Chapter 1
Chapter 1
Chapter 1
ADMAS UNIVERSITY
Computer Security
“The
most secure
computers are those
not connected
to the Internet and
shielded
from any interference”
Computer Security
Not Sufficient!!
Internet
Computer Security
Security Goals
Confidentiality
Integrity
Availaibility
Security goals
Security goals
confidentiality, integrity, and availability.
•Confidentiality ensures that computer-related assets are accessed only
by authorized parties. That is, only those who should have access to
something will actually get that access. By "access," we mean not only
reading but also viewing, printing, or simply knowing that a particular
asset exists. Confidentiality is sometimes called secrecy or privacy.
•Integrity means that assets can be modified only by authorized parties
or only in authorized ways. In this context, modification includes writing,
changing, changing status, deleting, and creating.
•Availability means that assets are accessible to authorized parties at
appropriate times. In other words, if some person or system has
legitimate access to a particular set of objects, that access should not be
prevented. For this reason, availability is sometimes known by its
opposite, denial of service.
Security goals
If we say that we have preserved the integrity of an item, we may
mean that the item is
•precise
•accurate
•unmodified
•modified only in acceptable ways
•modified only by authorized people
•modified only by authorized processes
•consistent
•internally consistent
•meaningful and usable
Security goals
An object or service is thought to be available if
•It is present in a usable form.
•It has capacity enough to meet the service's needs.
•It is making clear progress, and, if in wait mode, it has a bounded
waiting time.
•The service is completed in an acceptable period of time.
•There is a timely response to our request.
•Resources are allocated fairly so that some requesters are not
favored over others.
•The service or system involved follows a philosophy of fault
tolerance, whereby hardware or software faults lead to graceful
cessation of service or to work-around rather than to crashes and
abrupt loss of information.
•The service or system can be used easily and in the way it was
intended to be used.
Computer Security and Privacy/ Overview
Definitions
Security: The prevention and protection of computer
assets from unauthorized access, use, alteration,
degradation, destruction, and other threats.
TOP 5 CYBERCRIMES
TAX-REFUND FRAUD: Cybercriminals first obtain a valid
named Social Security number, preferably from someone who will not be filing atax
Early Efforts
1960s: Marked as the beginning of true
computer security
1970s: Tiger teams
Government and industry sponsored crackers who attempted
to break down defenses of computer systems in order to
uncover vulnerabilities so that patches can be developed
Categories of Attacks
Categories of Attacks/Threats
Source
Destination
Normal flow of information
Attack
Interruption Interception
Modification Fabrication
Computer Security and Privacy/Vulnerabilities
Types of Vulnerabilities
Today
Computers are more and more portable (PC, laptop,
PDA, Smartphone)
There are too many of them to have good physical
security for each of them
They are not “too expensive” to justify spending more
money on physical security until a major crisis occurs
Users don’t accept restrictions easily
Accessories (ex. Network components) are not
considered as important for security until there is a
problem
Access to a single computer may endanger many more
computers connected through a network
Computer Security and Privacy/ Physical Security
=>
Physical security is much more
difficult to achieve today than some
decades ago
Computer Security and Privacy/ Physical Security
Solution
Avoid having servers in areas often hit by Natural Disasters!
Computer Security and Privacy/ Physical Security
External thieves
Portable computing devices can be stolen outside the
organization’s premises
Loss of a computing device
Mainly laptop
Computer Security and Privacy/ Physical Security
Safe area
Hacking Attack:
Any attempt to gain unauthorized access to
your system
Physical Attack:
Stealing, breaking or damaging of computing
devices
Computer security/ Attacks & Threats
Types of Threats/Attacks
Malware Attack:
A generic term for software that has malicious
purpose
Examples
Viruses
Trojan horses
Spy-wares
New ones: Spam/scam, identity theft, e-payment
frauds, etc.
Computer security/Threats
Malware Attack:
Viruses
“A small program that replicates and hides itself inside
other programs usually without your knowledge.”
Symantec
Similar to biological virus: Replicates and Spreads
Worms
An independent program that reproduces by copying
itself from one computer to another
It can do as much harm as a virus
It often creates denial of service
Computer security/Threats
Malware Attack…
Trojan horses
Secretly downloading a virus or some other type of mal-
ware on to your computers.
Spy-wares
“A software that literally spies on what you do on your
computer.”
Example: Simple Cookies and Key Loggers
Computer security/Threats
Most software based attacks are commonly
called Viruses: How do viruses work?
Infection mechanisms
First, the virus should search for and detect
objects to infect
Installation into the infectable object
Writing on the boot sector
Add some code to executable programs
Add some code to initialization/auto-executable
programs
Write a macro in a word file
…
Computer security/Threats
How do viruses work? …
Trigger mechanism
Date
Number of infections
First use
Adolescents
Ethically normal and of average/above
average intelligence.
Tended to understand the difference
between what is right and wrong
Typically do not accept any responsibility
for problems caused
Computer security/Threats
Who Writes Virus …
The College Student
Ethically normal
Despite expressing that what is illegal is
“wrong”
Are not typically concerned about the results of
their actions related to their virus writing
Three categories
Scanners
Activity monitors
Change detection software
Computer security/Threats
Anti-Virus …
Functions of anti-viruses
Identification of known viruses
Detection of suspected viruses
Blocking of possible viruses
Disinfection of infected objects
Deletion and overwriting of infected
objects
Computer security/Threats
Hackers/Intrusion Attack:
Web Server X
Ping
Ping
Ping