Computer Security
Computer Security
NYAMU OGAKHAN
Industrial/economic/corporate
espionage
Espionage-practice of spying
Therefore industrial espionage is a form
of espionage conducted for commercial
purposes instead of purely national
security
the stealing of technological or
commercial research data, blueprints,
plans, etc., as by a person in the hire of
a competing company.
A cyberextortionist is an individual
or group who uses email as an
offensive force.
The group or individual usually sends a
company a threatening email stating
that they have received confidential
information about their company and
will exploit a security leak or launch an
attack that will harm the company's
network. The message sent through the
email usually demands money in
exchange for the prevention of the
attack.
Security Goals
Assets are accessed
only by authorized people
Confidentiality
Confidentiality
Confidentiality is the term used to prevent
the disclosure of information to
unauthorized individuals or systems.
For example, a credit card transaction on the
Internet requires the credit card number to be
transmitted from the buyer to the merchant
and from the merchant to a transaction
processing network. The system attempts to
enforce confidentiality by encrypting the card
number during transmission, by limiting the
places where it might appear
Integrity
In information security, integrity means that data
cannot be modified without authorization.
Integrity is violated when an employee
accidentally or with malicious intent deletes
important data files,
when a computer virus infects a computer,
when an employee is able to modify his own
salary in a payroll database,
when an unauthorized user vandalizes a web
site, when someone is able to cast a very large
number of votes in an online poll, and so on.
Availability
For any information system to serve
its purpose, the information must be
available when it is needed.
This means that the computing systems
used to store and process the
information, the security controls used
to protect it, and the communication
channels used to access it must be
functioning correctly.
Availability
Equipment is stolen or
Hardware disabled, thus denying
service.
Software
Confidentiality
Integrity
An unauthorized read
of data is performed.
Files are deleted,
Data
An analysis of
denying access to users.
statistical data reveals
underlying data.
Messages are destroyed
Communication or deleted.
Messages are read. The
Lines and Communication lines
traffic pattern of
Networks or networks are
messages is observed.
rendered unavailable.
A working program is
modified, either to
cause it to fail during
execution or to cause it
to do some unintended
task.
Existing files are
modified or new files
are fabricated.
Messages are modified,
delayed, reordered, or
duplicated. False
messages are
fabricated.
worm
The main difference between a virus
and a worm is that a worm does not
need a host document. In other
words, a worm does not need to
attach itself to another program. In
that sense, a worm is self-contained
https://www.dropbox.com/s/opp0szao
kijypyq/Screenshot%202015-0430%2007.26.17.png?dl=0
Back Doors
A back door is a program or set of
instructions in a program that allow
users to bypass security controls
when accessing a program,
computer, or network.
A back door is a means of access
to a computer program that
bypasses security mechanisms.
Spoofing
Spoofing is a technique intruders use to make
their network or Internet transmission appear
legitimate to a victim computer or network.
Several types of spoofing schemes exist. One
type, called e-mail spoofing, occurs when the
senders address or other components of the
e-mail header are altered so that it appears
the e-mail originated from a different sender..
Another type, called IP spoofing, occurs when
an intruder computer fools a network into
believing its IP address is associated with a
trusted source.
Firewall
Intrusion dection systems
honeypots
Firewalls
A firewall is hardware and/or software
that protects a networks resources
from intrusion by users on another
network such as the Internet .
It screens out hackers/viruses/worms
that try to enter
Controls the incoming and outgoing
traffic based on applied rule set
Honeypot
Is a trap set to detect ,counteract
attempts at unauthorized use of
information
It is used as early warning/surveillance
tool used to minimize risks
HARDWARE THEFT AND VANDALISM
Safeguards against Hardware Theft and Vandalism
Software Theft
Another computer security risk is
software theft. Software theft occurs
when someone (1) steals software
media,
(2) intentionally erases programs,
(3) illegally copies a program, or
(4) illegally registers and/or activates
a program.
information theft
Check notice
Benefits of encription
System Failure
A system failure is the prolonged malfunction
of a computer. System failure also can cause
loss of hardware, software, data, or information.
A variety of causes can lead to system failure.
These include aging hardware; natural disasters
such as fires, floods, or hurricanes;
random events such as electrical power
problems; and even errors in computer
programs.
https://www.dropbox.com/s/q8qom7j
qiq0qrc8/Screenshot%202015-0430%2007.14.22.png?dl=0