d2 Printed
d2 Printed
Computer security basically is the protection of computer systems and information from harm,
theft, and unauthorized use. It is the process of preventing and detecting unauthorized use of
your computer system.
There are various types of computer security which is widely used to protect the valuable
information of an organization.
What is Computer Security and its types?
One way to ascertain the similarities and differences among Computer Security is by asking what
is being secured. For example,
Information security is securing information from unauthorized access, modification &
deletion
Application Security is securing an application by building security features to prevent
from Cyber Threats such as SQL injection, DoS attacks, data breaches and etc.
Computer Security means securing a standalone machine by keeping it updated and
patched
Network Security is by securing both the software and hardware technologies
Cybersecurity is defined as protecting computer systems, which communicate over the
computer networks
So, Computer security can be defined as controls that are put in place to provide
confidentiality, integrity, and availability for all components of computer systems. Let’s
elaborate the definition.
Components of computer system
The components of a computer system that needs to be protected are:
Hardware, the physical part of the computer, like the system memory and disk drive
Firmware, permanent software that is etched into a hardware device’s nonvolatile
memory and is mostly invisible to the user
Software, the programming that offers services, like operating system, word processor,
internet browser to the user
The CIA Triad
Computer security is mainly concerned with three main areas:
Types of Attacks
There are many kinds of attacks available to the dedicated hacker. These are among the most
famous and frequent types of attacks.
To keep it brief, a Trojan uses trickery and social engineering to deceive people into running it.
For example, a Trojan may pretend to be legitimate software. A worm is a type of Trojan
because it normally relies on social engineering to attack systems.
How does a computer worm spread?
Phishing: Fraudulent emails that look authentic can carry worms in corrupt attachments.
Such emails may also invite users to click malicious links or visit websites designed to
infect users with worms.
Spear-Phishing: Targeted phishing attempts can carry dangerous malware like
ransomware cryptoworms.
Networks: Worms can self-replicate across networks via shared access.
Security holes: Some worm variants can infiltrate a system by exploiting software
vulnerabilities.
File sharing: P2P file networks can carry malware like worms.
Social networks: Social platforms like MySpace have been affected by certain types of
worms.
Instant messengers (IMs): All types of malware, including worms, can spread through
text messages and IM platforms such as Internet Relay Chat (IRC).
External devices: Worms can infect USB sticks and external hard drives.
What does a computer worm do?
Once a computer worm has breached your computer’s defenses it can perform several malicious
actions:
Drop other malware like spyware or Overload networks
ransomware Steal data
Consume bandwidth Open a backdoor
Delete files Deplete hard drive space
Computer worm vs. virus
Some people think that a computer worm and computer virus are the same things because the
two behave similarly. They may even use the terms like "worm computer virus" or "worm virus
malware." The truth is that the two are comparable but different threats.
The defining difference between a virus and a worm is that viruses rely on human action for
activation and need a host system to replicate. In other words, a virus won’t harm your system
unless you run it. For example, a virus on a flash drive connected to your computer won’t
damage your system unless you activate it. And as mentioned above, a worm doesn’t need a host
system or user action to spread.
Computer worm examples
Over the years, there have been some particularly devastating worms. Some worms have caused
billions in damage. Here is a brief list of some infamous ones:
Morris Worm: Also known as the Internet worm, this was one of the first computer
worms to spread via the Internet and earn notoriety in the media.
Bagle: Also known as Beagle, Mitglieder, and Lodeight, this mass-mailing worm had
many variants.
Blaster: Also known as MSBlast, Lovesan, and Lovsan, this worm attacked computers
running Windows XP and Windows 2000.
Conficker: Also known as Downup, Downadup, and Kido, this worm exploited flaws in
Windows to infect millions of computers in over a hundred countries.
ILOVEYOU: The ILOVEYOU worm infected tens of millions of computers globally,
resulting in billions of dollars in damage.
Mydoom: This became the fastest-spreading email worm in 2004, sending junk email
across computers.
Ryuk: Although Ryuk wasn't always a worm, it's now worm-like ransomware.
SQL Slammer: The SQL Slammer worm gained infamy for slowing down Internet
traffic with denial-of-service attacks on some Internet hosts.
Storm Worm: This worm utilized social engineering with fake news of a disastrous
storm to drop botnets on compromised machines.
Stuxnet: Some experts believe this sophisticated worm was developed for years to
launch a cyberattack.
Symptoms of a computer worm
Many of the symptoms of a computer worm are like that of a computer virus. For example, you
may have a computer worm if your computer slows down, freezes, crashes or throws up error
messages. You may also notice that files are missing or corrupted or that your hard drive's space
is rapidly depleting inexplicably. Additionally, you may see alerts from your firewall about a
breach.
The main objective of worms is to eat the The main objective of viruses is to modify
2.
system resources. the information.
It doesn’t need a host to replicate from
3. It requires a host is needed for spreading.
one computer to another.
4. It is less harmful as compared. It is more harmful.
Worms can be detected and removed by Antivirus software is used for protection
5.
the Antivirus and firewall. against viruses.
