0% found this document useful (0 votes)
47 views

Unit-11 Computer Security

Computer security focuses on security attacks, security mechanisms, and security services. Security attacks are actions that breach computer security and include passive attacks that obtain information and active attacks that modify systems. Security mechanisms are tools like cryptography, digital signatures, and firewalls that detect, prevent, or recover from attacks. Security services provide specific protections like confidentiality, integrity, authentication, and non-repudiation. Malicious software are programs intentionally designed to harm systems, and include viruses, worms, Trojan horses, and malicious scripts.

Uploaded by

Sleshma kalika
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views

Unit-11 Computer Security

Computer security focuses on security attacks, security mechanisms, and security services. Security attacks are actions that breach computer security and include passive attacks that obtain information and active attacks that modify systems. Security mechanisms are tools like cryptography, digital signatures, and firewalls that detect, prevent, or recover from attacks. Security services provide specific protections like confidentiality, integrity, authentication, and non-repudiation. Malicious software are programs intentionally designed to harm systems, and include viruses, worms, Trojan horses, and malicious scripts.

Uploaded by

Sleshma kalika
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Course Contents Computer Security

Unit-11:Computer Security (3 Hrs.) Computer Security:


Computer security: Security attacks, security mechanisms, security services
 Introduction; 

 Security threat and security attack


 Security Threat and Security Attack;  Malicious software: Virus, worm, Trojan horse, Javascript, java applet, ActiveX
control
 Malicious Software;
 Hacking: Packet sniffing, password cracking, e-mail hacking
 Security Services;  Security services: Confidentiality, integrity, authentication, non-repudiation

 Security Mechanisms (Cryptography, Digital  Security mechanisms


• Cryptography—Secret key cryptography, public-key cryptography, hash function
Signature, Firewall, Users Identification and • Digital signature—Digital signature algorithms

Authentication, Intrusion Detection Systems); • Firewall—Functions of firewall, working principle, types of firewall (packet filter firewall, circuit filter
firewall, proxy or application-level firewall)

 Security Awareness; Security Policy • Users identification and authentication—User name and password, smart card, biometrics
• Other security measures—Intrusion detection systems, virus protection software, data and
information backups, SSL, IPsec protocol
 Security awareness, security policy (formulating a security policy)

Computer Security Computer Security


Computer Security: Introduction Computer Security:
 Individual users, organizations, and enterprises who use to keep data in
their computer and using internet for data sharing need to keep the Computer security focuses on the security attacks, security mechanisms and
computers and the network (Internet) secure. security services.
 We should be aware of from whom to secure your data, and also about the  Security attacks are the reasons for breach of security. Security attacks
security mechanisms to ensure security. comprise of all actions that breaches the computer security.
 Computer security includes security of, both, the computer and the Internet.  Security mechanisms are the tools that include the algorithms, protocols or
 The purpose of this chapter is to introduce you to “Computer Security”. devices, that are designed to detect, prevent, or recover from a security
attack.
 Security services are the services that are provided by a system for a
specific kind of protection to the system resources.

Computer Security Computer Security


Security threat and Security attack : Security threat and security attack :
A threat is a potential violation of security and causes harm. A threat can be a An active attack tries to alter the system resources or affect its operations.
malicious program, a natural disaster or a thief. Vulnerability is a weakness of Active attack may modify the data or create a false data. An active attack may
system that is left unprotected. Systems that are vulnerable are exposed to be a masquerade (an entity pretends to be someone else), replay (capture events
threats. Threat is a possible danger that might exploit vulnerability; the actions and replay them), modification of messages, and denial of service. Active
that cause it to occur are the security attacks. attacks are difficult to prevent. However, an attempt is made to detect an active
attack and recover from them.
A security attack may be a passive attack or an active attack.
Security attacks can be on users, computer hardware and computer software.
The aim of a passive attack is to get information from the system but it does
not affect the system resources. Passive attacks may analyze the traffic to find
the nature of communication that is taking place, or, release the contents of the
message to a person other than the intended receiver of the message. Passive
attacks are difficult to detect because they do not involve any alteration of the
data. Thus, the emphasis in dealing with passive attacks is on prevention rather
than detection.
Computer Security Computer Security
Security threat and security attack : MALICIOUS SOFTWARE:
Attacks on users could be to the identity of user and to the privacy of user. Identity The software that is intentionally included into a system with the intention to harm the
attacks result in someone else acting on your behalf by using personal information like system is called malicious software. Viruses, Trojan horse, and Worms are examples
password, PIN number in an ATM, credit card number, social security number etc. of malicious programs. Java scripts and Java applets written with the purpose of
Attacks on the privacy of user involve tracking of users habits and actions—the attacking, are also malicious programs.
website user visits, the buying habit of the user etc. Cookies and spam mails are used
Viruses, worms and Trojan Horses are all malicious programs that can cause damage
for attacking the privacy of users.
to computer, but there are differences among the three, and knowing those differences
Attacks on computer hardware could be due to a natural calamity like floods or can help you better protect your computer from damaging effects.
earthquakes; due to power related problems like power fluctuations etc.; or by
Malicious software are:
destructive actions of a burglar.
1. Virus
Software attacks harm the data stored in the computer. Software attacks may be due to
malicious software, or, due to hacking. Malicious software or malware is a software 2. Worms
code included into the system with a purpose to harm the system. Hacking is
3. Trojan Horse
intruding(interfering) into another computer or network to perform an illegal act.
4. Java scripts, Java Applets and ActiveX Controls

