SlideShare a Scribd company logo
1 of 32
Chapter One
Introduction to Information Security
Introduction to Information Security
1
Information Security
2
Information security means protecting information and information
systems from unauthorized access, use, disclosure, disruption,
modification, perusal, inspection, recording or destruction.
Information security = confidentiality + integrity + availability +
authentication.
well-informed sense of assurance that the information risks and
controls are in balance.
The terms information security, computer security and information
assurance are frequently incorrectly used interchangeably.
Contd.
3
 Information security is concerned with the confidentiality, integrity
and availability of data regardless of the form the data may take:
electronic, print, or other forms.
 Computer security can focus on ensuring the availability and correct
operation of a computer system without concern for the information
stored or processed by the computer.
 Information security offers many areas for specialization including:
securing network(s) and allied infrastructure,
securing applications and databases, security testing, information
systems auditing, business continuity planning and digital forensics
Basic Security Terminology(concepts)
4
 Network security terms are the foundation for any discussion of
network security and are the elements used to measure the security
of a network.
 Some of these terms or concepts include:-
1. Identification:- is simply the process of identifying one's self to
another entity or determining the identity of the individual or entity
with whom you are communicating.
2. Authentication:- is the assurance that the communicating entity is
the one that it claims to be.
 Authentication serves as proof that you are who you say you are
or what you claim to be.
 Authentication is required when communicating over a network or
Contd.
5
 When communicating over a network you should ask yourself
two questions:
1) With whom am I communicating?
2) Why do I believe this person or entity is who he, she, or it
claims to be?
 When logging onto a network, three basic schemes are used
for authentication:
 Something you know
 Something you have
 Something you are
Contd.
6
3. Access Control(Authorization):- refers to the ability to control the
level of access that individuals or entities have to a network or
system and how much information they can receive.
 Your level of authorization basically determines what you're allowed
to do once you are authenticated and allowed access to a network,
system, or some other resource such as data or information.
 Access control is the determination of the level of authorization to a
system, network, or information (i.e., classified, secret, or top-
secret).
Contd.
7
4. Confidentiality:- can also be called privacy or secrecy and
refers to the protection of information from unauthorized
disclosure.
 Usually achieved either by restricting access to the
information or by encrypting the information so that it is not
meaningful to unauthorized individuals or entities.
5. Availability:- refers to whether the network, system,
hardware, and software are reliable and can recover quickly
and completely in the event of an interruption in service.
 Ideally, these elements should not be susceptible to denial
Contd.
8
6. Data Integrity:- refers to the assurance of data received are exactly as
sent by an authorized entity.
 Data integrity is achieved by preventing unauthorized or improper
changes to data, ensuring internal and external consistency, and
ensuring that other data attributes (such as timeliness and
completeness) are consistent with requirements.
7. Accountability:- refers to the ability to track or audit what an individual
or entity is doing on a network or system.
 Does the system maintain a record of functions performed, files
Contd.
9
8. Non-Repudiation:- refers to the ability to prevent individuals or
entities from denying (repudiating) that information, data, or files
were sent or received or that information or files were accessed
or altered, when in fact they were.
 is crucial to e-commerce.
Contd.
10
8. Non-Repudiation:- refers to the ability to prevent individuals or
entities from denying (repudiating) that information, data, or files
were sent or received or that information or files were accessed
or altered, when in fact they were.
 is crucial to e-commerce.
Computer Security
 While computer systems today have some of the best security systems ever,
they are more vulnerable than ever before.
 Computer and network security comes in many forms, including encryption
algorithms, access to facilities, digital signatures, and using fingerprints and
face scans as passwords.
 The OSI security architecture provides a systematic frame work for defining
security attacks, mechanisms and services.
The OSI security architecture focuses on security attacks, mechanisms and
services.
 Security attack:- Any action that compromises the security of information
owned by an organization.
 Security mechanism:- A process (or a device incorporating such a
process) that is designed to detect, prevent, or recover from a security
attack.
 Security service:- A processing or communication service that enhances
11
Contd.
 Computer Security:- generic name for the collection of tools
designed to protect data and to hackers from attacking the