6. Worms can be controlled by remote. Viruses can’t be controlled by remote.
Worms are executed via weaknesses in the
7. Viruses are executed via executable files.
system.
Internet worms, Instant messaging Boot sector virus, Direct Action virus,
worms, Email worms, File sharing worms, Polymorphic virus, Macro virus,
8.
Internet relay chat (IRC) worms are Overwrite virus, File Infector virus are
different types of worms. different types of viruses
Examples of worms include Morris worm, Examples of viruses include Creeper,
9.
storm worm, etc. Blaster, Slammer, etc.
It does not need human action to
10. It needs human action to replicate.
replicate.a that
11. Its spreading speed is faster. Its spreading speed is slower as compared.
Whenever users go to a domain that requires authentication, they are redirected to the
authentication domain where they may be asked to log in. If the user is already logged in at the
authentication domain, they can be immediately redirected to the original domain without
signing in again.
How it works
Single Sign-on and Single Logout are possible through the use of sessions. There may be up to
three different sessions for a user with SSO:
Local session maintained by the application
Authorization Server session, if SSO is enabled
Identity Provider session, if the user chose to log in through an Identity Provider (such as
Google, Facebook, or an enterprise SAML Identity Provider)
Same Sign On which is also often referred to as SSO is actually not the same as Single Sign-on
because it doesn’t involve any trust relationship between the entities that are doing the
authentication. It is more dependent on credentials being duplicated between systems and simply
passing in those credentials when necessary. It is not as secure as any of the Single Sign-on
solutions.
There are also some specific systems that commonly come up when we are discussing Single
Sign-on: Active Directory, Active Directory Federation Services (ADFS) and Lightweight
Directory Access Protocol (LDAP).
Active Directory, which nowadays is specifically referred to as Active Directory Directory
Services (ADDS), is Microsoft’s centralized directory service. Users and resources are added to
the directory service for central management and ADDS works with authentication protocols like
NTLM and Kerberos. Thus, users that belong to ADDS can authenticate from their machines and
get access to others systems that integrate with ADDS. This is a form of Single Sign-on.
Active Directory Federation Services (ADFS) is a type of Federated Identity Management
system that also provides Single Sign-on capabilities. It supports both SAML and OIDC. ADFS
is primarily used to set up trust between ADDS and other systems such as Azure AD or other
ADDS forests.
Phishing
Spear phishing
Keyloggers
Credential stuffing
Brute force and reverse brute force
attacks
Man-in-the-middle (MITM) attacks
What are cybersecurity standards?
Cybersecurity standards are collections of best practices created by experts to protect
organizations from cyber threats and help improve their cybersecurity posture.
Cybersecurity frameworks are generally applicable to all organizations, regardless of their size,
industry, or sector
Cybersecurity standards are collections of best practices created by experts to protect organizations
from cyber threats and help improve their cybersecurity posture. Cybersecurity frameworks are
generally applicable to all organizations, regardless of their size, industry, or sector.
The principal objective is to reduce the risks, including preventing or mitigating cyber-attacks.
The Cyber security provisions in this European standard are:
1. No universal default passwords 7. Ensure software integrity
2. Implement a means to manage reports of 8. Ensure that personal data is secure
vulnerabilities 9. Make systems resilient to outages
3. Keep software updated 10. Examine system telemetry data
4. Securely store sensitive security 11. Make it easy for users to delete user data
parameters 12. Make installation and maintenance of
5. Communicate securely devices easy
6. Minimize exposed attack surfaces 13. Validate input data
When you embrace proactive security, your organization will be positioned to:
Ensure that cybersecurity aligns with your business vision
Foster a security-conscious culture
Understand your high-risk areas
Implement an assessment program to identify risks, threats, and vulnerabilities
Approach security beyond compliance
Invest equally in prevention, detection, and response
How to develop a cybersecurity strategy: Step-by-step guide
A cybersecurity strategy isn't meant to be perfect, but it must be proactive, effective,
actively supported and evolving. Here are the four steps required to get there.
A cybersecurity strategy is a high-level plan for how your organization will secure its assets
during the next three to five years.
How do you build a cybersecurity strategy for your business?
Building a cybersecurity strategy for your business takes effort, but it could mean the difference
between surpassing your competitors and going out of business in the coming years. Here's the
basic steps you can follow to develop your strategy.
Step 1. Understand your cyber threat landscape
Before you can understand your cyber threat landscape, you need to examine the types of cyber
attacks that your organization faces today. Which types currently affect your organization the
most often and most severely: malware, phishing, insider threats or something else? Have your
competitors had major incidents recently, and if so, what types of threats caused them?
Step 2. Assess your cybersecurity maturity
Once you know what you're up against, you need to do an honest assessment of your
organization's cybersecurity maturity. Select a cybersecurity framework, like the NIST
Cybersecurity Framework. Use it first to assess how mature your organization is in dozens of
different categories and subcategories, from policies and governance to security technologies and
incident recovery capabilities. This assessment should include all of your technologies, from
traditional IT to operational technology, IoT and cyber-physical systems.