Computer Security Computer Security


MALICIOUS SOFTWARE: MALICIOUS SOFTWARE:
Malicious software are: 1. Virus
1. Virus Virus is a software program that is destructive in nature. Virus programs have the
2. Worms following properties:

3. Trojan Horse  It can attach itself to other healthy programs.


 It can replicate itself and thus can spread across a network.
4. Java scripts, Java Applets and ActiveX Controls
 It is difficult to trace a virus after it has spread across a network.
 Viruses harm the computer in many ways
• corrupt or delete data or files on the computer,
• change the functionality of software applications,
• use e-mail program to spread itself to other computers,
• erase everything on the hard disk, or,
• degrade performance of the system by utilizing resources such as memory or disk space.
 Virus infects an executable file or program. The virus executes when a program
infected with virus is executed or you start a computer from a disk that has infected
system files.

Computer Security Computer Security


MALICIOUS SOFTWARE: MALICIOUS SOFTWARE:
1. Virus 2. Worms
 Virus infects an executable file or program. The virus executes when a Worm is self-replicating software that uses network and security holes to
program infected with virus is executed or you start a computer from a disk replicate itself. A copy of the worm scans the network for another machine that
that has infected system files. has a specific security hole. It copies itself to the new machine using the
 Once a virus is active, it loads into the computer’s memory and may save security hole, and then starts replicating from there, as well. A worm is
itself to the hard drive or copies itself to applications or system files on the however different from a virus. A worm does not modify a program like a
disk. virus, however, it replicates so much that it consumes the resources of the
 However, viruses cannot infect write protected disks or infect written computer and makes it slow.
documents. Viruses do not infect an already compressed file. Viruses also Some examples of worms are—“Code Red” and “Nimda”.
do not infect computer hardware; they only infect software.
 Viruses are most easily spread by attachments in e-mail messages. Viruses
also spread through download on the Internet.
• Some examples of viruses are—“Melissa” and “I Love You”.
Computer Security Computer Security
MALICIOUS SOFTWARE: MALICIOUS SOFTWARE:
3. Trojan 4. Java scripts, Java Applets and ActiveX Controls
Javascript is a scripting language generally nested within HTML code. The client-
Users install Trojan horses thinking that it will serve a useful purpose such as a
side scripts on a HTML page execute inside the Web browser on the client
game or provide entertainment. However, Trojan horses contain programs that
computer. Javascript codes can be used to transfer files, send e-mails and write to
corrupt the data or damage the files. Trojan horses can corrupt software
local files. If used with a maligned intention, the scripts can be dangerous for the
applications. They can also damage files and can contain viruses that destroy client machine.
and corrupt data and programs. Trojan horse does not replicate themselves like
viruses. Applets (Java programs), and ActiveX controls are used with Microsoft
technology, which can be inserted in a Web page and are downloaded on the client
browser for execution. Applets and ActiveX controls are generally used to provide
added functionality such as sound and animation. However, these programs when
designed with a malicious intention can be disastrous for the client machine.
Java Applets have strong security checks that define what an applet can do and
what it cannot. ActiveX controls do not have such security checks. Normally,
ActiveX controls must be kept disabled while working on the Internet.