organizational assets.
 “The protection afforded to an automated information system in order
to attain the applicable objectives of preserving the integrity,
availability, and confidentiality of information system resources
(includes hardware, software, firmware, information/data, and
12
Contd.
13
 Network Security:- measures to protect data during their
transmission over the network.
 Internet Security:- measures to protect data during their
transmission over a collection of interconnected networks(network of
networks)
Why Is Computer and Network Security Important?
14
1. To protect company assets:- One of the primary goals of computer and
network security is the protection of company assets (hardware, software
and/or information).
2. To gain a competitive advantage:- Developing and maintaining effective
security measures can provide an organization with a competitive
advantage over its competition
3. To comply with regulatory requirements and fiduciary
responsibilities:- organizations that rely on computers for their continuing
operation must develop policies and procedures that address
organizational security requirements.
 Such policies and procedures are necessary not only to protect
company assets but also to protect the organization from liability
15
Vulnerabilities(Attack Surface)
 are weak points or loopholes in security that an attacker can
exploit in order to gain access to the network or to resources
on the network.
 The vulnerability is not the attack, but rather the weak point
that is exploited.
 Vulnerability is the intersection of three elements:
1. A system susceptibility or flaw,
2. attacker access to the flaw, and
3. attacker capability to exploit the flaw
 To be vulnerable, an attacker must have at least one
applicable tool or technique that can connect to a system
weakness.
 A security risk may be classified as a vulnerability. But there
Contd.
16
 A vulnerability with one or more known instances of working
and fully-implemented attacks is classified as an exploitable
vulnerability, a vulnerability for which an exploit exists.
Fig Threat agents, attack vectors, weakness, controls, IT asset and
business impact
Vulnerability Classification
17
 Vulnerabilities are classified according to the asset class
they related to:
1. Hardware
 susceptibility to humidity
 susceptibility to dust
 susceptibility to soiling
 susceptibility to unprotected storage
2. Software
 insufficient testing
 lack of audit trail
Contd.
18
3. Network
 Unprotected communication lines
 Insecure network architecture
4. Personnel
 inadequate recruiting process
 inadequate security awareness
5. Site
 area subject to flood
 unreliable power source
6. Organizational
 lack of regular audits
 lack of continuity plans
Vulnerabilities in Common Network Access Procedures &
Protocols
19
 The primary protocol used in operating systems today is the TCP/IP
protocol stack.
 The wide use of this protocol helps to integrate different operating
system architectures such as Microsoft and UNIX.
 Many organizations make use of this interoperability and use
various TCP/IP utilities to run programs, transfer information, and
reveal information.
 Due to the nature of these utilities, various security risks and threats
exist.
 Users often use the same passwords for mixed environments.
 Sometimes, passwords are automatically synchronized.
 If hackers can crack the password on systems other than Microsoft
systems, they could also use that password to logon to a Microsoft
Telnet
20
 The Telnet protocol allows a user to log onto a system over the network
and use that system as though the user was sitting at a terminal that was
directly connected.
 The telnet command provides a user interface to a remote system.
 When using the Microsoft telnet client to log on to the Microsoft Windows
2000 Telnet service, it uses the NTLM(NT LAN Manager) protocol to log
the client on.
In a Windows network, NTLM is a suite of Microsoft security protocols
that provides authentication, integrity, and confidentiality to users
 Problems arise when integrating Microsoft systems and UNIX systems.
 When logging on to a system from a Microsoft telnet client to UNIX
TELNET daemon service or vice versa, the user name and password are
sent over the network in plain text.
File Transfer Protocol(FTP)
21
 It allows users to connect to remote systems and transfer files
back and forth.
 As part of establishing a connection to a remote computer, FTP
relies on a user name and password combination for
authentication.
 Use of FTP poses a security problem similar to use of the Telnet
protocol because passwords typed to FTP are transmitted over
the network in plain text, one character per packet. These
packets can be intercepted.
 Another problem area for FTP is anonymous FTP.
Anonymous FTP allows users who do not have an account on a
computer to transfer files to and from a specific directory.
Contd.
22
 To use anonymous FTP, a user passes a remote computer
name as an argument to FTP and then specifies "anonymous"
as a user name.
 Problems with anonymous FTP are:
There is often no record of who has requested what information.
The threat of denial-of-service attacks. That is, For deliberate or
accidental denial-of-service attacks, authorized users may be
denied access to a system if too many file transfers are initiated
simultaneously.
