Chapter 7
Chapter 7
Computer Security
PREPARED BY: SUSHANT BHATTARAI
Introduction
Computer security is needed to protect the computing system and to protect
the data that they store and access.
Transmission of data using network (Internet) and communication links has
necessitated the need to protect the data during transmission over the
network.
We use the term computer security to refer to both the computer security and
the network security.
Computer security focuses on the security attacks, security mechanisms and
security services.
Security attacks are the reasons for breach of security. Security attacks comprise of
all actions that breaches the computer security.
Security mechanisms are the tools that include the algorithms, protocols or devices,
that are designed to detect, prevent, or recover from a security attack.
Security services are the services that are provided by a system for a specific kind of
protection to the system resources.
Security Threat and Security Attack
A threat is a potential violation of security and causes
harm. A threat can be a malicious program, a natural
disaster or a thief.
Vulnerability is a weakness of system that is left
unprotected. Systems that are vulnerable are exposed to
threats. Threat is a possible danger that might exploit
vulnerability.
A security attack may be a passive attack or an active
attack.
Passive attack
The aim of a passive attack is to get information from the
system but it does not affect the system resources.
Passive attacks are similar to eavesdropping.
Passive attacks may analyze the traffic to find the nature of
communication that is taking place, or, release the contents
of the message to a person other than the intended
receiver of the message.
Passive attacks are difficult to detect because they do not
involve any alteration of the data.
Security Threat and Security Attack
Active attack
An active attack tries to alter the system resources or affect its operations. Active
attack may modify the data or create a false data.
An active attack may be a masquerade (an entity pretends to be someone
else), replay (capture events and replay them), modification of messages, and
denial of service.
Active attacks are difficult to prevent.
Malicious Software
The software that is intentionally included into a system with the intention to
harm the system is called malicious software.
Viruses, Trojan horse, and Worms are examples of malicious programs.
JavaScripts and Java applets written with the purpose of attacking, are also
malicious programs.
Virus
Virus is a software program that is destructive in nature. Virus programs have
the following properties:
It can attach itself to other healthy programs.
It can replicate itself and thus can spread across a network.
It is difficult to trace a virus after it has spread across a network.
Viruses harm the computer in many ways:-
corrupt or delete data or files on the computer
change the functionality of software applications
use e-mail program to spread itself to other computers
erase everything on the hard disk
viruses cannot infect write protected disks or infect written documents. Viruses
do not infect an already compressed file. Viruses also do not infect computer
hardware; they only infect software.
Worm
Authentication
Authentication is the process of ensuring and confirming the identity of the user before
revealing any information to the user.
Authentication provides confidence in the identity of the user or the entity connected.
It also assures that the source of the received data is as claimed.
Authentication is facilitated by the use of username and password, smart cards,
biometric methods like retina scanning and fingerprints.
Non-Repudiation
It prevents either sender or receiver from denying a transmitted message.
For a message that is transmitted, proofs are available that the message was sent by
the alleged sender and the message was received by the intended recipient.
For example, if a sender places an order for a certain product to be purchased in a
particular quantity, the receiver knows that it came from a specified sender.
Non-repudiation deals with signatures.
Security Mechanism
Some actions that can be taken to make the passwords safer are as follows:
It is good to change passwords periodically. This decreases chances of cracking
passwords.
Make a password complex, like mix case, use numbers and special characters.
This decreases ability of automated attacks by increasing possible character
combinations.
Use longer passwords so as to create exponentially higher number of
permutations and combinations of characters used, making them difficult to
break.
Be cautious not to leave passwords lying around and don’t share them with
friends.
Do not use your or your families’ name, age, address, city etc., as part of the
passwords.
Smart Card
A smart card is in a pocket-sized card with embedded integrated circuits
which can process data.
With an embedded microcontroller, smart cards have the unique ability to
store large amounts of data, carry out their own on-card functions (e.g.
encryption and mutual authentication) and interact intelligently with a smart
card reader. A smart card inserted into a smart card reader makes a direct
connection to a conductive contact plate on the surface of the card (typically
gold plated).
Transmission of commands, data, and card status takes place over these
physical contact points.
The smart card is made of plastic, generally PVC. The card may embed a
hologram. Using smart cards is a strong security authentication for single sign-on
within large companies and organizations.
Smart cards are used in secure identity applications like employee-ID badges,
citizen-ID documents, electronic passports, driver license and online
authentication devices.
Biometrics
A security policy is a formal statement that embodies the organization’s overall security expectations,
goals, and objectives with regard to the organization’s technology, system and information.
To be practical and implementable, policies must be defined by standards, guidelines, and
procedures. Standards, guidelines, and procedures provide specific interpretation of policies and
instruct users, customers, technicians, management, and others on how to implement the policies.
The security policy states what is, and what is not allowed. A security policy must be comprehensive,
up-to-date, complete, delivered effectively, and available to all staff. A security policy must also be
enforceable. To accomplish this, the security policy can mention that strict action will be taken
against employees who violate it, like disclosing a password.
Generally, security policies are included within a security plan. A security plan details how the rules
put forward by the security policy will be implemented. The statements within a security plan can
ensure that each employee knows the boundaries and the penalties of overstepping those
boundaries. For example, some rules could be included in the security policy of an organization, such
as, to log off the system before leaving the workstation, or not to share the password with other users.
The security policy also includes physical security of the computers. Some of the measures taken to
ensure the physical security of a computer are—taking regular backups to prevent data loss from
natural calamity, virus attack or theft, securing the backup media, keeping valuable hardware
resources in locked room (like servers), to avoid theft of systems and storage media.