Computer Security Computer Security


HACKING : 1. Packet Sniffing
Hacking is the act of intruding into someone else’s computer or network. Hacking may The data and the address information are sent as packets over the Internet. The
result in a Denial of Service (DoS) attack or prevents authorized users from accessing packets may contain data like a user name and password, e-mail messages, files
the resources(email, web sites, online accounts banking, etc.) of the computer. It aims etc. Packet sniffing programs are used to intercept the packets while they are
at making the computer resource unusable or unavailable to its intended users. being transmitted from source to destination. Once intercepted, the data in the
In a DoS attack, the services of the entire network, an Internet site or service, may be packets is captured and recorded. Generally, packet sniffers are interested in
suppressed or disabled. The affected machine is flooded with spurious requests and packets carrying the username and password. Packet sniffing attacks normally
messages so as to overload the network. As a result, the affected machine cannot go undetected. Ethereal and Zx Sniffer are some freeware packet sniffers.
process the valid requests. This is a denial of service to the valid users. Telnet, FTP, SMTP are some services that are commonly sniffed.
Generally, the targets of such attacks are the sites hosted on high-profile web servers 2. Password Cracking
such as banks and credit card payment gateways. Cracking of password is used by hackers to gain access to systems. The
Packet sniffing, E-mail hacking and Password cracking are used to get the username
password is generally stored in the system in an encrypted form. Utilities like
and password of the system to gain unauthorized access to the system. These methods Password cracker is used to crack the encrypted passwords. Password cracker
gather the information when the data is being transmitted over the network. is an application that tries to obtain a password by repeatedly generating and
comparing encrypted passwords or by authenticating multiple times to an
authentication source.

Computer Security Computer Security


3. E-mail Hacking SECURITY SERVICES:
The e-mail transmitted over the network contains the e-mail header and the The security services provide specific kind of protection to system resources.
content. If this header and the content are sent without encryption, the hackers Security services ensure Confidentiality, Integrity, Authentication, and Non-
may read or alter the messages in transit. Hackers may also change the header Repudiation of data or message stored on the computer, or when transmitted
to modify the sender’s name or redirect the messages to some other user. over the network. Additionally, it provides assurance for access control and
Hackers use packet replay to retransmit message packets over a network. availability of resources to its authorized users.
Packet replay may cause serious security threats to programs that require
authentication sequences. A hacker may replay the packets containing Confidentiality: The confidentiality aspect specifies availability of information
authentication data to gain access to the resources of a computer. to only authorized users. In other words, it is the protection of data from
unauthorized disclosure. It requires ensuring the privacy of data stored on a
server or transmitted via a network, from being intercepted or stolen by
unauthorized users. Data encryption stores or transmits data, in a form that
unauthorized users cannot understand. Data encryption is used for ensuring
confidentiality.
Computer Security Computer Security
SECURITY SERVICES: SECURITY SERVICES:
Integrity: It assures that the received data is exactly as sent by the sender, i.e. Non-Repudiation prevents either sender or receiver from denying a transmitted
the data has not been modified, duplicated, reordered, inserted or deleted message. For a message that is transmitted, proofs are available that the message was
before reaching the intended recipient. The data received is the one actually sent by the alleged sender and the message was received by the intended recipient. For
sent and is not modified in transit. example, if a sender places an order for a certain product to be purchased in a
particular quantity, the receiver knows that it came from a specified sender. Non-
Authentication: Authentication is the process of ensuring and confirming the repudiation deals with signatures.
identity of the user before revealing any information to the user. Authentication
Access Control: It is the prevention of unauthorized use of a resource. This specifies
provides confidence in the identity of the user or the entity connected. It also the users who can have access to the resource, and what are the users permitted to do
assures that the source of the received data is as claimed. Authentication is once access is allowed.
facilitated by the use of username and password, smart cards, biometric
Availability: It assures that the data and resources requested by authorized users are
methods like retina scanning and fingerprints.
available to them when requested.