 It is important to securely set up the anonymous FTP account
on the server because everyone on the network will have
potential access.
Trivial File Transfer Protocol(TFTP)
23
 It is a file transfer program that is frequently used to allow
diskless hosts to boot over the network.
 Microsoft Windows 2000 implements a client utility to make
use of TFTP services on UNIX flavors.
 Because TFTP has no user authentication, it may be possible
for unwanted file transfer to occur.
 The use of TFTP to steal password files is a significant threat.
Commands Revealing User Information
24
 It is not uncommon to find interoperability between
Microsoft products and various flavors of UNIX.
 Commands that reveal user and system information
pose a threat because crackers can use that information
to break into a system.
 Some of these commands whose output makes a
system vulnerable to break-ins include:
 Finger
 Rexec
Finger
25
 The finger client utility on Windows NT and Windows 2000 can
be used to connect to a finger daemon service running on a
UNIX-based computer to display information about users.
 When the finger client utility is invoked with a name argument,
the password file is searched on a UNIX server.
 Every user with a first name, last name, or user name that
matches the name argument is returned.
 When the finger program is run with no arguments, information
for every user currently logged on to the system is displayed.
 User information can be displayed for remote computers as well
as for the local computer.
Contd.
26
 The output of finger typically includes logon name, full name,
home directory, last logon time, and in some cases when the
user received mail and/or read mail.
 Personal information, such as telephone numbers, is often
stored in the password file so that this information is available
to other users.
 Making personal information about users available poses a
security threat because a password cracker can make use of
this information.
 In addition, finger can reveal logon activity.
Rexec
27
 The rexec utility is provided as a client on Microsoft Windows NT
and Windows 2000.
 The rexec client utility allows remote execution on UNIX-based
systems running the rexecd service.
 A client transmits a message specifying the user name, the
password, and the name of a command to execute.
 The rexecd program is susceptible to abuse because it can be
used to probe a system for the names of valid accounts.
 In addition, passwords are transmitted unencrypted over the
network.
Protocol Design
28
 Communication protocols sometimes have weak points.
Attackers use these to gain information and eventually gain
access to systems. Some known issues are:
 TCP/IP:- The TCP/IP protocol stack has some weak points
that allows:
 IP address spoofing
 TCP connection request (SYN) attacks
 ATM:- Security can be compromised by what is referred to as
"manhole manipulation“, direct access to network cables and
connections in underground parking garages and elevator
shafts.
Weak Password
29
 Password selection will always be a contentious point as long as
users have to select one.
 Users usually select commonly used passwords because they are
easy to remember, like anything from birthday to the names of
loved ones. This creates a vulnerability.
 A password is the key to a computer, a key much sought-after by
hackers, as a means of getting a foothold into a system.
 A weak password may give a hacker access not only to a computer,
but to the entire network to which the computer is connected.
 Users should treat their passwords like the keys to their homes.
 Switches and routers are easily managed by an HTTP Web
interface or through a command line interface.
 Coupled to the use of weak passwords it allows anybody with some
technical knowledge to take control of the device.
Modem
30
 If a computer has a modem connected to the Internet, the user
needs to take appropriate precautions because modem
connections can be a significant vulnerability.
 Hackers commonly use a tool known as a "war dialer" to identify
the modems at a target organization.
 A war dialer is a computer program that automatically dials phone
numbers within a specified range of numbers.
 Most organizations have a block of sequential phone numbers.
 By dialing all numbers within the targeted range, the war dialer
identifies which numbers are for computer modems and determines
certain characteristics of those modems.
 The hacker then uses other tools to attack the modem to gain
access to the computer network.
 Anyone can download effective war dialers from the Internet at no
Network Security In Action
31
Client
Configuration
DNS Network Services FTP/Telnet SMTP/POP Web Server
IP & Port
Scanning
Web Server
Exploit
Email Exploit DoS Attack Trojan Attack
Sniffing
Traffic
KeyStroke
Logging
Password
Cracking
MITM Attack
Hardening
Host
AntiVirus
Applications
Using
Firewall
Using
GPG/PGP
Using SSH
Using
Certificate
Using IPSec
System Log
Analysis
Intrusion
Detection
System
HoneyPot
Spyware
Detection and
Removal
Backup and
Restore
Finding
Hidden Data
NETWORK
PREVENT
DETECTION
VULNERABILITAS
Contd.
32
External
attacker
A network security design protects assets from threats and
vulnerabilities in an organized manner
To design security, analyze risks to your assets and create responses
Corporate Assets
Internal
attacker
Incorrect
permissionsVirus

