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
Principles of Information Security, 3rd Edition
23
• Impossible to obtain
perfect security—it is a
process, not an absolute
• Security should be
considered balance
between protection and
availability
Balancing Information
Security and Access
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
Introduction to Information Security (IT200)
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
Introduction to Information Security (IT200)
i. Nontarget specific
• Generally in forms of − Key Logger
malicious software − Sniffer
(malware)
− Vulnerability Scanner
− Virus
− Backdoor
− Worm
− Rootkits
− Extortionware
− Bots
− Trojan
− Time/logic bomb
− Spyware
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
Introduction to Information Security (IT200)
Virus Worm
• Self-replicating program • Virus-like program that make
reproduced by attaching copies of itself across network
executable copies of itself to connection;
other program;
• Seeking uninfected workstation
• Requires a host program to
infect and it is not executed until in which to reproduce;
the host program is run. • Able to travel independently
• Effects: irritating messages to through different hosts and
destruction of the system; resides more in the computer
memory of a system rather than
on disk; and
• Aim: Continued reproduction to
cause disk or memory
overload throughout the
network.
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
Introduction to Information Security (IT200)
Extortionware Bots
• Also known as ransomware. • Internet robots, also known as
spiders, crawlers, and web bots.
• Malicious software that is
specifically designed to take • Self-propagating malware that
control of a computer infects its host and connects back to
system or its data and hold it a central server(s). The server
hostage so the attackers can functions as a “command and
demand payment from their control center” for a botnet,
victims. Malicious bots have the “worm-like
ability to self- propagate,” and can
also: gather passwords, launch Dos
attacks, Log keystrokes & etc
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
Introduction to Information Security (IT200)
Trojan Horse Time/Logic Bombs
• Resides in the code of the program • Kinds of Trojan Horses;
until the moment its activation;
• Logic Bomb inserts secretly into a
• Conditions of activation are system and causes a destructive
determined by the computer action when a certain logical event
programmer who designed the or sequence of event happens;
program;
• The trigger can be a specific date, a
• Posted through internet disguised countdown reaching zero or an
as a harmless program, game, or internal state met by other factors in
utility; the machine.
• Also used to exchange secret • e.g. A programmer who is unfairly
information between hackers; and removed from his or her post may
plant a time bomb to be triggered
• Also releases other malicious
after the date of his or her removal.
program such as viruses or worms.
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
Introduction to Information Security (IT200)
Spyware Key Logger
• Is a type of malicious • Is a specific of spyware.
software designed to steal • Records the keystrokes of a
personal information by user
running undetected on • It collects all the information
your machine & it has being processed through
found a pervasive home on the operating system &
the Internet. stores it all
• Will record what is done on
the machine over a period
of time & offload what it has
collected when it has an
available connection to the
spyware author’s site
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
Introduction to Information Security (IT200)
Sniffer Vulnerability Scanner
• A program and/or device that • Automated tools designed to
monitors data traveling over a assess computer systems,
network. networks or application for
weaknesses.
• Can be used both for legitimate
• Used to discover the weak
network management functions points or poorly constructed
and for stealing information off a parts.
network.
• Can be run either as part of
• Unauthorized sniffers vulnerability management by
➢ Extremely dangerous to a those tasked with protecting the
network's security because they systems or
are
• By hackers looking to gain
➢ Virtually impossible to detect and unauthorized access
can be inserted almost
anywhere.
➢ This makes them a favorite
weapon in the hacker's arsenal.
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
Introduction to Information Security (IT200)
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
Introduction to Information Security (IT200)
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
Introduction to Information Security (IT200)
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
Introduction to Information Security (IT200)
Types of Attackers
• Hackers vs Crackers
• White Hat
• Black Hat
• Gary Hat
• Hacktivism
• Cyberterrorist
• Script Kiddies
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
Introduction to Information Security (IT200)
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
Introduction to Information Security (IT200)
01 02 03
Black hat hackers White hat hackers Gray hat hackers
• The Bad guy • The Good guy • Ambiguous purposes &
• Violate computer • Break security for flexible morality
security for personal non-malicious • Less threating crackers,
but often border on the
gain and the goal is to purposes illegal with their activities
inflict malicious • Goal to expose • Goal is to break into a
damage security flaws, not to system without owner’s
• Also known as steal or corrupt data permission, but not for
crackers their own advantage
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
Introduction to Information Security (IT200)
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
Introduction to Information Security (IT200)
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
Introduction to Information Security (IT200)
End of lecture 1
UNIVERSITY MALAYSIA
OF COMPUTER SCIENCE & ENGINEERING
The Clues