UNIT - 1 Notes
UNIT - 1 Notes
UNIT-1
Page 1 of 21
COMPUTER SYSTEM SECURITY – UNIT 1
1.1 Introduction
Computer security is the ability of a computer system to protect
information with respect with to confidentiality, integrity and
unauthorized access.
Computer security, also known as cyber security or IT security,
is the protection of information systems from theft or damage
to the hardware, software, and information.
Computer security includes controlling physical access to the
hardware, as well as protecting against harm that may come via
network access.
The main objective of computer security is to protect the
system’s information from any external or internal harms.
Under computer security we have various types of attacks.
Page 2 of 21
COMPUTER SYSTEM SECURITY – UNIT 1
1. Confidentiality
Confidentiality measures protect information from
unauthorized access. Confidentiality is equivalent to privacy
and avoids the unauthorized disclosure of information. It
involves the protection of data, providing access for those who
are allowed to see it while disallowing others from learning
anything about its content. It prevents essential information
from reaching the wrong people while making sure that the
right people can get it. Data encryption is a good example to
ensure confidentiality.
Page 3 of 21
COMPUTER SYSTEM SECURITY – UNIT 1
2. Integrity
Integrity refers to the methods for ensuring that data is real,
accurate and safeguarded from unauthorized user modification.
It is the property that information has not be altered in an
unauthorized way, and that source of the information is
genuine.
3. Availability
Availability is the property in which information is accessible
and modifiable in a timely fashion by those authorized to do so.
It is the guarantee of reliable and constant access to our
sensitive data by authorized people. In order for an information
system to be useful it must be available to authorized users.
4. Authentication
An authentication is a process that ensures and confirms a user's
identity or role that someone has. It can be done in a number of
different ways, but it is usually based on a combination of-
something the person has (like a smart card or a radio
key for storing secret keys),
something the person knows (like a password),
Something the person is (like a human with a
fingerprint).
Authentication is the necessity of every organizations because
it enables organizations to keep their networks secure by
permitting only authenticated users to access its protected
Page 4 of 21
COMPUTER SYSTEM SECURITY – UNIT 1
5. Non-Repudiation
Non-repudiation is the assurance that someone cannot deny the
validity of something. Non-repudiation is a legal concept that
is widely used in information security and refers to a service,
which provides proof of the origin of data and the integrity of
the data.
Page 5 of 21
COMPUTER SYSTEM SECURITY – UNIT 1
3. Digital Signature:
A digital signature is a means by which the sender can
electronically sign the data and the receiver can electronically
verify the signature. It provides authenticity of data.
4. Authentication Exchange:
In this two entities exchange some messages to prove their
identity to each other.
5. Traffic Padding:
Traffic padding means inserting some fake data into the data
traffic to thwart the adversary’s attempt to use the traffic
analysis.
6. Routing Control:
Routing control means selecting and continuously changing
different available routes between sender and receiver to
prevent the opponent from eavesdropping on a particular route.
7. Notarization:
Notarization means selecting a third trusted party to control the
communication between two entities. The receiver can involve
a trusted third party to store the sender request in order to
prevent the sender from later denying that she has made a
request.
8. Access Control:
Access control used methods to prove that a user has access
right to the data or resources owned by a system. Examples of
proofs are passwords and PINs.
Page 6 of 21
COMPUTER SYSTEM SECURITY – UNIT 1
1. Passive Attacks
The main goal of a passive attack is to obtain unauthorized
access to the information. For example, actions such as
intercepting and eavesdropping on the communication channel
can be regarded as passive attack.
These actions are passive in nature, as they neither affect
information nor disrupt the communication channel. A passive
attack is often seen as stealing information.
Page 7 of 21
COMPUTER SYSTEM SECURITY – UNIT 1
2. Traffic analysis –
Page 8 of 21
COMPUTER SYSTEM SECURITY – UNIT 1
2. Active Attacks
An active attack involves changing the information in some
way by conducting some process on the information. For
example,
Modifying the information in an unauthorized manner.
Initiating unintended or unauthorized transmission of
information.
Alteration of authentication data such as originator name
or timestamp associated with information
Unauthorized deletion of data.
Denial of access to information for legitimate users
(denial of service).
Page 9 of 21
COMPUTER SYSTEM SECURITY – UNIT 1
1. Masquerade –
2. Modification of messages –
Page 10 of 21
COMPUTER SYSTEM SECURITY – UNIT 1
3. Repudiation –
4.Replay –
Page 11 of 21
COMPUTER SYSTEM SECURITY – UNIT 1
5.Denial of Service –
Page 12 of 21
COMPUTER SYSTEM SECURITY – UNIT 1
Page 13 of 21
COMPUTER SYSTEM SECURITY – UNIT 1
Page 14 of 21
COMPUTER SYSTEM SECURITY – UNIT 1
Page 15 of 21
COMPUTER SYSTEM SECURITY – UNIT 1
a) Platform Defense
i. Random Canary
Page 17 of 21
COMPUTER SYSTEM SECURITY – UNIT 1
Page 19 of 21
COMPUTER SYSTEM SECURITY – UNIT 1
Page 20 of 21
COMPUTER SYSTEM SECURITY – UNIT 1
Page 21 of 21