More Related Content

What's hot

Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security FrameworkNada G.Youssef
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security ApplicationsHatem Mahmoud
 
Information Security Principles - Access Control
Information Security  Principles -  Access ControlInformation Security  Principles -  Access Control
Information Security Principles - Access Controlidingolay
 
Cybersecurity and Risk Management Technology
Cybersecurity and Risk Management TechnologyCybersecurity and Risk Management Technology
Cybersecurity and Risk Management TechnologyMohammad Febri
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptxkishore golla
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1AfiqEfendy Zaen
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptxGulnurAzat
 
Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptxssuserd24233
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanismspriya_trehan
 
Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)sayyed azam
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 pptvasanthimuniasamy
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Securitychauhankapil
 

What's hot (20)

Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security Applications
 
Information Security Principles - Access Control
Information Security  Principles -  Access ControlInformation Security  Principles -  Access Control
Information Security Principles - Access Control
 
Cybersecurity and Risk Management Technology
Cybersecurity and Risk Management TechnologyCybersecurity and Risk Management Technology
Cybersecurity and Risk Management Technology
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Communication security
Communication securityCommunication security
Communication security
 
Ethics in-information-security
Ethics in-information-securityEthics in-information-security
Ethics in-information-security
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptx
 
SECURITY SERVICES
SECURITY SERVICESSECURITY SERVICES
SECURITY SERVICES
 
Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptx
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
 

Similar to Computer Security Chapter 1

security system by desu star chapter 1.pptx
security system by desu star chapter 1.pptxsecurity system by desu star chapter 1.pptx
security system by desu star chapter 1.pptxdesalewminale
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to securityMukesh Chinta
 
PPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptxPPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptxPiBits
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1osama elfar
 
Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01ITNet
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxedgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxfathwaitewalter
 
What is Linux SecuritySolutionLinux Security is a module in.pdf
What is Linux SecuritySolutionLinux Security is a module in.pdfWhat is Linux SecuritySolutionLinux Security is a module in.pdf
What is Linux SecuritySolutionLinux Security is a module in.pdffederaleyecare
 
Security in network computing
Security in network computingSecurity in network computing
Security in network computingManoj VNV
 
System Security enviroment in operating system
System Security enviroment in operating system System Security enviroment in operating system
System Security enviroment in operating system Kushagr sharma
 
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptxCS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptxShreyaChavan28
 
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavurS.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavurvkarthi314
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)Zara Nawaz
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lectureZara Nawaz
 
Nw sec
Nw secNw sec
Nw secshivz3
 

Similar to Computer Security Chapter 1 (20)

Security Ch-1.pptx
Security Ch-1.pptxSecurity Ch-1.pptx
Security Ch-1.pptx
 
security system by desu star chapter 1.pptx
security system by desu star chapter 1.pptxsecurity system by desu star chapter 1.pptx
security system by desu star chapter 1.pptx
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
security IDS
security IDSsecurity IDS
security IDS
 
PPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptxPPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptx
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
 
Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
What is Linux SecuritySolutionLinux Security is a module in.pdf
What is Linux SecuritySolutionLinux Security is a module in.pdfWhat is Linux SecuritySolutionLinux Security is a module in.pdf
What is Linux SecuritySolutionLinux Security is a module in.pdf
 
I0516064
I0516064I0516064
I0516064
 
Security in network computing
Security in network computingSecurity in network computing
Security in network computing
 
System Security enviroment in operating system
System Security enviroment in operating system System Security enviroment in operating system
System Security enviroment in operating system
 
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptxCS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
 
