Computer Security Chapter 1
Computer Security Chapter 1
Introduction to Computer
Security
Outline
• What is Security?
▪ “the quality or state of being secure or be free from danger.”
▪ protection against adversaries:-from those who would do harm, intentionally
with a certain objective.
• Security is about
▪ Threats (bad things that may happen)
▪ Vulnerabilities (weaknesses in your defenses)
▪ Attacks (ways in which the threats may be actualized) and
▪ Mechanisms to tackle attacks
Computer Security
What is Computer Security?
• Protection afforded to an automated information system.
▪ protection of computer against intruders (e.g hackers) and malicious software
• Deals with procedures and policies adopted to protect our digital assets and
properties.
• Privacy means that your data, such as personal files and e-mail messages, is
not accessible by anyone without your permission.
• Privacy deals with the measures that you can take to restrict access to your
data.
Why Computer Security?
• Protect organizations and companies data and asset from insider and outsider
attack
• Prevent unauthorized people from accessing our valued information’s, to
manipulate with it or steal it.
• Protect your sensitive data from natural disaster and accidental risks by using
business continuity and disaster recovery management.
• Regulatory compliance: adherence to laws, regulations, guidelines and
specifications relevant to its business processes.
• Thwart identity theft etc.
Growth of cyber crime cost
Challenges of Computer Security
• In developing a particular security mechanism or algorithm, one must
always consider potential security threats and attacks on different
security features.
• Having designed various security mechanisms, it is necessary to
decide where to use them.
• Security mechanisms typically involve more than a particular
algorithm or protocol.
• Security requires regular, even constant, monitoring, and this is
difficult in today’s short-term, overloaded environment.
• Lack of awareness about information security
Aspects of Computer/IS Security
The 3 aspects of computer/information security are:
▪ Security attack: Any action that compromises the security of information
owned by an organization.
▪ Security mechanism: A process (or a device incorporating such a process)
that is designed to detect, prevent, or recover from a security attack.
o Examples: encryption, digital signature, IDS, access control e.t.c
▪ Security service: A processing or communication service that enhances the
security of the data processing systems and the information transfers of an
organization.
Security Requirements/Services
• Are intended to counter security attacks, and they make use of
one or more security mechanisms to provide the service.
• The main objectives/goal of computer security is preserving the
CIA triad
Secure
Cont..
• Confidentiality
• Integrity
• Availability
• Authentication
• Non-repudiation
• Accountability etc.
Confidentiality
• protect unauthorized discloser of information
• the assurance that information is not disclosed to
unauthorized persons, processes or devices
• This can cover two aspects:
▪ protecting information stored in files
▪ protecting information while in transmission
• Example:
▪ An employee should not come to know the salary of his
manager
▪ The target coordinates of a missile should not be improperly
disclosed.
Integrity
Hardware • Personnel
▪ susceptibility to humidity ▪ inadequate recruiting process
▪ susceptibility to dust ▪ inadequate security awareness
▪ susceptibility to soiling etc. • Physical site
Software ▪ area subject to flood, unreliable power source
etc.
▪ insufficient testing, lack of audit trail
• Organizational
▪ design flaw
▪ lack of regular audits
Network
▪ lack of continuity plans , lack of security
▪ unprotected communication lines
etc.
▪ insecure network architecture
Cont..
▪ Threat
▪ A set of circumstances that has the potential to cause harm or lose
▪ Can be natural, human or process threat
▪ Control
• An action, device or procedure or technique that eliminate or reduce
vulnerability
• Also called countermeasure (Physical, Administrative and Technical )
Security Management and Risk Analysis
Risk