Final Computer Security
Final Computer Security
Security in Computing
A+3=D K – 1 = J Y + 3 =B
Types of encryption
Substitution
Caesar cipher
One- time pad substitution
Vernam cipher
Book cipher
Vigenere cipher
Transposition (Permutation)
Columnar cipher
Cross cipher
Advantage s and disadvantage of cipher.
How to crack it.
Vigenere tableau
Shannon’s Characteristics of “Good”
Cipher
Secrecy needed amount of labor
Set of keys and algorithm should be free
from complexity
The implementation of the process should
be as simple as possible
Errors in ciphering should not propagate
and cause corruption of further information
in the message.
The size of the enciphered text should be
no longer than the text of the original
message.
Properties of trustworthy Encryption
System
It is based on sound Mathematics
It has been analyzed by competent experts
and found to be sound
It has stood the test of time.
Stream vs. Block Ciphers
Comparison
Stream Encryption Block Encryption
Algorithm Algorithm
Advantages Speed of Transfer Faster High Diffusion
Low Error Propagation Immunity to insert of
symbol
Disadvantag Low Diffusion Slowness of Encryption
es Susceptibility to Malicious Error Propagation
Substitution
Original Message
E1(M)
E2(E1(M)
Characteristics
P=D(KPRIV, E(KPUB,P)) P=D(KPUB, E(KPRIV,P))
RSA( Rivest
-Shamir-Adelman) Algorithm
Why Security is needed?
Increasing threat of effect
Availability of number of tools and
resources on the internet
Fast growing of computer network
Product launched in the market
Lack of specialized resources that may be
allotted for securing system
Security Architecture
Attack : an action that compromise the
security
Mechanism : process design to detect,
prevent or recover from security attack:
Services : process that enhances the
security of the data proessing
Two Types of Attack
Active
Masquerade
Replay
Modification
Denial of services
Passive
The release of message contents
Traffic analysis
Attacks
Vulnerabilities is a weakness in the security
system.
Threat to a computing system is a set of
circumstances that has a potential to cause
loss or harm.
Attacks : a human who exploits a
vulnerabilities an attack on the system.
Control it’s a protective measure, that is
control is an action, devices, procedure or
techniques that reduce the vulnerabilities.
The Threats are
Interception
Interruption
Modification
Fabrications.
MOM
Methods : skill , knowledge, tools and other
things which to be able to pull of the attack
Opportunity : the time and access to
accomplish the task
Motive : a reason to want to perform this
task
The following figures are included (source:
Datapro Research) as example, to give an
idea what is going on in the real world.
Common Causes of damage : Human Error
52%, Dishonest people 10%, Technical
Sabotage 10%, Fire 15%, Water 10% and
Terrorism 3%.
Who causes damage? Current employees
81%, Outsiders 13%, Former employees
6%.
Types of computer crime: Money theft 44%,
Damage of software 16%, Theft of
information 16%, Alteration of data 12%,
What is Security?
Security is the protection of information,
systems and services against disasters,
mistakes and manipulation so that the
likelihood and impact of security
incidents is minimized. It consist of
Confidentiality
Integrity:
Availability:
Legal Compliance:.
A threat is a danger which could affect
the security (confidentiality, integrity,
Authentication assurance that the
communicating entity is one that to be
Confidentiality ensures that computer
related assets are accessed only by the
authorised parties.
Integrity means that assets can be
modified only by authorized parties.
Availabilities means that assets are
accessible to authorized parties at
appropriate times.
Non repudiation provides protection against
denial of attacks.
Integrity means
Precise
Accurate
Unmodified
Modified only in acceptable ways
Modified only by authorized ways
Consistent
Meaningful and usable
Availability means
It is present in usable form
Making clear process, not in waiting mode
Services is completed in acceptable period of
time.
necessary?
Customer information or accounting
information could be disclosed, affecting
credibility.
This information could be used by (new)
competitors to launch more effective
marketing campaigns.
Virus development has continued at an
alarming rate in the last few years, leaving
few, if any companies untouched.
