Chapter 5. Computer Security
Chapter 5. Computer Security
COMPUTER SECURITY
Content Outlines
Computer Security
5
Who is Secured?
oConfidentiality
Confidentiality
oIntegrity
Integrity
Availability
oAvailability
7
Security Goals
Confidentiality
• Refers to information protection from
unauthorized read/access operations
Integrity
• Refers to the trustworthiness of data or
resources within a computer system
• It is preventing from unauthorized change
Availability
• Availability refers to the ability to use the
computer system and information resources at
desired times by authorized parties
8
Security Threats
A computer security threat is any person,
act, or object that poses a danger to
computer security.
A threat is a potential violation of security.
The effects of threats can be an affect on the
Confidentiality of data
Integrity of data
Availability of a system.
9
Causes of Security Threats
Physical Threats: Loss of physical support
Weather, natural disaster, bombs, power
failures, terrorism, etc.
Human Threats:
Stealing, fraud, bribery, spying, sabotage,
accidents.
Software Threats: Malicious Software
viruses, Trojan horses, Worms.
10
Human Threat- Intruders
Intruders are usually trying to gain access to a
system, or to increased privileges to which they
are not entitled, often by obtaining the password
for a legitimate account.
Hacking: is any attempt to intrude or gain
unauthorized access to your system.
It may or may not be for malicious purposes.
Cracking: Criminal who breaks into computer
systems for the purpose of doing damage.
11
Intruders/Hackers
12
Malicious Software
Malware, short for “malicious software,” refers to
any intrusive software developed by
cybercriminals (often called “hackers”).
16
Trojan Horse
Secretly downloading a virus or some other type
of mal-ware on to your computers.
Seems to do something good but covertly doing
something else
Popular mechanism for hiding a virus or a worm
17
Spyware
Spyware is designed to enter your computer
device, gather data about you, and forward it to a
third-party without your consent.
18
The effects of Malware
Corrupting the systems data
Increasing file size
Formatting the hard disk
Slowing down the computer system
Renaming all files with different name
Disrupts operations.
Steals sensitive information.
Allows unauthorized access to system resources.
Creates problems connecting to networks.
Results in frequent freezing or crashing.
19
Security Solutions
There are a number of basic ways that a computer can
be made more secure.
Backups/disaster recovery
Anti-Viruses
Cryptography (Encryption)
Authentication
Validation
Data Protection-using password
Firewall
20
Backups
Backup is sometimes called redundancy/disaster
recovery
The purpose of a backup is to make a copy of data,
which is unlikely to be lost or destroyed.
If we want a backup to be protected from the some
accidents that would destroy the data, we have to
store it in a different physical location.
Backups can be done on magnetic tapes, Magnetic
disks, CD/DVD or on the cloud (Internet).
21
CRYPTOGRAPHY
Encryption is the process of converting plaintext
(readable data) into ciphertext (unreadable characters) to
prevent unauthorized parties from viewing or modifying it.
Decryption is the process of converting Ciphertext to
plaintext
22
Authentication
Authentication is the process of logging in a manner
that proves his or her identity using username and
password to gain access to a system, network or web
site.
Example of authentication
Password
Fingerprint
Hand Geometry
Voice
Signature
Iris
23
Antiviruses
To prevent viruses from entering a computer
system there are two options.
▪ Isolate the machine
▪ disconnect it from the Internet or any other
network, not using USB disks or any other
removable disks.
▪ Install updated Antivirus program
Antivirus programs are designed to keep a watch
at all incoming files so that no malicious code
can enter the computer.
24
Functions of Anti-virus
Antivirus software is a program that is designed to
PREVENT, DETECT, and REMOVE and
RECOVER malicious software like worms,
viruses, trojan horses….
Identification of known viruses
Detection of suspected viruses
Blocking of possible viruses
Disinfection of infected objects
Deletion infected objects
Overwriting of infected objects
25
Example of Antivirus
Anti-viruses
Norton Antivirus
McAfee Antivirus
AVG Antivirus
Bitdefender Antivirus
Avira Antivirus
ESET NOD32 Antivirus
Kaspersky Antivirus
…..
26
Firewall
A firewall is a security system consisting of hardware
and/or software that prevents unauthorized network
access.
A firewall provides a security barrier between networks
or network segments.
27