Chapter 5. Computer Security
Chapter 5. Computer Security
COMPUTER SECURITY
Outline
Security Threats
Security Solutions
2
What is Computer Security?
Computer security, also known as cyber
security or IT security, is the protection of
computer systems, data, networks and
computing power from the theft or damage
to the hardware, software or the information
on them, as well as from disruption or
misdirection of the services they provide
3
Why Security?
Computer security is required because most
organizations can be damaged by software or
intruders.
The damages include:
Damage of computer systems.
Damage of internal data.
Loss of sensitive information to third parties.
Losing the ability to use the system
4
Who is vulnerable?
Financial institutions and banks
Internet service providers
Educational Institutions
Government and defense agencies
Contractors to various government agencies
Multinational corporations
ANYONE ON THE NETWORK/INTERNET
5
Computer Security
6
Computer Security Goals
Computer security addresses the following goals:
oConfidentiality
oIntegrity Confidentiality
oAvailability
Integrity
Availability
7
Security Goals
Confidentiality
• Refers to information protection from
unauthorized read/access operations
Integrity
• Refers to the trustworthiness of data or
resources within a computer system
• It is preventing from unauthorized change
Availability
• Availability refers to the ability to use the
computer system and information resources at
desired times by authorized parties
8
Security Threats
A computer security threat is any person,
act, or object that poses a danger to
computer security.
A threat is a potential violation of security.
The effects of threats can be an affect on the
Confidentiality of data
Integrity of data
Availability of a system.
9
Causes of Security Threats
Physical Threats: Loss of Physical Support
Weather, natural disaster, bombs, power
failures, terrorism, etc.
Human Threats:
stealing, fraud, bribery, spying, sabotage,
accidents.
Software Threats: Malicious Software
viruses, Trojan horses, Worms.
10
Intruders/Hackers
Intruders are usually trying to gain access to a
system, or to increased privileges to which they are
not entitled, often by obtaining the password for a
legitimate account.
Hacking: is any attempt to intrude or gain
unauthorized access to your system.
It may or may not be for malicious purposes.
Cracking: Criminal who breaks into computer
systems for the purpose of doing damage.
11
Malicious Software
Malware is a malicious software that invades a
computer system without the knowledge of the
owner.
Malware attempts to cause damage to, or consume the
resources of a target system.
Malicious Software refers to
Virus
Trojan Horse
Worm
Logic bomb
Trap door
Zombie
12
Virus
A small program that replicates and hides itself
inside other programs usually without your
knowledge
A virus is a program that can ”infect” other
programs by modification, as well as causing
local damage
The new copy of the virus is executed when a
user executes the new host program.
Similar to biological virus: Replicates and Spreads
13
Worm
Worm is an independent program that
spreads via network connections, typically
using either email, remote execution etc.
Worm reproduces by copying itself from
one computer to another and causes it to
execute; no user intervention is required
It can do as much harm as a virus
14
Trojan Horse
Secretly downloading a virus or some other type
of mal-ware on to your computers.
Seems to do something good but covertly doing
something else
Popular mechanism for hiding a virus or a worm
15
The effects of malicious software
Corrupting the systems data
Increasing file size
Formatting the hard disk
Slowing down the system
Renaming all files with different name
16
Security Solutions
There are a number of basic ways that a computer can be
made more secure.
Backups/disaster recovery
Encryption
Cryptography
Authentication
Validation
Data Protection
Anti-Viruses
Firewall
Intrusion Detection System (IDS)
17
Backups (redundancy/disaster recovery)
19
Authentication
Authentication is the process of logging in a manner
that proves his or her identity using username and
password to gain access to a system, network or web
site.
Example of authentication
Password
Fingerprint
Hand Geometry
Voice
Signature
Iris
20
Antiviruses
To prevent viruses from entering a system there
are two options.
Isolate the machine
disconnect it from the Internet or any other
network, not using USB disks or any other
removable disks.
Install an Antivirus program
Antivirus programs are designed to keep a watch
at all incoming files so that no malicious code can
enter the computer.
Use updated antivirus
21
Functions of Anti-virus
Identification of known viruses
Detection of suspected viruses
Blocking of possible viruses
Disinfection of infected objects
Deletion infected objects
Overwriting of infected objects
22
Example of Antivirus
Anti-viruses
Norton Antivirus
McAfee Antivirus
AVG Antivirus
Avira Antivirus
Kaspersky Antivirus
…..
23
Firewall
A firewall is a security system consisting of hardware
and/or software that prevents unauthorized network
access.
A firewall provides a security barrier between networks
or network segments.
24