0% found this document useful (0 votes)
5 views23 pages

DT4 Security

The document discusses the importance of computer security, outlining various cybercrimes such as malware, denial of service attacks, and social networking risks. It emphasizes the need for protective measures like access restriction, data encryption, and disaster anticipation to safeguard sensitive information. Additionally, it highlights the roles of IT Security Analysts and the growing demand for this profession.

Uploaded by

mernagoodgirl666
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views23 pages

DT4 Security

The document discusses the importance of computer security, outlining various cybercrimes such as malware, denial of service attacks, and social networking risks. It emphasizes the need for protective measures like access restriction, data encryption, and disaster anticipation to safeguard sensitive information. Additionally, it highlights the roles of IT Security Analysts and the growing demand for this profession.

Uploaded by

mernagoodgirl666
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

UR5 :

Foundations of Digital Technology


Security

Dr Rashad Ragab
Math. Dept., Helwan University
[email protected]
Competencies
 Identify one of the most significant concerns for
effective implementation of computer
technology- Security.
 Discuss cybercrimes including creation of
malicious programs such as viruses, worms,
Trojan horse, and zombies as well as denial of
service attacks, Internet scams, social
networking risks, cyberbullying, rogue Wi-Fi
hotspots, theft, and data manipulation.
 Detail ways to protect computer security
including restricting access, encrypting data,
anticipating disasters, and preventing data loss.

2
People

 Security – How can access to sensitive


information be controlled and how can we secure
hardware and software?
 Information Security- How can we trust that the
data are available, not altered and protected.

3
Security
 Cybercrime or computer crime is any
offense that involves a computer and a
network
 Hackers
 Gain unauthorized access

4
Computer Crime (Page 1 of 3)
 Malicious Programs - Malware
 Viruses
 Worms
 Trojan horse
 Zombies
 Denial of Service
 (DoS) attack

5
Computer Crime (Page 2 of 3)
 Internet scams
 Phishing

6
Computer Crime (Page 3 of 3)
 Social networking
risks
 Cyber-bullying
 Rogue Wi-Fi hotspots
 Theft
 Data manipulation
 Computer Fraud and
Abuse Act

7
Making IT Work for You ~ Security Suites

 Security Suites
are software
packages that
include various
utilities that help
protect your
computer from
cybercrime.

8
Making IT Work for You ~ Cloud-Based
Backup
 Cloud-based
backup services
such as Carbonite
provide cloud-
based backup
services.

9
Information Security

 Computer Security Concepts


 Threats, Attacks, and Assets
A definition of computer security

 Computer security: The protection afforded


to an automated information system in order
to attain the applicable objectives of
preserving the integrity, availability and
confidentiality of information system
resources (includes hardware, software,
firmware, information/data, and
telecommunications) NIST 1995
Three key objectives (the CIA triad)

 Confidentiality
◦ Data confidentiality: Assures that confidential information
is not disclosed to unauthorized individuals
◦ Privacy: Assures that individual control or influence what
information may be collected and stored
 Integrity
◦ Data integrity: assures that information and programs are
changed only in a specified and authorized manner
◦ System integrity: Assures that a system performs its
operations in unimpaired manner
 Availability: assure that systems works promptly and
service is not denied to authorized users
Key Security Concepts
Other concepts to a complete security
picture
 Authenticity: the property of being genuine
and being able to be verified and trusted;
confident in the validity of a transmission, or
a message, or its originator
 Accountability: generates the requirement
for actions of an entity to be traced uniquely
to that individual to support nonrepudiation,
deference, fault isolation, etc
Levels of security breach impact

 Low: the loss will have a limited impact, e.g.,


a degradation in mission or minor damage or
minor financial loss or minor harm
 Moderate: the loss has a serious effect, e.g.,
significance degradation on mission or
significant harm to individuals but no loss of
life or threatening injuries
 High: the loss has severe or catastrophic
adverse effect on operations, organizational
assets or on individuals (e.g., loss of life)
Examples of security requirements: Confidentiality

 Student grade information is an asset whose


confidentiality is considered to be very high
◦ The US FERPA Act: grades should only be
available to students, their parents, and their
employers (when required for the job)
 Student enrollment information: may have
moderate confidentiality rating; less damage
if enclosed
 Directory information: low confidentiality
rating; often available publicly
Examples of security requirements: Integrity

 A hospital patient’s allergy information (high


integrity data): a doctor should be able to trust
that the info is correct and current
◦ If a nurse deliberately falsifies the data, the database
should be restored to a trusted basis and the falsified
information traced back to the person who did it
 An online newsgroup registration data: moderate
level of integrity
 An example of low integrity requirement:
anonymous online poll (inaccuracy is well
understood)
Examples of security requirements: Availability

 A system that provides authentication: high


availability requirement
◦ If customers cannot access resources, the loss of
services could result in financial loss
 A public website for a university: a moderate
availably requirement; not critical but causes
embarrassment
 An online telephone directory lookup: a low
availability requirement because unavailability is
mostly annoyance (there are alternative sources)
Challenges of computer security
1. Computer security is not simple
2. One must consider potential (unexpected)
attacks
3. Procedures used are often counter-intuitive
4. Must decide where to deploy mechanisms
5. Involve algorithms and secret info (keys)
6. A battle of wits between attacker / admin
7. It is not perceived on benefit until fails
8. Requires constant monitoring
9. Too often an after-thought (not integral)
10. Regarded as impediment to using system
Careers in IT
 IT Security Analysts maintain the security
of a company’s network, systems, and
data.
 Must safeguard information systems
against external threats
 Annual salary is usually from $62,000 to
$101,000
 Demand for this position is expected to
grow

20
Open-Ended Questions (Page 1 of 2)
 Define security. Define computer crime and
the impact of malicious programs, including
viruses, worms, Trojan horses, and
zombies, as well as cyberbullying, denial of
service attacks, Internet scams, social
networking risks, rogue Wi-Fi hotspots,
thefts, data manipulation, and other
hazards.

21
Open-Ended Questions (Page 2 of 2)
 Discuss ways to protect computer security
including restricting access, encrypting
data, anticipating disasters, and preventing
data loss.

22

You might also like