Computer Security Computer Security


SECURITY MECHANISMS: SECURITY MECHANISMS TECHNOLOGIES:
Security mechanisms deal with prevention, detection, and recovery from a  Cryptography: Secret key cryptography, public-key cryptography, hash
security attack. Prevention involves mechanisms to prevent the computer from function
being damaged. Detection requires mechanisms that allow detection of when,  Digital signature: Digital signature algorithms
how, and by whom an attacked occurred. Recovery involves mechanism to stop
the attack, assess the damage done, and then repair the damage.  Firewall: Functions of firewall, working principle, types of firewall (packet
filter firewall, circuit filter firewall, proxy or application-level firewall)
Security mechanisms are built using personnel and technology.
 Users identification and authentication: User name and password, smart
 Personnel are used to frame security policy and procedures, and for card, biometrics
training and awareness.
 Security mechanisms use technologies like cryptography, digital signature,  Other security measures: Intrusion detection systems, virus protection
firewall, user identification and authentication, and other measures like software, data and information backups, SSL, IPsec protocol
intrusion detection, virus protection, and, data and information backup, as
countermeasures for security attack.

Computer Security Computer Security


SECURITY MECHANISMS TECHNOLOGIES: SECURITY MECHANISMS TECHNOLOGIES:
Cryptography: Secret key cryptography, public-key cryptography, hash function Cryptography: Secret key cryptography, public-key cryptography, hash function
Cryptography uses different schemes for the encryption of data. These schemes constitute a
Cryptography is the science of writing information in a “hidden” or “secret” form. pair of algorithms which creates the encryption and decryption, and a key.
Cryptography is necessary when communicating data over any network, Key is a secret parameter (string of bits) for a specific message exchange context. Keys are
particularly the Internet. It protects the data in transit and also the data stored on important, as algorithms without keys are not useful. The encrypted data cannot be accessed
the disk. Some terms commonly used in cryptography are: without the appropriate key. The size of key is also important. The larger the key, the harder it
is to crack a block of encrypted data. The algorithms differ based on the number of keys that
 Plaintext is the original message that is an input, i.e. unencrypted data. are used for encryption and decryption. The three cryptographic schemes are as follows:
 Cipher and Code - Cipher is a bit-by-bit or character-by-character  Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption,
transformation without regard to the meaning of the message. Code replaces  Public Key Cryptography (PKC): Public-key cryptography uses two keys—one public
one word with another word or symbol. Codes are not used any more. key and one private key. Uses one key for encryption and another for decryption,
 Cipher text - It is the coded message or the encrypted data.  Hash Functions: Hash functions are one-way encryption algorithms and doesn’t use key.
 Encryption - It is the process of converting plaintext to cipher text, using an This scheme computes a fixed-length hash value based upon the plaintext. Once a hash
encryption algorithm. function is used, it is difficult to recover the contents or length of the plaintext. Uses a
 Decryption - It is the reverse of encryption, i.e. converting cipher text to mathematical transformation to irreversibly encrypt information.
plaintext, using a decryption algorithm. In all these schemes, algorithms encrypt the plaintext into cipher text, which in turn is
decrypted into plaintext.
Computer Security Computer Security
SECURITY MECHANISMS TECHNOLOGIES: SECURITY MECHANISMS TECHNOLOGIES:
Cryptography: Secret key cryptography, public-key cryptography, hash function  Digital signature: Digital signature algorithms
A signature on a legal, financial or any other document authenticates the document. A
The different cryptographic schemes are often used in combination for a secure transmission.
photocopy of that document does not count. For computerized documents, the
Cryptography is used in applications like, security of ATM cards, computer passwords, and
conditions that a signed document must hold are—(1) The receiver is able to verify the
electronic commerce. Cryptography is used to protect data from theft or alteration, and also for
user authentication. sender (as claimed), (2) The sender cannot later repudiate the contents of the message,
(3) The receiver cannot concoct the message himself. A digital signature is used to
Certification Authorities (CA) are necessary for widespread use of cryptography for e- sign a computerized document. The properties of a digital signature are same as that of
commerce applications. CAs are trusted third parties that issue digital certificates for use by
ordinary signature on a paper. Digital signatures are easy for a user to produce, but
other parties. A CA issues digital certificates which contains a public key, a name, an expiration
difficult for anyone else to forge. Digital signatures can be permanently tied to the
date, the name of authority that issued the certificate, a serial number, any policies describing
how the certificate was issued, how the certificate may be used, the digital signature of the content of the message being signed and then cannot be moved from one document to
certificate issuer, and any other information. another, as such an attempt will be detectable.
Digital signature scheme is a type of asymmetric cryptography. Digital signatures use
the public key cryptography, which employs two keys—private key and public key.
The digital signature scheme typically consists of three algorithms:

