0% found this document useful (0 votes)
7 views

S6 Computer Security Lesson1

classroom lesson

Uploaded by

huxhng
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

S6 Computer Security Lesson1

classroom lesson

Uploaded by

huxhng
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 23

Computer Security

10 Sept 2024
th
Definition
Computer security refers to
techniques developed to
protect systems and
information stored on
computers.
Computer security is also
known as cyber security.

Computer security is mainly


concerned with three main
areas, demonstrated by the
CIA triad:
Importance of Computer Security
1. To Protect Personal Information
2. To Protect Company Properties
3. To Prevent Data Theft
4. To Prevent Malware and Viruses
5. To Protect systems From Unauthorized
Access
6. To ensure proper functioning of
hardware systems
7. To protect the network from being
hacked
Types of computer security
1. Information security is securing information from
unauthorized access, modification & deletion
2. Application Security is securing an application by
building security features to prevent from Cyber
Threats.
3. Computer Security means securing a standalone
machine by keeping it updated and patched
4. Network Security is by securing both the software
and hardware technologies from cyber attacks.
5. Cybersecurity is defined as protecting computer
systems, which communicate over the computer
networks
threats

A threat refers to anything that has the


potential to cause serious harm to a
computer system.
A threat is an activity/ attack/ situation
that may happen, with the potential to
cause serious damage.
The threats could be intentional,
accidental or caused by natural disasters.

Computer threats are categorized in two


Physical threats are threats that
damage the hardware eg theft,
vandalism, overuse, poor storage,
inadequate maintenance, and natural
hazards, Infrastructure failure. Etc

Logical threats are threats that


damages software systems, data, or
network without actually damaging your
hardware. Eg Viruses, DoS attacks,
phishing, and Trojans etc
Computer attacks
A cyberattack is a malicious and deliberate
attempt by an individual or organization to breach
the information system of another individual or
organization.
An attack can be active or passive.
Active attacks are a type of cybersecurity
attack in which an attacker attempts to alter,
destroy, or disrupt the normal operation of a
system or network..
A “passive attack” attempts to monitor or
make use of information from the system but
does not affect system resources.
Differences between active and passive attack
Active Attack Passive Attack
Modification in information takes place. No modification in the information take
place.
Is a danger to Integrity as well as availability. Is a danger to Confidentiality.
A attention is on prevention. While in passive attack attention is on
detection.
Victim gets informed about the attack. Victim does not get informed about the
attack.
System resources can be changed. System resources are not changing.
Is tough to restrict from entering systems or Is easy to prohibit in comparison to active
networks. attack.

Can be easily detected. Very difficult to detect.


