You are on page 1of 36

COMPUTER SYSTEM

SECURITY
COMPUTER SYSTEM
• Combination of various components.

• Process data to convert in useful form and able to store as files


permanently.

• Files are eligible to view in future and modifications too.

• Group of Hardware, Software to make a useful and complete


Machine.

• Set of Hardware and software are interdependent.


Characteristics

Speed,

Automation,

Accuracy,

Permanent Storage,

Versatility
Computer Security

The protection of Computer Systems and information from harm, theft, and
unauthorized use.
Computer security has become increasingly important since the late 1960.

***Modem Implementation***

Problem because they enabled Hackers (irresponsible computerphiles) to


illegally access major computer systems from the privacy of their homes.
Elements of Computer Security
Element 1: Confidentiality

Preventing sensitive information from unauthorized access attempts is


referred as Confidentiality.

Common for data to be categorized according to the amount & type of


damage.
Element 2: Integrity

Maintaining the consistency , accuracy, & trustworthiness of data over it’s


entire life cycle.

Changes must be performed in predefined steps to ensure data integrity.


Element 3: Authenticity

Refers to the state of being genuine , verifiable.

Important for fault isolation detection.

Design system in a way as, when “something bad” will happen , the
negative consequence are limited in scope.

“Limitation of scope regarding problems reduces the potential for


damage and makes system easier to maintain.”
Element 4: Availability

Information should be consistently and readily accessible for


authorized parties.

Need maintaining Hardware and Technical infrastructure and system


that holds & display the information.
Element 5: Utility

Collection of software programs that add functionality to the Computer .

Help Computer to perform task much better and secure.

Includes - - -
*** Antivirus,
*** Backup Disk,
*** Repair,
*** File Management &
*** Networking programs.

20/09= 2D
Hacking

Hacking is the process of illegally breaking into someone’s websites/ server &

getting hold of sensitive information related to website.

Hacker hacking website, become able to control the website’s content,

management & security.


Attack Hack

An action directed against Unauthorized way to use other

Computer System to disrupt user’s data in-order to steal,

operations, change, processing or damage, change information…

corrupt stored data scanning…


Error 404 Hacking digital India part 1 chase

Tells a web user about a requested page , as it is not available.

It is a HTTP status code that means , the page you were trying to reach on a
website couldn't be found on their server.

Here, “Hacking digital India part 1 chase” the cyber crime and cyber attacks
hack the information of users like bank details and personal information.

Attacker or Hacker creates an attractive video so that victim gets attracted and
Error 404 Hacking digital India part 1 chase
cont.…

When , a video has played then during buffering , hacker can know the current
location and GPS history and got complete access to our private data.

This error can be displayed in various forms , as-

*Private data->Contacts , text messages , WhatsApp


Cardand most importantly
Verification Value our
bank details , including our CVV number.*
Computer Security

The protection of Computer Systems and information from harm, theft, and
unauthorized use.
Computer security has become increasingly important since the late
“1960.”

MODEM Implementation
A Modem (modulator-demodulator) is a device that modulates an analog
signal to digital information.
Problem --- Enabled Hackers to illegally access major computer systems from the privacy
of their homes.
Attack

An assault on system security & deliberate attempt to evade (being


away) security services and violate the security policy of a system.

Scan of QR code!!!

QR - Quick Response
Active Attack

Major damage to an organization’s resource as try to alter system


resources. May also affect , how they work!

Involve some modification.

Types:
DoS
Masquerade
Modification of message
Replay
Passive Attack

Information is obtained , even without affecting system.


A higher n/w attack which monitors system and sometimes
scan for vulnerabilities .
Types:
Traffic analysis
Eavesdropping
Foot printing
Spying
War driving
Goals of Attacker

Attacker have strongly two main goals:

 Takeover the target machine (for example the web server).

 Execute arbitrary code on target by hijacking application control flow.


Active Attack

Major damage to an organization’s resource as try to alter system


resources. May also affect , how they work!

Involve some modification.

Types:
DoS
Masquerade
Modification of message
Replay
Passive Attack

Information is obtained , even without affecting system.