Computer Security Computer Security


SECURITY MECHANISMS TECHNOLOGIES: SECURITY MECHANISMS TECHNOLOGIES:
 Digital signature: Digital signature algorithms Firewall:
Digital signature scheme is a type of asymmetric cryptography. Digital signatures use A firewall is a security mechanism to protect a local network from the threats it may
the public key cryptography, which employs two keys—private key and public key. face while interacting with other networks (Internet). A firewall can be a hardware
The digital signature scheme typically consists of three algorithms: component, a software component, or a combination of both. It prevents computers in
 Key generation algorithm - The algorithm outputs private key and a one network domain from communicating directly with other network domains. All
corresponding public key. communication takes place through the firewall, which examines all incoming data
before allowing it to enter the local network.
 Signing algorithm - It takes, message + private key, as input, and, outputs a digital
signature. 1. Functions of firewall,
2. Working principle,
 Signature verifying algorithm - It takes, message + public key + digital signature,
as input, and, accepts or rejects digital signature. 3. Types of firewall
a) packet filter firewall,
The use of digital signatures typically consists of two processes—Digital signature
creation and Digital signature verification. Two methods are commonly used for b) circuit filter firewall,
creation and verification of the digital signatures. c) proxy or application-level firewall)

Computer Security Computer Security


SECURITY MECHANISMS TECHNOLOGIES: SECURITY MECHANISMS TECHNOLOGIES:
Firewall: Firewall: Working of Firewall
Functions of Firewall: The main purpose of firewall is to protect computers of an The working of firewall is based on a filtering mechanism. The filtering mechanism
organization (local network) from unauthorized access. Some of the basic functions of keeps track of source address of data, destination address of data and contents of data.
firewall are: The filtering mechanism allows information to be passed to the Internet from a local
network without any authentication. It makes sure that the downloading of
 Firewalls provide security by examining the incoming data packets and allowing information from the Internet to a local network happens based only on a request by
them to enter the local network only if the conditions are met. an authorized user.
 Firewalls provide user authentication by verifying the username and password.
This ensures that only authorized users have access to the local network.
 Firewalls can be used for hiding the structure and contents of a local network
from external users. Network Address Translation (NAT) conceals the internal
network addresses and replaces all the IP addresses of the local network with one
or more public IP addresses.
Computer Security Computer Security
SECURITY MECHANISMS TECHNOLOGIES: SECURITY MECHANISMS TECHNOLOGIES:
Firewall: Firewall Related Terminology: Firewall: Types of Firewall
 Gateway: The computer that helps to establish a connection between two All the data that enter a local network must come through a firewall. The type of
networks is called gateway. A firewall gateway is used for exchanging firewall used varies from network to network. The following are the various types of
information between a local network and the Internet. firewalls generally used:
 Proxy Server: A proxy server masks the local network’s IP address with the  Packet filter Firewall
proxy server IP address, thus concealing the identity of local network from the
external network. Web proxy and application-level gateway are some examples of  Circuit Filter Firewall
proxy servers. A firewall can be deployed with the proxy for protecting the local  Proxy server or Application-level Gateway
network from external network.
 Screening Routers: They are special types of router with filters, which are used
along with the various firewalls. Screening routers check the incoming and
outgoing traffic based on the IP address, and ports.

Computer Security Computer Security


SECURITY MECHANISMS TECHNOLOGIES: SECURITY MECHANISMS TECHNOLOGIES:
Firewall: Types of Firewall: 1. Packet filter Firewall Firewall: Types of Firewall: 1. Packet filter Firewall
Packet Filter Firewall is usually deployed on the routers. It is the simplest kind of
mechanism used in firewall protection.
 It is implemented at the network level to check incoming and outgoing packets.
 The IP packet header is checked for the source and the destination IP addresses
and the port combinations.
 After checking, the filtering rules are applied to the data packets for filtering. The
filtering rules are set by an organization based on its security policies.
 If the packet is found valid, then it is allowed to enter or exit the local network.
 Packet filtering is fast, easy to use, simple and cost effective.
 A majority of routers in the market provide packet filtering capability. It is used in
small and medium businesses.
 Packet filter firewall does not provide a complete solution.

