Computer Security Chapter I (1)
Computer Security Chapter I (1)
School of Informatics
Department of Computer Science
The thing that makes your computer unique and important to you is
its content: photos, songs, papers, email messages, projects,
information, eBooks, contact information, code you created, and the
like.
Thus, data items on a computer are assets, too. Unlike most
hardware and software, it is impossible to recreate or replace all
datas. These assets are all listed bellow
5
Natural Disasters
Fire and smoke
Climate: Heat, Direct sun or Humidity
Hurricane, storm, cyclone
Earthquakes
Water
Electric supply
Lightning
Solution
Avoid having servers in areas often hit by Natural Disasters!
24
Computer Security threats
People
Intruders
Thieves
People who have been given access unintentionally by the
insiders
Employees, contractors, etc. who have access to the facilities
External thieves
Portable computing devices can be stolen outside the
organization’s premises
Loss of a computing device
Mainly laptop
Computer Security: The Human Factor
25
The human factor is an important component of computer
security
Some organizations view technical solutions as “their
solutions” for computer security. However:
Technology is fallible (imperfect)
Ex.UNIX holes that opened the door for Morris worm
The technology may not be appropriate
Ex. It is difficult to define all the security requirements and find a
solution that satisfies those requirements
Technical solutions are usually (very) expensive
Ex. Antivirus purchased by ETC to protect its Internet services
Categories of Attacks
Categories of Attacks/Threats
Source
Destination
Normal flow of information
Attack
Interruption Interception
Modification Fabrication
The difference between threat and attack are:
30 Threat Attack
Can be intentional or unintentional Is intentional
May or may not be malicious Is malicious
Circumstance that has the ability to cause
Objective is to cause damage
damage
Information may or may not be altered or Chance for information alteration and
damaged damage is very high
Can be blocked by control of Cannot be blocked by just controlling the
vulnerabilities vulnerabilities
Can be initiated by the system itself as Is always initiated by an outsider (system
well as by outsider or user)
Can be classified into Physical threat, Can be classified into Virus, Spyware,
internal threat, Phishing, Worms, Spam,
external threat, human threat, and non- Botnets, DoS attacks, Ransomware,
physical threat. Breaches.
Sources and Motives of Security Threats/Attack
31