Comouter Security Ch1
Comouter Security Ch1
In 1969, Leonard Kleinrock, professor and student, Charley Kline, sent the first
electronic message from the From his computer to his Friends Computer at the
Stanford Research Institute. This is a well-known story and a moment in the history
of a digital world. The sent message from the UCLA was the word "login." The
system crashed after they typed the first two letters "lo." Since then, this story has
been a belief that the programmers typed the beginning message "lo and
behold." While factually believed that "login" was the intended message. Those
two letters of messages were changed the way we communicate with one
another.
(series of signs) wherever it went. He named the program Creeper, and designed
it to travel between different networks printing the message "I'M THE CREEPER:
CATCH ME IF YOU CAN."
There are various types of computer security which is widely used to protect the
valuable information of an organization. Cyber Security is Constant fight between
attackers and defenders
Both Attackers and Defenders use Different types of Technique Tactics and
Procedure accordingly. FTF Computer is IOP Electronically Ther is Internet there is
Network there is Data and Information do you feel there is a link between C and
S that is CIA IIIMF CID Good Security Standards follow the "90 / 10" Rule:
Page 1
• 10% of security safeguards are technical. Example: The lock on the door is
the 10%. You remembering to lock the lock, checking to see if the door is
closed, ensuring others do not prop the door open, keeping control of the
keys, etc. is the 90%. You need both parts for effective security.
One way to ascertain the similarities and differences among Computer Security
is by asking what is being secured. For example,
Computer security can be defined as controls that are put in place to provide
confidentiality, integrity, and availability for all components of computer systems.
Let’s elaborate the definition.
• Hardware, the physical part of the computer, like the system memory and
disk drive
• Firmware, permanent software that is etched into a hardware
device’s nonvolatile memory and is mostly invisible to the user
• Software, the programming that offers services, like operating system,
word processor, internet browser to the user
responsibility
1.2 Threats, vulnerabilities, controls, risk
Computer security threats are possible dangers that can possibly hamper the
normal functioning of your computer. In the present age, cyber threats are
Computer Security By Nimaan A.Computer Programmer and With CISCO Certified CCNA-CCNP-CCND
constantly increasing as the world is going digital. The most harmful types of
computer security are:
Viruses
Computer Worm
A computer worm is a software program that can copy itself from one computer
to another, without human interaction. The potential risk here is that it will use up
your computer Resources such as hard disk space because a worm can replicate
in greate volume and with great speed.
Phishing
Botnet
Rootkit
Page 3
A rootkit is a computer program designed to provide continued privileged access
to a computer while actively hiding its presence. Once a rootkit has been
installed, the controller of the rootkit will be able to remotely execute files and
change system configurations on the host machine.
Keylogger
Also known as a keystroke logger, keyloggers can track the real-time activity of a
user on his computer. It keeps a record of all the keystrokes made by user
keyboard. Keylogger is also a very powerful threat to steal people’s login
credential such as username and password.
three goals-
In this digital era, we all want to keep our computers and our personal
information secure and hence computer security is important to keep our
personal information protected. It is also important to maintain our computer
security and its overall health by preventing viruses and malware which would
impact on the system performance.
Computer Security Practices Some preventive steps you can take include:
• Active attacks
• Passive attacks
1. Active Attacks
2.Passive Attacks
A passive attack does not eat up system resources and instead makes an effort
to gather or use information from the system. Attacks that are passive in nature
spy on or keep track of transmission. The adversary wants to intercept the
transmission of information in order to collect it. The following are examples of
passive attacks:
The adversary was able to ascertain the communication host’s location and
identity as well as its frequency and message length. It could be possible to infer
the nature of the message from this information.
Critical to our study of Computer security is the distinction between policy and
mechanism.
• Definition 1–1. A security policy is a statement of what is, and what is not,
allowed.
• Definition 1–2. A security mechanism is a method, tool, or procedure for
enforcing a security policy.
software assurance is
Program security Defenses are for key layers Layer 1 Parameter Protection
Layer 2 Host protection Layer 3 OS Protection and Layer 4 App Protection
Computer Security By Nimaan A.Computer Programmer and With CISCO Certified CCNA-CCNP-CCND
Page 7