Module 5 ITC 111
Module 5 ITC 111
Module 5 :
Computer and Information Security
Prepared by:
JENNIE T. FERNANDO
Assistant Professor I
E-mail Address: [email protected] /[email protected]
Mobile Number: +639778254102/ +639885804531
ITP 222
ITC :111
QUANTITATIVE METHODS
: INTRO TO COMPUTING Bachelor of Science in Information Technology
College
College of
of
Computer
Computer
Studies
Studies
ITC
ITC111
111: INTRO TOTO
: INTRO COMPUTING
COMPUTING TOPIC : COMPUTER
TOPIC: AND INFORMATION
BASIC COMPUTER CONCEPTSSECURITY
College
College of
of
Computer
Computer
Studies
Studies
➢ Need arose during World War II when the 1st mainframes developed
to aid computations for communication code-breaking were put to
use
➢ Multiple levels of security were implemented to protect mainframes
and maintain the integrity of data
➢ Access to sensitive military locations was controlled utilizing badges,
keys and facial recognitions of authorized personnel
➢ One of the 1st documented security problems occurred in 1960s
when as system administrator was working on a message of the day
(MOTD) file and another administrator was editing the password file.
ITC
ITC111
111: INTRO TOTO
: INTRO COMPUTING
COMPUTING TOPIC : COMPUTER
TOPIC: AND INFORMATION
BASIC COMPUTER CONCEPTSSECURITY
College
College of
of
Computer
Computer
Studies
Studies
ITC
ITC111
111: INTRO TOTO
: INTRO COMPUTING
COMPUTING TOPIC : COMPUTER
TOPIC: AND INFORMATION
BASIC COMPUTER CONCEPTSSECURITY
College
College of
of
Computer
Computer
Studies
Studies
ITC
ITC111
111: INTRO TOTO
: INTRO COMPUTING
COMPUTING TOPIC : COMPUTER
TOPIC: AND INFORMATION
BASIC COMPUTER CONCEPTSSECURITY
College
College of
of
Computer
Computer
Studies
Studies
ITC
ITC111
111: INTRO TOTO
: INTRO COMPUTING
COMPUTING TOPIC : COMPUTER
TOPIC: AND INFORMATION
BASIC COMPUTER CONCEPTSSECURITY
College
College of
of
Computer
Computer
Studies
Studies
ITC
ITC111
111: INTRO TOTO
: INTRO COMPUTING
COMPUTING TOPIC : COMPUTER
TOPIC: AND INFORMATION
BASIC COMPUTER CONCEPTSSECURITY
College
College of
of
Computer
Computer
Studies
Studies
ITC
ITC111
111: INTRO TOTO
: INTRO COMPUTING
COMPUTING TOPIC : COMPUTER
TOPIC: AND INFORMATION
BASIC COMPUTER CONCEPTSSECURITY
College
College of
of
Computer
Computer
Studies
Studies
Confidentiality – concealment of information or resources
Authenticity – confirms that the identity of the user is genuine and legitimate
ITC
ITC111
111: INTRO TOTO
: INTRO COMPUTING
COMPUTING TOPIC : COMPUTER
TOPIC: AND INFORMATION
BASIC COMPUTER CONCEPTSSECURITY
College
College of
of
Computer
Computer
Studies
Studies
Threat – an object,
person or other
entity that presents
an ongoing danger
to an asset
ITC
ITC111
111: INTRO TOTO
: INTRO COMPUTING
COMPUTING TOPIC : COMPUTER
TOPIC: AND INFORMATION
BASIC COMPUTER CONCEPTSSECURITY
College
College of
of
Computer
Computer
Studies
Studies
Attack – act that takes advantage of a vulnerability to compromise a controlled
system
Vulnerability – identified weakness in a controlled system where controls are not
present or are no longer effective
ITC
ITC111
111: INTRO TOTO
: INTRO COMPUTING
COMPUTING TOPIC : COMPUTER
TOPIC: AND INFORMATION
BASIC COMPUTER CONCEPTSSECURITY
College
College of
of
Computer
Computer
Studies
Studies
➢ Hoaxes - the transmission of a virus hoax with a real virus attached. When the
attack is masked in a seemingly legitimate message, unsuspecting users more
readily distribute it.
➢ Back door or Trap door - an attacker can gain access to a system or network
resource through a back door
➢ Brute Force - The application of computing and network resources to try every
possible password combination
ITC
ITC111
111: INTRO TOTO
: INTRO COMPUTING
COMPUTING TOPIC : COMPUTER
TOPIC: AND INFORMATION
BASIC COMPUTER CONCEPTSSECURITY
College
College of
of
Computer
Computer
Studies
Studies
➢ Dictionary - a variation of the brute force attack which narrows the field by
selecting specific target accounts and using a list of commonly used passwords
(the dictionary) instead of random combinations
ITC
ITC111
111: INTRO TOTO
: INTRO COMPUTING
COMPUTING TOPIC : COMPUTER
TOPIC: AND INFORMATION
BASIC COMPUTER CONCEPTSSECURITY
College
College of
of
Computer
Computer
Studies
Studies
➢ Spoofing - used to gain unauthorized
access to computers, wherein the intruder
sends messages with a source IP address
that has been forged to indicate that the
messages are coming from a trusted host.