the original information is modified. original information is Unaffected.
The duration of an active attack is short. The duration of a passive attack is long.
Types of attacks
1. Malware
Malware can be used for a range of objectives
from stealing information, to defacing or
altering web content, to damaging a
computing system permanently. Examples of
malware: virus, worms, Trojan horse, adware,
spyware, ransomware, rootkits, botnets.
Ransomware. This is malware that uses
encryption to deny access to resources (eg.
user’s files), usually in an attempt to force the
victim to pay a ransom.
2. Denial-of-service (DoS) attacks
overwhelm the target system so it cannot
respond to legitimate requests.
3. Distributed denial-of-service (DDoS)
attacks are similar but involve multiple host
machines.
4. SQL Injection
SQL injection is a type of attack which is
specific to SQL databases. SQL databases use
SQL statements to query the data, and these
statements are typically executed via an
HTML form on a webpage.
5. Social engineering attack involves
impersonating a trusted person or entity,
and tricking individuals into granting an
attacker sensitive information,
transferring funds, or providing access to
systems or networks.
6. Phishing attacks occur when a
malicious attacker sends a message that
appears to be from a trusted and
legitimate source and obtains sensitive
information from a target .
7. MitM Attacks
Man-in-the-Middle (MitM) attacks are
breaches that allow attackers to intercept the
data transmitted between networks, computers
or users. The attacker can also modify messages
before sending them on to the intended recipient.
8. Zero-day Exploit
A zero-day exploit is where cyber-criminals learn
of a vulnerability that has been discovered in
certain widely-used software applications and
operating systems, and then target organizations
who are using that software in order to exploit
the vulnerability before a fix becomes available.
Cryptojacking is where cybercriminals
compromise a user’s computer or device and
use it to mine cryptocurrencies, such as Bitcoin.
10. Cross-site Scripting (XSS) Aattacks
Cross-site scripting attacks are quite similar to
SQL injection attacks, although instead of
extracting data from a database, they are
typically used to infect other users who visit the
site.
11.Password Attack
A password attack, as you may have already
guessed, is a type of cyber-attack where an
attacker tries to guess, or “crack” a user’s
12. Eavesdropping Attacks
Sometimes referred to as “snooping” or
“sniffing”, an eavesdropping attack is where the
attacker looks for unsecured network
communications in an attempt to intercept and
access data that is being sent across the
network.
13. Insider Threats
Insider threats, which consist of current or
former employees, present a significant danger
to organizations due to their unrestricted access
to the company network, including sensitive
data and intellectual property.
Sources of virus and other attacks
1. Opening suspicious email attachments
2. Attaching unsecured removable or external
storage devices (e.g., flash drives, external hard
drives, memory cards)
3. Accessing malicious websites
4. Clicking malicious ads (adverts)
5. Downloading malicious and unlicensed
applications
6. peer-to-peer file sharing
7. installing cracked / pirated software
8. Bluetooth file transfers
9. unpatched software
Threat protection / protection against
attacks
> Ensure that you have the latest and
greatest anti-malware/spam protection
software installed.
> Ensure that your staff is trained to identify
malicious emails and websites.
> Keep all software patched and up-to-date.
> Only use administrator accounts when
absolutely necessary.
> Ensure that HTML form input validation .
> Monitor your network for malicious activity,
> Use end-to-end encryption
> Using a VPN (a virtual private network)
> Have a strong password policy, and use multi-factor
authentication where possible.
> Use salting. Extending the number of characters in
a password to make it complex
> Using firewall and intrusion detection systems (IDS)
> Always look for “HTTPS” at the beginning of each
URL
> Implement strong authentication and access
controls
> Carry out penetration tests to identify vulnerabilities
> Encryption
> Regular backup
Cyber crimes
Cybercrime refers to criminal conduct committed
with the aid of a computer or other electronic
equipment connected to the internet.
A cybercrime is also explained as a type of
crime that targets or uses a computer or a group
of computers under one network for the purpose
of harm.

Cybercrimes are committed using computers


and computer networks. They can be targeting
individuals, business groups, or even
governments.
Types of cyber crimes
1. Identity theft and fraud
2. Cyberstalking. This kind of
cybercrime involves online harassment
3. Social Engineering. Social
engineering involves criminals making
direct contact with you usually by phone
or email.
4. Online Scams. These are usually in
the form of ads or spam emails that
include promises of rewards or offers of
5. Sexting and pornography
6. Cyber bullying
7. Black hat hackers
8. Cyber terrorism
8. Blackmail
9. Unwanted content
10. Ransomware
11. Cyber harassment
12. Cyber sex trafficking
1. Masquerade. An attacker pretends to be
someone else in order to gain access to systems or
data.
2. Modification of messages. A message is
altered or that message is delayed or reordered to
produce an unauthorized effect.
3. Repudiation. An attacker attempts to deny or
repudiate actions that they have taken
4. Replay. This aim of the attacker is to save a
copy of the data originally present on that
particular network and later on use this data for
personal uses.
5. Denial of Service. This is designed to make a
system or network unavailable to its intended users
Homework
Qn1. Differentiate between physical security
and logical security. Give examples of each.
Qn2. How to prevent cyber attacks? ie how to
protect computer systems.
Qn3. What mechanisms can we use to
prevent phishing attacks?
Qn4. (a) List the causes of Physical threats.
(b) List the causes of logical threats.
Qn5. Compare and contrast works and virus.
Qn6. To control access to systems data, what
authentication mechanisms can be used?

You might also like