Step 3. Determine how to improve your cybersecurity program
Now that you know where you are and where you want to be, you need to figure out the
cybersecurity tools and best practices that will help you reach your destination. In this step, you
determine how to improve your cybersecurity program so that you achieve the strategic
objectives you've defined.
Step 4. Document your cybersecurity strategy
Once you have management approval, you need to ensure your cybersecurity strategy is
documented thoroughly. This includes writing or updating risk assessments, cybersecurity plans,
policies, guidelines, procedures and anything else you need to define what is required or
recommended in order to achieve the strategic objectives. Making it clear what each person's
responsibilities are is key.
What is Cyber Security Culture?
The concept of cyber security culture refers to the attitudes, knowledge, assumptions, norms
and values of the workforce of an organisation with respect to cyber security. These are shaped
by the goals, structure, policies, processes, and leadership of the organisation.
A good cyber security culture is one in which both the organisational determinants of culture
(policy, process, leadership, social norms etc.) and the individual determinants of culture
(attitudes, knowledge, assumptions etc.) align with the organisation’s approach to cyber security,
manifesting in cyber security conscious behaviours.
Why is it important to invest in a good cyber security culture?
A cyber-savvy mindset and cyber secure culture help deliver growth through digital trust,
improve an organisation’s reputation with customers and build employee pride. They create an
environment where good cyber hygiene becomes standard practice so the whole organisation can
operate more securely with less effort, freeing up time and energy for the core business.
What Are the Top Five Cybercrimes?
#1 Phishing
Phishing refers to emailing or contacting someone by pretending to belong to a well-known and
famous organization. Cybercriminals use phishing to lure people into providing sensitive
information like credit card details and addresses. Some other forms of phishing include
smishing (SMS phishing) and vishing (video phishing).
#2 Cyber Extortion
Cyber extortion is a crime where someone holds your data hostage till your company pays the
ransom. Cybercriminals gain access to your computers and steal confidential data. They often
gain this access by sending suspicious emails containing malware—malicious software—that
hijacks your computer. They can resort to blackmail, denial of service, locking you out of your
system, and more.
To keep your company safe from cyber extortion, you can opt for cyber liability insurance,
install anti-virus software, maintain numerous data backups, and educate your employees.
#3 Data breach
Data breaches can happen by accident or intentionally. Poor technological firewalls and
reckless employee behavior can result in a data breach. Often, hackers use phishing emails and
malware to steal sensitive and confidential information, resulting in a data breach.
#4 Identity theft
Identity theft happens when a person pretends to be someone else to commit fraud.
Cybercriminals steal your personal information, like identity cards, credit cards and the like, to
make transactions. The most common type of identity theft is financial identity theft. There are
also other types, like medical identity theft, child identity theft and more.
Often, criminals find your paper receipts containing bank details and use them to commit identity
theft. To avoid that, shift to using digital financial statements across your company. For the
things that have to be in paper form, use a quality shredder to ensure that you dispose of them
safely. Additionally, have strong passwords and ensure that only a select few have access to all
company files. You don’t need to share every single piece of information with each employee.
#5 Harassment
Harassment takes on many forms for small businesses. For instance, in April 2021, singer Demi
Lovato came under fire for harassing a local frozen yogurt shop on Instagram. She accused them
of triggering her “eating disorder” by placing the sugary yogurt options before the vegan ones.
There was also another instance of a woman bullying a Houston cafe online for speaking up
against the Texas abortion law. Harassment hurts the business’ reputation and often leaves a
mental scar on the person being harassed.To protect your team from harassment, you must have
a stringent anti-harassment policy in place.
What is Vulnerability.
Vulnerability describes the characteristics and circumstances of a community, system or
asset that make it susceptible to the damaging effects of a hazard. There are many aspects of
vulnerability, arising from various physical, social, economic, and environmental factors.
Vulnerability is the inability to resist a hazard or to respond when a disaster has occurred. For
instance, people who live on plains are more vulnerable to floods than people who live higher up.
In actual fact, vulnerability depends on several factors, such as people's age and state of health,
local environmental and sanitary conditions, as well as on the quality and state of local buildings
and their location with respect to any hazards.
A computer virus is a malicious piece of computer code designed to spread from device to device. A
subset of malware, these self-copying threats are usually designed to damage a device or steal data.
Boot Sector Virus. Your computer drive has a sector solely responsible for pointing to the
operating system so that it can boot into the interface. ...
Web Scripting Virus. ...
Browser Hijacker. ...
Resident Virus. ...
Direct Action Virus. ...
Polymorphic Virus. ...
File Infector Virus. ...
Multipartite Virus.
Phishing.
Spear phishing.
Keyloggers.
Credential stuffing.
Brute force and reverse brute force attacks.
Man-in-the-middle (MITM) attacks.
What is Computer
Security?
The meaning of the term computer security has evolved in recent years. Before the problem of
data security became widely publicized in the media, most people’s idea of computer security
focused on the physical machine.