System interconnection increases security
risks significantly:
Computer Criminals
Computer crime is any crime involving a
computer or aided by the use of one.
Amateurs : normal People
Crackers of malicious hacker: often high
school or university student
Career criminals : computer Professionals
who admits the computer crime
Terrorists : the link between computer and
terrorists is quite evident
Target of attacks
Propagation vehicles
Methods of attack
Methods of Defenses
The possibilities for harm to occur is called
risk.
Prevent it. By clocking
Deter it by making harder
Deflect it by making another target easier
Detect it either as it happens
Recover from its effect.
Hacking as defense
Mechanism
Hacking means to gain unauthorized
access to data or information.
A cracker is a hacker who uses the
knowledge of hacking for malicious
practice. Two types of cracker
Inside cracker
Outside cracker
Ethical hacking is tools or solution to
system hacking.
Esthetical hacking use the same
methodology as cracker to detect
vulnerabilities, the objectives are different.
The methodology of Hacking
Foot printing : social engineering and
dumpster driving
Scanning : pre-attack , use of different tools
and techniques
Gaining access : denial of services to stop
work, spoofing, packet flooding
Maintaining access : trojans horse, rootkit
Covering tracks: try to keep hidden,
undetected
Classification of Hackers
Black Hats : Crackers
White Hats : for defenses
Grey Hats : may be black or white Hat
Blue Hats : works with Computer system
Consulting firms to bug test a system prior
to launch.
Control
Traditional fortress
A strong gate or door
Heavy walls
Arrow slits
A drawbridge to limit access to authorized
people
Gate keeper to verify that only authorized
people ad goods could enter
Today
Strong locks on the door
Burgur alarm
Reinforces window
Multiple Controls
Available controls
Encryption
Software controls
Internal Program Controls
OS and Network system Control
Independent Control Programs
Development Controls
Hardware controls
Hardware or smart card implantation of encryption
Locks of cables limiting access or determining theft
Device to verify user’s identities
Firewall
Intrusion detection system
Circuit boards that control to storage media
Effectiveness of Controls
Awareness of problem
Likelihood of use
Overlapping of controls
Periodic review
Policies and procedures
Frequently changes of password
Physical controls
Locks on the doors
Guards at entry points
Backup copies of hardware and software data
Physical site planning that reduces the risk of
natural disaster
[goto main;
1234567;
subroutine infect-executable
:=
{loop
file :=get-random-
executable-file;
if(first-line-of-
file=1234567)
then goto
loop
else prepend
V to file; }
subroutine do-damage :=
{ whatever damage is
to be done }
subroutine trigger-pulled : =
{ return true if some
condition holds }
Cntd..
When this program is invoked, control
passes to its virus, which perform the
following steps;
For each uninfected file P2 that is found, the
virus first compresses that file to produce P2
which is shorter than the original program by
the size of the virus.
A copy of the virus is prep-ended to the
compressed program.
The compressed version of the original
infected program p1 is uncompressed.
The uncompressed original program is
executed.
Types of Viruses
Parasitic virus : most common form of virus.
Attaches to file and replicates itself.
Memory-resident virus : lodges in memory
Boot sector virus : infects a master boot
record
Stealth virus : a virus explicitly designed to
hide itself from detection by antivirus
software.
Polymorphic virus : a virus that mutates
with every infection, making detection by
the signature of the virus impossible.
Metamorphic virus : this virus exactly same
as polymorphic virus only difference is it
Macro viruses
It is really treating for following reason:
A micro virus is platform independent. Macro
virus infect Microsoft word and and infect all
the hardware and operating system.
Macro virus infect document not exe file.
Macro virus easily spread. A common way by
electronic mail.
E-mail viruses
If the recipient opens the email attachment
, the word macro is activated and then
The e-mail virus sends itself to every one on
the mailing list in the user’s e-mail package.
The virus does local damage.
worms
A worms has same four phase as viruses ,
only the difference is in propagation phase
as below:
Search for other systems to infect by
examining host tables or similar repositories
of remote system addresses.