Computer Security Computer Security


SECURITY MECHANISMS TECHNOLOGIES: SECURITY MECHANISMS TECHNOLOGIES:
Firewall: Types of Firewall: 2. Circuit Filter Firewall Firewall: Types of Firewall: 3. Proxy server or Application-level Gateway
Circuit filter firewalls provide more protection than packet filter firewalls. Circuit An application-level gateway or a proxy server protects all the client applications
filter firewall is also known as a “stateful inspection” firewall. running on a local network from the Internet by using the firewall itself as the gateway
 It prevents transfer of suspected packets by checking them at the network layer.  A proxy server creates a virtual connection between the source and the destination hosts.
 It checks for all the connections made to the local network, in contrast, to the packet filter  A proxy firewall operates on the application layer. The proxy ensures that a direct
firewall which makes a filtering decision based on individual packets. connection from an external computer to local network never takes place.
 It takes its decision by checking all the packets that are passed through the network layer  The proxy automatically segregates all the packets depending upon the protocols used for
and using this information to generate a decision table. The circuit level filter uses these them. A proxy server must support various protocols. It checks each application or service,
decisions tables to keep track of the connections that go through the firewall. like Telnet or e-mail, when they are passed through it.
 For example, when an application that uses TCP creates a session with the remote host, the  A proxy server is easy to implement on a local network.
TCP port number for the remote application is less than 1024 and the TCP port number for  Application level gateways or proxy server tend to be more secure than packet filters.
the local client is between 1024 and 65535. A packet filter firewall will allow any packet Instead of checking the TCP and IP combinations that are to be allowed, it checks the
which has a port number within the range 1024 and 65535. However, the circuit filter allowable applications.
firewall creates a directory of all outbound TCP connections. An incoming packet is
allowed if its profile matches with an entry in the directory for the TCP port numbers.
Computer Security Computer Security
SECURITY MECHANISMS TECHNOLOGIES: SECURITY MECHANISMS TECHNOLOGIES:
Firewall: Types of Firewall: 3. Proxy server or Application-level Gateway Users identification and authentication:
1. User name and password,
2. Smart card
3. Biometrics
Identification is the process whereby a system recognizes a valid user’s identity.
Authentication is the process of verifying the claimed identity of a user. For example,
a system uses user password for identification. The user enters his password for
identification. Authentication is the system which verifies that the password is correct,
and thus the user is a valid user. Before granting access to a system, the user’s identity
needs to be authenticated. If users are not properly authenticated then the system is
potentially vulnerable to access by unauthorized users. If strong identification and
authentication mechanisms are used, then the risk that unauthorized users will gain
access to a system is significantly decreased. Authentication is done using one or more
combinations of - what you have (like smartcards), what you know (Password), and
what you are (Biometrics like Fingerprints, retina scans).

Computer Security Computer Security


SECURITY MECHANISMS TECHNOLOGIES: SECURITY MECHANISMS TECHNOLOGIES:
Users identification and authentication: Other security measures:
Authentication mechanisms are: In addition to the above discussed security techniques, several other security
1. User name and password techniques are used for security purposes. Some of these are listed below:

2. Smart Card 1. Intrusion detection systems,

3. Biometrics—Fingerprints, Iris/retina scan 2. virus protection software,

Once the user is authenticated, the access controls for the user are also defined. Access 3. data and information backups,
controls is what the user can access once he is authenticated. 4. SSL,
5. IPsec protocol

