Computer Security
Computer Security
• Cookie ownership
– Once a cookie is saved on your computer, only the
website that created the cookie can read it
Client Side Scripting
• Web pages (HTML) can embed dynamic contents
(code) that can executed on the browser
• JavaScript
– embedded in web pages and executed inside browser
• VBScript
– similar to JavaScript, only for Windows
• Java applets
– small pieces of Java bytecodes that execute in browsers
Firewall Architecture
Firewall
• An internetwork gateway that restricts data
communication traffic to and from one of the
connected networks and thus protects that
network's system resources against threats
from the other network
Intrusion Detection System - IDS
What is IDS?
• An intrusion detection system (IDS)
inspects all inbound and outbound
network activity and identifies
suspicious patterns that may indicate a
network or system attack from someone
attempting to break into or compromise
a system.
Physical Security
Physical Access
• Physical access negates all other security
measures.
• Physical access allows an attacker to plug into
an open Ethernet jack.
– Hand-held devices that run operating systems
with full networking support make this attack
feasible.
Electronic Access Control
• Electronic access control systems manage
opening and closing doors.
– A centralized system can instantly grant or refuse
access.
– The system works with a software package
running on a computer.
– It should not be on a network.
Closed Circuit Television (CCTV)
• CCTVs can be very effective, but should be
implemented carefully.
• IP-based CCTVs should be on their own
network and accessed by security personnel
only.
Biometrics
• Biometrics is the measurement of biological
factors for identifying a specific person.
– These factors are based upon parts of the human
body that are unique. When used for
authentication, a computer takes the image of the
factor and reduces it to a numeric value.
Biometrics
Computer Viruses and Worms
Definition of Virus
• A virus is a small piece of software that
distract on real programs in order to get
executed which commonly known as a
malicious software.
• Once it’s running, it spreads by inserting
copies of itself into other executable code or
documents
Types of Computer Virus
•Time Bomb
•Logical Bomb
•Worm
•Boot Sector Virus
•Macros Virus
•Script Virus
•Trojan Horse
Worm Virus
A worm is also a destructive
program that fills a computer
system with self-replicating
information, clogging the system so
that its operations are slowed
down or stopped
Boot Sector Virus
A boot sector virus infects boot
sector of computers. During system
boot, boot sector virus is loaded
into main memory and destroys
data stored in hard disk
Macro Virus
A macro virus is associated with
application software like word and
excel. When opening the infected
document, macro virus is loaded
into main memory and destroys the
data stored in hard disk
Script Virus
Commonly found script viruses are
written using the Visual Basic
Scripting edition (VBS) and the
JavaScript programming languages
Trojan Horse
Trojan Horse is a destructive
program. It usually pretends as
computer games or application
software. If executed, computer
system will be damaged.
Time Bomb
• Backups
Backing up your machine regularly can protect you
from the unexpected. Keep a few months' worth of
backups and make sure the files can be retrieved if
needed. Download and install CrashPlan and learn how
to back up your system.
• Control access to your machine.
Don't leave your computer in an unsecured area, or
unattended and logged on, especially in public places.
This includes Athena clusters and Quickstations. The
physical security of your machine is just as important
as its technical security.