Establish a connection with a remote system.
Copy itself to the remote system and cause
the copy to be run.
Generation of Antivirus
First generation
Second generation
Third generation
Fourth generation
First generation
The first generation of antivirus software emerged in the late 1980s
and early 1990s. During this time, computer viruses were relatively
new, and antivirus solutions were basic in terms of functionality and
detection capabilities. Most first-generation antivirus programs relied
on signature-based detection, where they matched patterns of known
viruses against files on a computer. However, this approach had its
limitations, as it required regular updates to stay up-to-date with new
threats and could not detect unknown viruses.
Additionally, first-generation antivirus software was primarily designed
for individual users and lacked the ability to detect and prevent
network-based attacks. These early solutions typically focused on
scanning files and emails to identify and remove viruses. As viruses
became more sophisticated, with polymorphic and stealth capabilities,
first-generation antivirus software struggled to keep up.
Limitations of First Generation Antivirus Software
Limited detection capabilities due to reliance on signature-based
detection
Inability to detect unknown or new viruses
Lack of network-based threat detection and prevention
Complex command-line interfaces
Difficulty in keeping up with polymorphic and stealth viruses
Second generation
The second generation of antivirus software emerged in the mid-1990s, addressing
some of the shortcomings of the first generation. These solutions introduced
heuristic scanning, which aimed to detect viruses based on their behavior and
characteristics rather than relying solely on signatures. Heuristic scanning allowed
antivirus programs to detect and block unknown viruses by identifying suspicious
actions or code patterns.
Second-generation antivirus software also enhanced their network-based threat
detection capabilities, providing protection against malware distributed through the
internet, email attachments, and other communication channels. These solutions
often included firewalls and intrusion detection systems to strengthen overall
security.
The user interfaces of second-generation antivirus software became more user-
friendly, featuring graphical interfaces that made it easier for users to navigate and
understand the status of their antivirus protection. The inclusion of real-time
scanning and automatic updates further improved the detection and remediation of
viruses.
Advancements in Second Generation Antivirus Software
Heuristic scanning for detecting unknown viruses
Enhanced network-based threat detection and prevention
Improved user interfaces with graphical representations
Real-time scanning and automatic updates
Third generation
The third generation of antivirus software emerged in the early 2000s,
introducing proactive and behavior-based detection mechanisms. Traditional
signature-based detection alone was no longer sufficient to combat the rapidly
evolving landscape of malware. Third-generation antivirus solutions adopted
sandboxing, virtualization, and machine learning techniques to identify and block
malicious code and activities.
Sandboxing allowed suspicious files or processes to run in isolated environments
where their behavior could be analyzed. Virtualization technologies helped create
secure containers where potentially harmful code could be executed and
monitored, without posing a risk to the underlying system. Machine learning
algorithms played a crucial role in analyzing large volumes of data and
identifying patterns and anomalies associated with malware.
Third-generation antivirus software also incorporated cloud-based threat
intelligence, enabling real-time information sharing and faster detection of new
threats. This collaborative approach helped antivirus programs stay up-to-date
with the latest malware strains and provided stronger defense mechanisms
against zero-day attacks.
Key Features of Third Generation Antivirus Software
Proactive and behavior-based detection mechanisms
Implementation of sandboxing and virtualization technologies
Incorporation of machine learning algorithms
Cloud-based threat intelligence for real-time information sharing
Fourth generation
The fourth and current generation of antivirus software focuses on proactive
and predictive approaches to threat detection and prevention. This
generation leverages artificial intelligence (AI), deep learning, and advanced
analytics to analyze vast amounts of data and identify previously unknown
threats.
Fourth-generation antivirus solutions utilize AI and machine learning
algorithms to learn from previous cyber attacks and model patterns of
malicious behavior. They use this knowledge to detect and stop threats
before they can cause harm. These solutions can identify zero-day attacks,
polymorphic malware, and other advanced threats that may bypass
traditional signature-based detection methods.