Is4560
Is4560Is4560
Is4560
 
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavurS.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
ch01-4.ppt
ch01-4.pptch01-4.ppt
ch01-4.ppt
 
Nw sec
Nw secNw sec
Nw sec
 

Recently uploaded

Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Recently uploaded (20)

Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 

Computer Security Chapter 1

  • 1. Chapter One Introduction to Information Security Introduction to Information Security 1
  • 2. Information Security 2 Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. Information security = confidentiality + integrity + availability + authentication. well-informed sense of assurance that the information risks and controls are in balance. The terms information security, computer security and information assurance are frequently incorrectly used interchangeably.
  • 3. Contd. 3  Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms.  Computer security can focus on ensuring the availability and correct operation of a computer system without concern for the information stored or processed by the computer.  Information security offers many areas for specialization including: securing network(s) and allied infrastructure, securing applications and databases, security testing, information systems auditing, business continuity planning and digital forensics
  • 4. Basic Security Terminology(concepts) 4  Network security terms are the foundation for any discussion of network security and are the elements used to measure the security of a network.  Some of these terms or concepts include:- 1. Identification:- is simply the process of identifying one's self to another entity or determining the identity of the individual or entity with whom you are communicating. 2. Authentication:- is the assurance that the communicating entity is the one that it claims to be.  Authentication serves as proof that you are who you say you are or what you claim to be.  Authentication is required when communicating over a network or
  • 5. Contd. 5  When communicating over a network you should ask yourself two questions: 1) With whom am I communicating? 2) Why do I believe this person or entity is who he, she, or it claims to be?  When logging onto a network, three basic schemes are used for authentication:  Something you know  Something you have  Something you are
  • 6. Contd. 6 3. Access Control(Authorization):- refers to the ability to control the level of access that individuals or entities have to a network or system and how much information they can receive.  Your level of authorization basically determines what you're allowed to do once you are authenticated and allowed access to a network, system, or some other resource such as data or information.  Access control is the determination of the level of authorization to a system, network, or information (i.e., classified, secret, or top- secret).
  • 7. Contd. 7 4. Confidentiality:- can also be called privacy or secrecy and refers to the protection of information from unauthorized disclosure.  Usually achieved either by restricting access to the information or by encrypting the information so that it is not meaningful to unauthorized individuals or entities. 5. Availability:- refers to whether the network, system, hardware, and software are reliable and can recover quickly and completely in the event of an interruption in service.  Ideally, these elements should not be susceptible to denial
  • 8. Contd. 8 6. Data Integrity:- refers to the assurance of data received are exactly as sent by an authorized entity.  Data integrity is achieved by preventing unauthorized or improper changes to data, ensuring internal and external consistency, and ensuring that other data attributes (such as timeliness and completeness) are consistent with requirements. 7. Accountability:- refers to the ability to track or audit what an individual or entity is doing on a network or system.  Does the system maintain a record of functions performed, files
  • 9. Contd. 9 8. Non-Repudiation:- refers to the ability to prevent individuals or entities from denying (repudiating) that information, data, or files were sent or received or that information or files were accessed or altered, when in fact they were.  is crucial to e-commerce.
  • 10. Contd. 10 8. Non-Repudiation:- refers to the ability to prevent individuals or entities from denying (repudiating) that information, data, or files were sent or received or that information or files were accessed or altered, when in fact they were.  is crucial to e-commerce.
  • 11. Computer Security  While computer systems today have some of the best security systems ever, they are more vulnerable than ever before.  Computer and network security comes in many forms, including encryption algorithms, access to facilities, digital signatures, and using fingerprints and face scans as passwords.  The OSI security architecture provides a systematic frame work for defining security attacks, mechanisms and services. The OSI security architecture focuses on security attacks, mechanisms and services.  Security attack:- Any action that compromises the security of information owned by an organization.  Security mechanism:- A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack.  Security service:- A processing or communication service that enhances 11