Computer Security Computer Security


SECURITY MECHANISMS TECHNOLOGIES: SECURITY MECHANISMS TECHNOLOGIES:
Other security measures: Intrusion detection systems, virus protection software, data Other security measures: Intrusion detection systems, virus protection software, data
and information backups, SSL, IPsec protocol and information backups, SSL, IPsec protocol
In addition to the above discussed security techniques, several other security Data and Information Backups: It is required for disaster recovery and business continuity.
techniques are used for security purposes. Some of these are listed below: Back-ups should be taken daily and periodically (weekly) and should be kept for at least 30
days while rotating stockpile.
Intrusion Detection Systems : They complement firewalls to detect if internal assets
are being hacked or exploited. A Network-based Intrusion Detection monitors real- Secure Socket Layer (SSL): is an algorithm developed by Netscape Communications to
provide application-independent security and privacy over the Internet. SSL is designed so that
time network traffic for malicious activity and sends alarms for network traffic that
protocols such as HTTP, FTP, and Telnet can operate over it transparently. SSL allows both
meets certain attack patterns or signatures. A Host-based Intrusion Detection monitors server authentication (mandatory) and client authentication (optional). It uses public-key
computer or server files for anomalies and sends alarms for network traffic that meets cryptography (RSA algorithm).HTTP Secure(HTTPS) is an extension to HTTP to provide
a predetermined attack signature. secure exchange of documents over the WWW
Virus Protection Software: They should be installed on all network servers, as well as
computers. They screen all software coming into your computer or network system
(files, attachments, programs, etc.) preventing a virus from entering into the system.
Computer Security Computer Security
SECURITY MECHANISMS TECHNOLOGIES: Security Awareness:
 Other security measures: Intrusion detection systems, virus protection software,
data and information backups, SSL, IPsec protocol
The aim of the security awareness is to enhance the security of the
IP Security (IPsec) Protocol: The IPsec protocol suite is used to provide privacy and organization’s resources by improving the awareness of the need to secure the
authentication services at the Internet layer. IPv4 is currently the dominant Internet Protocol
version. IPv6 is the next-generation Internet Layer protocol for the Internet. IPv6 protocol
system resources.
stacks include IPsec, which allows authentication, encryption, and compression of IP traffic. Staff members play a critical role in protecting the integrity, confidentiality, and
IPsec can be used to protect any application traffic across the Internet. Applications need not be
availability of IT systems and networks. It is necessary for an organization to
specifically designed to use IPsec, unlike SSL where the use of SSL must be incorporated into
the design of application. train their staff for security awareness and accepted computer practices.
Security of resources can be ensured when the people using it are aware of the
need to secure their resources.
Security awareness of staff includes the knowledge of practices that must be
adhered to, for ensuring the security and the possible consequences of not
using those security practices.

Computer Security Computer Security


Security Policy: Security Policy:
 A security policy is a formal statement that embodies the organization’s  Generally, security policies are included within a security plan. A security
overall security expectations, goals, and objectives with regard to the plan details how the rules put forward by the security policy will be
organization’s technology, system and information. implemented. The statements within a security
 To be practical and implementable, policies must be defined by standards,  plan can ensure that each employee knows the boundaries and the penalties
guidelines, and procedures. Standards, guidelines, and procedures provide of overstepping those boundaries. For example, some rules could be
specific interpretation of policies and instruct users, customers, technicians, included in the security policy of an organization, such as, to log off the
management, and others on how to implement the policies. system before leaving the workstation, or not to share the password with
The security policy states what is, and what is not allowed. A security other users.

policy must be comprehensive, up-to-date, complete, delivered effectively,  The security policy also includes physical security of the computers. Some
and available to all staff. A security policy must also be enforceable. To of the measures taken to ensure the physical security of a computer are -
accomplish this, the security policy can mention that strict action will be taking regular backups to prevent data loss from natural calamity, virus
taken against employees who violate it, like disclosing a password. attack or theft, securing the backup media, keeping valuable hardware
resources in locked room (like servers), to avoid theft of systems and
storage media.

Computer Security Computer Security


Formulating a Security Policy: Formulating a Security Policy:
Security policies are defined based on an organization’s needs. A security Defining the Proactive and Reactive Security Strategies:
policy includes approaches and techniques that an organization is going to
A proactive strategy is a pre-attack strategy. It involves identifying possible
apply or include in order to secure its resources. The steps followed while
damage from each type of attack, determining the vulnerabilities that each type
formulating the security policy are:
of attack can exploit, minimizing those vulnerabilities and making a
1. Analyzing Current Security Policies contingency plan. A contingency plan specifies the actions to be taken in case
an attack penetrates into a system and damages the IT assets of the
2. Identifying IT Assets that Need to be Secure
organization. A contingency plan aims at keeping the computer functional and
3. Identifying Security Threats and Likely Security Attacks ensuring the availability, integrity, and confidentiality of data. However, it is
4. Defining the Proactive and Reactive Security Strategies not possible for the security administrator to prepare a computer against all
attacks. A reactive strategy is implemented on the failure of the proactive
strategy. It defines the steps to be taken after the attack. It aims at identifying
the cause of attack, vulnerabilities used to attack the system, damage caused by
the attack, and repairing of the damage caused by the attack.

You might also like