Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Basic Concepts in Computer Security PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 35

BASIC CONCEPTS IN COMPUTER

SECURITY
ARZATH AREEFF
WHAT IS COMPUTER SECURITY ?
• Computer security is refers to techniques for ensuring that
data stored in a computer cannot be read or compromised
by any individuals without authorization.
• Most computer security measures involve data encryption
and passwords.
• The purpose of computer security is to device ways to
prevent the weaknesses from being exploited.
WHAT IS COMPUTER SECURITY ?
• We are addressing three important aspects of any
computer-related system such as confidentiality, integrity,
and availability.
WHAT IS COMPUTER SECURITY ?
• These are the three goals in
computing Security.
1. Confidentiality
2. Integrity
3. Availability
THREE GOALS IN COMPUTING SECURITY

• Confidentiality: ensures that computer-related assets are


accessed only by authorized parties. Confidentiality is
sometimes called secrecy or privacy.
• Integrity: it means that assets can be modified only by
authorized parties or only in authorized ways.
• Availability: it means that assets are accessible to
authorized parties at appropriate times.
THREE GOALS IN COMPUTING SECURITY

• One of the challenges in building a secure system is


finding the right balance among the goals, which often
conflict.
VULNERABILITY
• Vulnerability is a weakness in the security system.
• Weaknesses can appear in any element of a computer,
both in the hardware, operating system, and the
software.
The types of vulnerabilities we might find as they apply to
the assets of hardware, software, and data.
• These three assets and the connections among them are all
potential security weak points.
HARDWARE VULNERABILITY

• Hardware is more visible than software, largely because it


is composed of physical objects.
• it is rather simple to attack by adding devices, changing
them, removing them, intercepting the traffic to them, or
flooding them with traffic until they can no longer function.
HARDWARE VULNERABILITY

• other ways that computer hardware can be attacked


physically.
• Computers have been drenched with water, burned, frozen,
gassed, and electrocuted with power surges.
SOFTWARE VULNERABILITIES

• Software can be replaced, changed, or destroyed


maliciously, or it can be modified, deleted, or misplaced
accidentally. Whether intentional or not, these attacks
exploit the software’s vulnerabilities.
SOFTWARE VULNERABILITIES

• Sometimes, the attacks are obvious, as when the software


no longer runs. More subtle are attacks in which the
software has been altered but seems to run normally.
DATA VULNERABILITY

• a data attack is a more widespread and serious problem


than either a hardware or software attack.
• data items have greater public value than hardware and
software because more people know how to use or
interpret data.
THREATS

• A threat to a computing system is a set of circumstances


that has the potential to cause loss or harm.
• There are many threats to a computer system, including
human-initiated and computer-initiated ones.
• A threat is blocked by control of a vulnerability.
• We can view any threat as being one of four kinds such as
interception, interruption, modification, and fabrication.
THREATS

• An interception means that some


unauthorized party has gained
access to an asset. The outside
party can be a person, a program,
or a computing system.
THREATS

• In an interruption is an asset of the system becomes lost,


unavailable, or unusable.
THREATS

• If an unauthorized party not only accesses but tampers


with an asset, is called as a modification.
THREATS

• An unauthorized party might create a fabrication of


counterfeit objects on a computing system.
• The intruder may insert spurious transactions to a network
communication system or add records to an existing
database.
ATTACKS

• A human who exploits a vulnerability perpetrates an


attack on the system. An attack can also be launched by
another system, as when one
• system sends an overwhelming set of messages to another,
virtually shutting down the second system's ability to
function.
ATTACKS

• Unfortunately, we have seen this type of attack frequently,


as denial-of-service attacks flood servers with more
messages than they can handle.
CONTROL

• The control is an action, device, procedure or technique


that removes or reduces a vulnerability.
• We use a control as a protective measure.
• There are so many ways to controle.
HOW TO SECURE THE COMPUTER

• There are two ways


1. Physical secure
2. Other secure methods
PHYSICALLY SECURE COMPUTERS

• Obtain physical computer


locks for all your computers
PHYSICALLY SECURE COMPUTERS

• Attach mobile proximity


alarms to your
computers.
PHYSICALLY SECURE COMPUTERS

• Store computers in an area


with secure access.
• Or place the computers in a
locked room
PHYSICALLY SECURE COMPUTERS IN
YOUR COLLEGE
• Station security guards at
entry points to the college
building.
PHYSICALLY SECURE COMPUTERS IN
YOUR COLLEGE
• Verify windows and doors
are properly locked after
office hours.
SECURE THE COMPUTER

• Choose a good secured


operating system
SECURE THE COMPUTER

• Choose a web browser based


on its security and vulnerabilities
because most malware will come
through via your web browser
SECURE THE COMPUTER

• When setting up, use strong


passwords in your user account,
router account etc. Hackers may
use dictionary attacks and brute
force attacks.
SECURE THE COMPUTER

• When downloading software


(including antivirus software), get
it from a trusted source
SECURE THE COMPUTER

• Install good antivirus software


because Antivirus software is
designed to deal with modern
malware including viruses,
Trojans, key loggers, rootkits, and
worms.
SECURE THE COMPUTER

• Download and install a


firewall
SECURE THE COMPUTER

• Close all ports. Hackers use


port scanning (Ubuntu Linux
has all ports closed by
default)
SOURCES AND CITATIONS
• Security in Computing, Fourth EditionBy Charles P. Pfleeger
• http://lifehacker.com/5848296/how-do-i-keep-my-computer-secure-at-the-office
• http://it.ojp.gov/documents/asp/disciplines/section1-2.htm
• http://www.pcpro.co.uk/blogs/2011/01/21/how-to-physically-secure-your-business-hardware/
• http://www.us-cert.gov/nav/nt01/
• http://blog.chromium.org/2008/10/new-approach-to-browser-security-google.html
• http://www.avast.com
• http://www.trendsecure.com
• http://www.lavasoft.com
• http://www.zonealarm.com
• http://www.personalfirewall.comodo.com/
• http://www.remote-exploit.org/backtrack.html
• http://www.grc.com/securitynow.htm
• http://www.hackerhighschool.org/
• http://www.symantec.com/norton/products/library/article.jsp?aid=internet_iq
THANK YOU
HAVE A SECURED WORLD 

You might also like