  • 12. Contd.  Computer Security:- generic name for the collection of tools designed to protect data and to hackers from attacking the organizational assets.  “The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/data, and 12
  • 13. Contd. 13  Network Security:- measures to protect data during their transmission over the network.  Internet Security:- measures to protect data during their transmission over a collection of interconnected networks(network of networks)
  • 14. Why Is Computer and Network Security Important? 14 1. To protect company assets:- One of the primary goals of computer and network security is the protection of company assets (hardware, software and/or information). 2. To gain a competitive advantage:- Developing and maintaining effective security measures can provide an organization with a competitive advantage over its competition 3. To comply with regulatory requirements and fiduciary responsibilities:- organizations that rely on computers for their continuing operation must develop policies and procedures that address organizational security requirements.  Such policies and procedures are necessary not only to protect company assets but also to protect the organization from liability
  • 15. 15 Vulnerabilities(Attack Surface)  are weak points or loopholes in security that an attacker can exploit in order to gain access to the network or to resources on the network.  The vulnerability is not the attack, but rather the weak point that is exploited.  Vulnerability is the intersection of three elements: 1. A system susceptibility or flaw, 2. attacker access to the flaw, and 3. attacker capability to exploit the flaw  To be vulnerable, an attacker must have at least one applicable tool or technique that can connect to a system weakness.  A security risk may be classified as a vulnerability. But there
  • 16. Contd. 16  A vulnerability with one or more known instances of working and fully-implemented attacks is classified as an exploitable vulnerability, a vulnerability for which an exploit exists. Fig Threat agents, attack vectors, weakness, controls, IT asset and business impact
  • 17. Vulnerability Classification 17  Vulnerabilities are classified according to the asset class they related to: 1. Hardware  susceptibility to humidity  susceptibility to dust  susceptibility to soiling  susceptibility to unprotected storage 2. Software  insufficient testing  lack of audit trail
  • 18. Contd. 18 3. Network  Unprotected communication lines  Insecure network architecture 4. Personnel  inadequate recruiting process  inadequate security awareness 5. Site  area subject to flood  unreliable power source 6. Organizational  lack of regular audits  lack of continuity plans
  • 19. Vulnerabilities in Common Network Access Procedures & Protocols 19  The primary protocol used in operating systems today is the TCP/IP protocol stack.  The wide use of this protocol helps to integrate different operating system architectures such as Microsoft and UNIX.  Many organizations make use of this interoperability and use various TCP/IP utilities to run programs, transfer information, and reveal information.  Due to the nature of these utilities, various security risks and threats exist.  Users often use the same passwords for mixed environments.  Sometimes, passwords are automatically synchronized.  If hackers can crack the password on systems other than Microsoft systems, they could also use that password to logon to a Microsoft
  • 20. Telnet 20  The Telnet protocol allows a user to log onto a system over the network and use that system as though the user was sitting at a terminal that was directly connected.  The telnet command provides a user interface to a remote system.  When using the Microsoft telnet client to log on to the Microsoft Windows 2000 Telnet service, it uses the NTLM(NT LAN Manager) protocol to log the client on. In a Windows network, NTLM is a suite of Microsoft security protocols that provides authentication, integrity, and confidentiality to users  Problems arise when integrating Microsoft systems and UNIX systems.  When logging on to a system from a Microsoft telnet client to UNIX TELNET daemon service or vice versa, the user name and password are sent over the network in plain text.
  • 21. File Transfer Protocol(FTP) 21  It allows users to connect to remote systems and transfer files back and forth.  As part of establishing a connection to a remote computer, FTP relies on a user name and password combination for authentication.  Use of FTP poses a security problem similar to use of the Telnet protocol because passwords typed to FTP are transmitted over the network in plain text, one character per packet. These packets can be intercepted.  Another problem area for FTP is anonymous FTP. Anonymous FTP allows users who do not have an account on a computer to transfer files to and from a specific directory.
  • 22. Contd. 22  To use anonymous FTP, a user passes a remote computer name as an argument to FTP and then specifies "anonymous" as a user name.  Problems with anonymous FTP are: There is often no record of who has requested what information. The threat of denial-of-service attacks. That is, For deliberate or accidental denial-of-service attacks, authorized users may be denied access to a system if too many file transfers are initiated simultaneously.  It is important to securely set up the anonymous FTP account on the server because everyone on the network will have potential access.