A higher n/w attack which monitors system and sometimes scan for
vulnerabilities (Weakness ).
Types:
Traffic analysis,
Eavesdropping,
Foot printing,
Spying, &
War driving
Hijacking

Minor version of hacking, as the data within the servers are still intact and
not compromised.

Kind of network security attack in which the attacker takes control of a


communication.

Attacker takes control of computer systems, software programs and/or


network communications.

The attacker uses a program that appears to be the server to the client
and appears to be the client to the server.
Hijacking Attacks
Hijacking is a type of network security attack .

Here, attacker takes control of communication as an owner. For eg., two


entities are communicating ,whereas 1 may masquerade(Hidden way) as
one of them.

Hijacking attacks involves an attacker intercepting packets between 2


components on a SAN and taking control of the session between them by
inserting their own packets onto the SAN.
(Storage Area Network)
?
28-09-22

Control Hijacking
It prevents Hijacking Attacks.

Hijacking is a type of network security attack in which the attacker takes control
of a communication .

Attackers takeover target machine ( for example web server ) or execute


arbitrary code on target by hijacking application control flow in control
hijacking .

Add runtime code over here to detect overflow exploits.


Types of Control Hijacking

1. Integer overflow attacks,

2. Buffer overflow attacks ,

3. Format string vulnerabilities.


Defences against ***Buffer overflow*** attack

As we know the programming language is Crucial, as following


are most important points regarding it:

 Should be strongly typed.

 Should be automatic bound checks.

 Should do automatic memory management.


Integer Overflow Attack
 An integer overflow occurs when you attempt to store inside an integer
variable a value that is larger than the maximum value the variable can hold.

 The C standard defines this situation as undefined behavior .It can cause
the value to wrap and become negative.

 When an arithmetic operation outputs a numeric value that falls outside


allocated memory space or overflows the range of the given value of the
integer.

 Which violates the program's assumption and may lead to unexpected


behavior .
Integer Overflow Attack cntd.…

The System may have the issue of range and requires more
space , then Compiler may –

completely ignore the error caused, or


abort the program.

 Example: 8-bit integer addition of 127 + 1 results in −128 (


2’s complement of 128).
Buffer Overflow Attack
Buffers are memory storage regions that temporarily hold data while
it is being transferred from one location to another.
Buffer overflows can affect all types of software.
A buffer overflow (or buffer overrun) occurs when the volume of
data exceeds the storage capacity of the memory buffer.
As because the Program, which is attempting to write the data to
the buffer overwrites adjacent memory locations.
Attackers exploit buffer overflow issues by overwriting the memory
of an application.
H/W

Format String Vulnerabilities ?


Defense (?) against Control Hijacking

 Complete memory safety can defend against all control


hijacking attacks by protecting all pointers.

 Various defensive mechanisms have been proposed to


mitigate control-flow hijacking attacks.
Defences against Control Hijacking Contd…

A control hijacking can be viewed as an attack that exploits


(selfish way) a program error.

Center is memory corruption , at application runtime to


subvert (throw down) the intended control flow of a program.

Code reuse attacks ,Buffer overflows are one of Control


hijacking attacks
Run time Défense
In order to prevent data loss, prevent data theft, minimize employee
downtime, and maximize IT productivity.

Businesses need an additional line of preventative(Precautionary)


defense that can block attacks that antivirus doesn’t.

A well worked “Runtime Malware Defense” offers a promising solution


that works by detecting and blocking malware and exploits at runtime.

Individual benefit (self)


Control in Hijacking Attacks
A control hijack attack is carried out by overwriting part of the
data structures of a victim program.

These types of attacks eventually lead to the corruption or


overwriting of the data they were holding.

This Attack subverts a program's intended control flow by


exploiting a program fault, typically a memory corruption
vulnerability, at runtime.
Control hijacking attacks

Stack smashing,( Destruction)

?
Heap spraying, &

Use after free.


Control hijacking attacks !

Stack smashing: Overwrite return address or function


pointer .

Heap spraying: Reliably exploit a heap overflow.

Use after free: Attacker writes to freed control structure,


which then gets used by victim program.

You might also like