The inclusion of big data analytics enables the analysis of vast quantities of
structured and unstructured data to uncover hidden threats and identify
complex attack vectors. These solutions also embrace automation, allowing
security teams to streamline their operations and respond to threats more
efficiently.
Key Features of Fourth Generation Antivirus Software
Utilization of artificial intelligence and machine learning algorithms
Advanced analytics and big data for threat analysis
Predictive modeling and proactive threat prevention
Automation to streamline security operations
Advanced Antivirus
Techniques
Generic Decryption(GD) : Generic decryption (GD)
technology enables the antivirus program to easily detect
even the most complex polymorphic
viruses while maintaining fast scanning speeds. Recall
that when a file containing a polymorphic virus is
executed, the virus must decrypt itself to activate. In
order to detect such a structure, executable files are
run through a
GD scanner, which contains the following elements:
CPU emulator: A software-based virtual computer.
Instructions in an exe-cutable file are interpreted by the emulator
rather than
executed on the underlying processor. The emulator includes soft
ware versions of all register and other processor hardware, so that
the underlying processor is unaffected
by programs interpreted on the emulator.
Digital Immune system
Digital Immune system
1. A monitoring program on each PC uses a variety of heuristics b
ased on system behavior, suspicious changes to programs, or
family signature to infer that a
virus may be present. The monitoring program forwards a cop
y of any program
thought to be infected to an administrative machine within the
organization.
2. The administrative machine encrypts the sample and sends it
to a central virus analysis machine.
3. This machine creates an environment in which the infected
program can
be safely run for analysis. Techniques used for this purpose inc
lude emulation, or the creation of a protected environment wit
hin which the suspect program can be executed and monitore
d. The virus analysis machine then
produces a prescription for identifying and removing the virus.
4. The resulting prescription is sent back to the administrative m
Behavior-Blocking
Software
Unlike heuristics or fingerprint-based scanners, behavior
blocking software integrates with the operating system o
f a host computer and monitors program
behavior in real-time for malicious actions.
The behavior blocking software then blocks potentially m
alicious actions
before they have a chance to affect the system. Monitor
ed behaviors can include
Attempts to open, view, delete, and/or modify files;
Attempts to format disk drives and other unrecoverable
disk operations;
Modifications to the logic of executable files or macros;
Modification of critical system settings, such as start-
up settings;
Scripting of e-
mail and instant messaging clients to send executable c
Behavior-Blocking
Software
Key Points - Firewall
A firewall forms a barrier through which the
traffic going in each direction must pass. A
firewall security policy dictates which traffic is
authorized to pass in each direction.
A firewall may be designed to operate as a
filter at the level of IP packets, or may operate
at a higher protocol layer.
Firewall Characteristics
All traffic from inside to outside, and vice
versa, must pass through the firewall.
Only authorized traffic, as defined by the local
security policy, will be allowed to pass.
The firewall itself is immune to penetration.
This implies that use of a trusted system with a
secure operating system.
A firewall defines a single choke point.
A firewall provides a location for monitoring
security-related events.
A firewall is a convenient platform for several
Internet functions that are not security related.
A firewall can serve as the platform for IPSec.
four general techniques that firewalls use
to control access and enforce the site's
security policy.
Service control:
Direction control
User control:
Behavior control:
Limitation of firewall
The firewall cannot protect against attacks
that bypass the firewall.
The firewall does not protect against
internal threats
The firewall cannot protect against the
transfer of virus-infected programs or files.
Types of Firewall
Packet-Filtering Router
It is a technique used to control network
access by monitoring outgoing and
incoming packets and allowing them to
pass or halt based on the source and
destination Internet Protocol (IP) addresses,
protocols, and ports. This firewall is also
known as a static firewall.
disadvantage:
Because packet filter firewalls do not
examine upper-layer data.
Because of the limited information
available to the firewall, the logging
functionality present in packet filter
firewalls is limited.
Most packet filter firewalls do not support
advanced user authentication schemes.
Finally, due to the small number of
variables used in access control decisions.