  • 23. Trivial File Transfer Protocol(TFTP) 23  It is a file transfer program that is frequently used to allow diskless hosts to boot over the network.  Microsoft Windows 2000 implements a client utility to make use of TFTP services on UNIX flavors.  Because TFTP has no user authentication, it may be possible for unwanted file transfer to occur.  The use of TFTP to steal password files is a significant threat.
  • 24. Commands Revealing User Information 24  It is not uncommon to find interoperability between Microsoft products and various flavors of UNIX.  Commands that reveal user and system information pose a threat because crackers can use that information to break into a system.  Some of these commands whose output makes a system vulnerable to break-ins include:  Finger  Rexec
  • 25. Finger 25  The finger client utility on Windows NT and Windows 2000 can be used to connect to a finger daemon service running on a UNIX-based computer to display information about users.  When the finger client utility is invoked with a name argument, the password file is searched on a UNIX server.  Every user with a first name, last name, or user name that matches the name argument is returned.  When the finger program is run with no arguments, information for every user currently logged on to the system is displayed.  User information can be displayed for remote computers as well as for the local computer.
  • 26. Contd. 26  The output of finger typically includes logon name, full name, home directory, last logon time, and in some cases when the user received mail and/or read mail.  Personal information, such as telephone numbers, is often stored in the password file so that this information is available to other users.  Making personal information about users available poses a security threat because a password cracker can make use of this information.  In addition, finger can reveal logon activity.
  • 27. Rexec 27  The rexec utility is provided as a client on Microsoft Windows NT and Windows 2000.  The rexec client utility allows remote execution on UNIX-based systems running the rexecd service.  A client transmits a message specifying the user name, the password, and the name of a command to execute.  The rexecd program is susceptible to abuse because it can be used to probe a system for the names of valid accounts.  In addition, passwords are transmitted unencrypted over the network.
  • 28. Protocol Design 28  Communication protocols sometimes have weak points. Attackers use these to gain information and eventually gain access to systems. Some known issues are:  TCP/IP:- The TCP/IP protocol stack has some weak points that allows:  IP address spoofing  TCP connection request (SYN) attacks  ATM:- Security can be compromised by what is referred to as "manhole manipulation“, direct access to network cables and connections in underground parking garages and elevator shafts.
  • 29. Weak Password 29  Password selection will always be a contentious point as long as users have to select one.  Users usually select commonly used passwords because they are easy to remember, like anything from birthday to the names of loved ones. This creates a vulnerability.  A password is the key to a computer, a key much sought-after by hackers, as a means of getting a foothold into a system.  A weak password may give a hacker access not only to a computer, but to the entire network to which the computer is connected.  Users should treat their passwords like the keys to their homes.  Switches and routers are easily managed by an HTTP Web interface or through a command line interface.  Coupled to the use of weak passwords it allows anybody with some technical knowledge to take control of the device.
  • 30. Modem 30  If a computer has a modem connected to the Internet, the user needs to take appropriate precautions because modem connections can be a significant vulnerability.  Hackers commonly use a tool known as a "war dialer" to identify the modems at a target organization.  A war dialer is a computer program that automatically dials phone numbers within a specified range of numbers.  Most organizations have a block of sequential phone numbers.  By dialing all numbers within the targeted range, the war dialer identifies which numbers are for computer modems and determines certain characteristics of those modems.  The hacker then uses other tools to attack the modem to gain access to the computer network.  Anyone can download effective war dialers from the Internet at no
  • 31. Network Security In Action 31 Client Configuration DNS Network Services FTP/Telnet SMTP/POP Web Server IP & Port Scanning Web Server Exploit Email Exploit DoS Attack Trojan Attack Sniffing Traffic KeyStroke Logging Password Cracking MITM Attack Hardening Host AntiVirus Applications Using Firewall Using GPG/PGP Using SSH Using Certificate Using IPSec System Log Analysis Intrusion Detection System HoneyPot Spyware Detection and Removal Backup and Restore Finding Hidden Data NETWORK PREVENT DETECTION VULNERABILITAS
  • 32. Contd. 32 External attacker A network security design protects assets from threats and vulnerabilities in an organized manner To design security, analyze risks to your assets and create responses Corporate Assets Internal attacker Incorrect permissionsVirus