Computer security aims to protect computer systems and data from theft, damage, or disruption. It is becoming more important as reliance on computer systems grows. Vulnerabilities are weaknesses that can be exploited by various types of attacks, including denial of service attacks, eavesdropping, privilege escalation, phishing, and spoofing. Effective computer security requires understanding attack types and implementing appropriate defenses.
Computer security aims to protect computer systems and data from theft, damage, or disruption. It is becoming more important as reliance on computer systems grows. Vulnerabilities are weaknesses that can be exploited by various types of attacks, including denial of service attacks, eavesdropping, privilege escalation, phishing, and spoofing. Effective computer security requires understanding attack types and implementing appropriate defenses.
Computer security aims to protect computer systems and data from theft, damage, or disruption. It is becoming more important as reliance on computer systems grows. Vulnerabilities are weaknesses that can be exploited by various types of attacks, including denial of service attacks, eavesdropping, privilege escalation, phishing, and spoofing. Effective computer security requires understanding attack types and implementing appropriate defenses.
Computer security aims to protect computer systems and data from theft, damage, or disruption. It is becoming more important as reliance on computer systems grows. Vulnerabilities are weaknesses that can be exploited by various types of attacks, including denial of service attacks, eavesdropping, privilege escalation, phishing, and spoofing. Effective computer security requires understanding attack types and implementing appropriate defenses.
Download as PPTX, PDF, TXT or read online from Scribd
Download as pptx, pdf, or txt
You are on page 1of 15
COMPUTER SERCURITY
• Computer security, cyber security or information technology security (IT
security) is the protection of computer systems from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. • The field is becoming more important due to increased reliance on computer systems, the Internet[ and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of "smart" devices, including smart phones, televisions, and the various devices that constitute the "Internet of things". Owing to its complexity, both in terms of politics and technology, cyber security is also one of the major challenges in the contemporary world. As mentioned earlier it can also be known as: THREATS TO CYBER SECURITY VULNERABILITIES AND ATTACKS
• A vulnerability is a weakness in design, implementation, operation or internal
control. Most of the vulnerabilities that have been discovered are documented in the Common Vulnerabilities and Exposures (CVE) database. An exploitable vulnerability is one for which at least one working attack or "exploit" exists. Vulnerabilities are often hunted or exploited with the aid of automated tools or manually using customized scripts. To secure a computer system, it is important to understand the attacks that can be made against it, and these threats can typically be classified into one of these categories below: TYPES OF VULNERABILITIES AND ATTACKS • BACKDOOR:A backdoor in a computer system, a cryptosystem or an algorithm, is any secret method of bypassing normal authentication or security controls. They may exist for a number of reasons, including by original design or from poor configuration. They may have been added by an authorized party to allow some legitimate access, or by an attacker for malicious reasons; but regardless of the motives for their existence, they create a vulnerability. • DENIAL OF SERVICE ATTACK : Denial of service attacks (DOS) are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victims account to be locked, or they may overload the capabilities of a machine or network and block all users at once. While a network attack from a single IP address can be blocked by adding a new firewall rule, many forms of Distributed denial of service (DDOS) attacks are possible, where the attack comes from a large number of points – and defending is much more difficult. Such attacks can originate from the zombie computers of a botnet, but a range of other techniques are possible including reflection and amplification attacks, where innocent systems are fooled into sending traffic to the victim. • EAVESDROPPING: This is the act of surreptitiously listening to a private computer “conversation”(communication),typically between hosts on a network. For instance, programs like Carnivore and NarusInSight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e. ,with no contact with the outside world) can be eavesdropped upon via monitoring the faint electromagnetic waves or transmissions generated by hardware ; TEMPEST is a specification by the NSA referring to these attacks. • DIRECT ACCESS ATTACK: An unauthorized user gaining physical access to a computer is most likely able to directly copy data from it. They may also compromise security by making operating system modifications, installing software worms, key loggers, covert listening devices or using wireless mice.[6] Even when the system is protected by standard security measures, these may be able to be by-passed by booting another operating system or tool from a CD-ROM or other bootable media. Disk encryption and Trusted Platform Module are designed to prevent these attacks. • MULTI-VECTOR OR POLY MORPHIC ATTACKS: Surfacing in 2017, anew class of multi vector polymorphic cyber threats surfaced that combined several types of attacks and changed form to avoid cyber controls as they spread. These threats have been classified as fifth generation cyber attacks. • TAMPERING: Tampering describes a malicious modification of products. So called evil maid attacks and security services planting of surveillance capability into routers are example • PHISHING: phishing is the attempt to acquire sensitive information such as usernames and credit card detail directly from users by deceiving the users. Phishing is typically carried out by e-mail spoofing or instant messaging , and it often directs users to enter details at a fake whose “look” and “feel” are almost identical to the legitimate one . The fake website often asks for personal information , such as log-in-details and passwords. This information can then be used to gain access to the individual’s real account on the real website. Preying on a victim’s trust ,Phishing can be classified as a form of social engineering. • PRIVILEGE ESCALATION: Privilege escalation describes a situation where an attacker with some level of restricted access is able to , without authorization , elevate their privileges or access level . For example , a standard computer may be able to exploit a vulnerability in the system to gain access to restricted data ;or even become “root” and have full unrestricted access to a system. • SOCIAL ENGINEERING: Social Engineering aims to convince a user to disclose secrets such as passwords , card numbers , etc. by , for example impersonating a bank , a contractor , or a customer. A common scam involves fake CEO emails sent to accounting and finance departments. In early 2016, the FBI reported that the scam has cost US businesses more than $2billion in about 2 years. • SPOOFING: Spoofing is the act of masquerading as a valid entity through falsification of data (such as an IP address or username ),in order to gain access to information or resources that one is otherwise unauthorized to obtain . There are several types of spoofing including; 1. E-mail Spoofing 2. IP address Spoofing 3. MAC(Media Access Control) Spoofing 4. Biometric spoofing O