ITC
ITC111
111: INTRO TOTO
: INTRO COMPUTING
COMPUTING TOPIC : COMPUTER
TOPIC: AND INFORMATION
BASIC COMPUTER CONCEPTSSECURITY
College
College of
of
Computer
Computer
Studies
Studies
➢ Man in the Middle - an attacker monitors (or sniffs) packets from the network,
modifies them, and inserts them back into the network. This type of attack uses
IP spoofing to enable an attacker to impersonate another entity on the network
ITC
ITC111
111: INTRO TOTO
: INTRO COMPUTING
COMPUTING TOPIC : COMPUTER
TOPIC: AND INFORMATION
BASIC COMPUTER CONCEPTSSECURITY
College
College of
of
Computer
Computer
Studies
Studies
➢ Social Engineering - using social skills to convince people to reveal access
credentials or other valuable information to the attacker
➢ Sniffers - a program or device that can monitor data traveling over a network
ITC
ITC111
111: INTRO TOTO
: INTRO COMPUTING
COMPUTING TOPIC : COMPUTER
TOPIC: AND INFORMATION
BASIC COMPUTER CONCEPTSSECURITY
College
College of
of
Computer
Computer
Studies
Studies
➢ Phishing - an attempt to gain personal or financial information from an individual,
usually by posing as a legitimate entity
➢ Timing Attack - explores the contents of a Web browser’s cache and stores a
malicious cookie on the client’s system
ITC
ITC111
111: INTRO TOTO
: INTRO COMPUTING
COMPUTING TOPIC : COMPUTER
TOPIC: AND INFORMATION
BASIC COMPUTER CONCEPTSSECURITY
College
College of
of
Computer
Computer
Studies
Studies
ITC
ITC111
111: INTRO TOTO
: INTRO COMPUTING
COMPUTING TOPIC : COMPUTER
TOPIC: AND INFORMATION
BASIC COMPUTER CONCEPTSSECURITY
College
College of
of
Computer
Computer
Studies
Studies
2. Antivirus software
3. PKI services
4. Managed detection and response service (MDR)
5. Penetration testing
6. Staff training
ITC
ITC111
111: INTRO TOTO
: INTRO COMPUTING
COMPUTING TOPIC : COMPUTER
TOPIC: AND INFORMATION
BASIC COMPUTER CONCEPTSSECURITY
College
College of
of
Computer
Computer
Studies
Studies
Firewall – acts as a security gateway between two networks and tracks and controls
network communications
Software firewall – protect a single computer, usually less expensive and easier to
configure
ITC
ITC111
111: INTRO TOTO
: INTRO COMPUTING
COMPUTING TOPIC : COMPUTER
TOPIC: AND INFORMATION
BASIC COMPUTER CONCEPTSSECURITY
College
College of
of
Computer
Computer
Studies
Studies
Plaintext/Cleartext – data that can be read and understood without any special
measures
ITC
ITC111
111: INTRO TOTO
: INTRO COMPUTING
COMPUTING TOPIC : COMPUTER
TOPIC: AND INFORMATION
BASIC COMPUTER CONCEPTSSECURITY
College
College of
of
Computer
Computer
Studies
Studies
Cryptography – science of using mathematics to encrypt and decrypt data
ITC
ITC111
111: INTRO TOTO
: INTRO COMPUTING
COMPUTING TOPIC : COMPUTER
TOPIC: AND INFORMATION
BASIC COMPUTER CONCEPTSSECURITY
College
College of
of
Computer
Computer
Studies
Studies
➢ Conventional cryptography
➢ Captains Midnight’s Secret Decoder Ring
➢ Caesar’s cipher
ITC
ITC111
111: INTRO TOTO
: INTRO COMPUTING
COMPUTING TOPIC : COMPUTER
TOPIC: AND INFORMATION
BASIC COMPUTER CONCEPTSSECURITY
College
College of
of
Computer
Computer
Studies
Studies
➢ Public key cryptography
➢ introduced by Whitfield Diffie and Martin Hellman in 1975
➢ asymmetric scheme
ITC
ITC111
111: INTRO TOTO
: INTRO COMPUTING
COMPUTING TOPIC : COMPUTER
TOPIC: AND INFORMATION
BASIC COMPUTER CONCEPTSSECURITY
College
College of
of
Computer
Computer
Studies
Studies
TRY IT!
https://www.khanacademy.org/computing/computers-
andinternet/xcae6f4a7ff015e7d:online-
datasecurity/xcae6f4a7ff015e7d:data-
encryptiontechniques/a/symmetric-encryption-techniques
ITC
ITC111
111: INTRO TOTO
: INTRO COMPUTING
COMPUTING TOPIC : COMPUTER
TOPIC: AND INFORMATION
BASIC COMPUTER CONCEPTSSECURITY