Protecting Information Resources
Protecting Information Resources
INTENTIONAL THREATS VIRUSES- consists of self propagating program code thats triggered by a specified time or event. WORM- also travels from a computer to computer in a network, but it doesnt usually erase data. Unlike viruses, worms are independent programs that can spread themselves without having to be attached to a host program. TROJAN PROGRAM- contains code intended to disrupt a computer, network, or Web site and is usually hidden inside a popular program. Users run the popular programs, unaware that the malicious program is also running in the background. LOGIC BOMB- is a type of trojan program used to release a virus, worm, or other destructive code. Logic bombs are triggered at a certain time or by an event, such as user pressing Enter or running a specific program. BACKDOOR- (trapdoor) is a programming routine built into a system by its designer or programmer. This routine enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files. BLENDED THREATS- is a security threat that combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks. DENIAL-OF-SERVICE (DoS) ATTACK- floods a network or server with service requests to prevent legitimate users access to the system. SOCIAL ENGINEERING- means using people skills-such as being a good listener and assuming a friendly, unthreatening air-to trick others into revealing private information. This attack takes advantage of the human element of security systems. Security Measures and Enforcement: An Overview BIOMETRIC SECURITY MEASURES- use a physiological element to enhance security measures. These elements are unique to a person and cant be stolen, lost, copied, or passed on to others. The following list describes some biometric devices and measures : *facial recognition, fingerprints, hand geometry, iris analysis, palm prints, retinal scanning, signature analysis, vein analysis, and voice recognition MEASURES CALLBACK MODEMS- is used to verify whether a users access is valid by logging the user off (after he attempts to connects to the network) and then calling the user back at a predetermined number. FIREWALL- is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the internet. A network administrator defines rules for access, and all other data transmissions are blocked. INSTRUSION DETECTION SYSTEM (IDS)- can protect against both external and internal access. Theyre usually placed in front of a firewall and can identify attack signatures, trace
patterns, generates alarm for the network administrator, and cause routers to terminate connections with suspicious sources.
VENDORS Enterasys network inc. Cisco System, Inc. IBM Internet Security Systems Juniper Networks, Inc. Check Point Software Technologies, Ltd.
PHYSICAL SECURITY MEASURES- primary control access to computers and networks and include devices for securing computers and peripherals from theft. ACCESS CONTROL are designed to protect systems from authorized access to preserve data integrity. The following sections describe two used access controls: terminal resource security and passwords. TERMINAL RESOURCE SECURITY- is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity. PASSWORDS- is a combination of numbers, characters, and symbols thats entered to allow access to a system. A passwords length and complexity determines its vulnerability to discovery by unauthorized users. VIRTUAL PRIVATE NETWORK- provides a secure tunnel through the internet for transmitting messages and data via a private network. DATA ENCRYPTION DATA ENCRYPTION- transforms data called plaintext or cleartext, into scrambled form called ciphertext that cant be read by others. SECURE SOCKETS LAYERS- is a commonly used encryption protocol that manages transmission security on the internet. TRANSPORT LAYER SECURITY- is a cryptographic protocol that ensures data security and integrity over public networks, such as the internet. ASSYMETRIC ENCRYPTION- uses two keys: a public key known to everyone and a private or secret key known to the recipient.
SYMMETRIC ENCRYPTION- also called secret key encryption the same key is used to encrypt and decrypt the message. The sender and receiver must agree on the key and keep it secret. In e-commerce transactions, three factors are critical for security: authentication, confirmation, and nonrepudiation. Authentication is important because using a credit card number in an online transaction doesnt mean the person using it is the cards legitimate owner. Confirmation- must also be incorporated into e-commerce transactions to verify orders and reciept of shipments. Nonrepudiation- is essential in case a dispute over a transaction is raised. Digital signatures are used for this factor and serve to bind partners in transaction. E-commerce transaction security is concerned with the following issues: CONFIDENTIALITY AUTHENTICATION INTEGRITY NONREPUDIATION OF ORIGIN NONREPUDIATION OF RECEIPT
Submitted to: Ms. Maribeth Rivera Submitted by: Renea Maryll Alviz Angelie Nucum Mary Ann Garcia Angeli Carmel Yambao Jose Marie Ibe Allain Joseph Gonzales