You are on page 1of 51

Chapter 1

Fundamentals of computer security &


privacy
 Overview: history, vulnerabilities,
countermeasures, physical security
Computer Security and Privacy

“The
most secure
computers are those
not connected
to the Internet and
shielded
from any interference”
Computer Security and Privacy

Computer
Computer security
security isis about
about
provisions
provisions and
and policies
policies adopted
adopted to to
protect
protect information
information andand property
property
from
from theft,
theft, corruption,
corruption, or
or natural
natural
disaster
disaster while
while allowing
allowing the the
information
information and
and property
property to
to remain
remain
accessible
accessible and
and productive
productive to to its
its
intended
intended users.
users.
Computer Security and Privacy
Network
Network security
security on
on the
the other
other hand
hand deals
deals with
with
provisions
provisions and
and policies
policies adopted
adopted toto prevent
prevent and
and
monitor
monitor unauthorized
unauthorized access,
access, misuse,
misuse, modification,
modification, or
or
denial
denial ofof the
the computer
computer network
network and
and network-
network-
accessible
accessible resources.
resources.

Not Sufficient!!

Internet
Internet
Computer Security and Privacy
Security Goals

Confidentiality

Integrity
Availaibility
Computer Security and Privacy
Assignment:
Assignment:
Spoofing
SpoofingAttack
Attack GROUP
GROUP11
Brut
BrutForce
ForceAttack:
Attack:GROUP
GROUP22
•• Form
Formaagroup
groupof ofthree.
three. Malware
MalwareAttack:
Attack:GROUP
GROUP33
•• Read
Readabout
aboutthese
thesesecurity
security Virus/Worm
Virus/Worm Attack:
Attack:GROUP
GROUP44
attack
attackrelated
relatedkeywords
keywordsandand SMURF
SMURFAttack:
Attack:GROUP
GROUP55
write
writeaaone
onepage
page(maximum)
(maximum) SYN
SYNAttack:
Attack:GROUP
GROUP66
summary
summaryof ofyour
yourfindings
findings
including Trojan
TrojanHorse:
Horse:GROUP
GROUP77
includingany
anyrecorded
recorded
history Logic
LogicBomb:
Bomb:GROUP
GROUP88
historyof
ofsignificant
significant
damages Ping
PingofofDeath:
Death:GROUP
GROUP99
damagescreated
createdby bythese
these
attacks. Packet
PacketSniffing
Sniffing: :GROUP
GROUP10 10
attacks.
•• Send
Sendyour
yourreport
reportbybyemail
emailinin
Eavesdropping:
Eavesdropping:GROUPGROUP11 11
word Cracking:
Cracking:GROUP
GROUP12
wordformat
formatininaaweek.
week. 12
Session
SessionHijacking:
Hijacking:GROUP
GROUP13 13
DoS/DDoS
DoS/DDoS: :GROUP
GROUP 14 14
Blackout/
Blackout/Brownout:
Brownout:GROUP
GROUP15 15
Serge/Spike:
Serge/Spike:GROUP
GROUP16 16
Traffic
TrafficAnalysis:
Analysis:GROUP
GROUP17 17
Wire
WireTapping:
Tapping:GROUP
GROUP18 18
War
WarDialing:
Dialing:GROUP
GROUP19 19
Computer Security and Privacy/ Overview
Definitions
Security:
Security: The
The prevention
prevention and
and protection
protection ofof computer
computer
assets
assets from
from unauthorized
unauthorized access,
access, use,
use, alteration,
alteration,
degradation,
degradation,destruction,
destruction,and
andother
otherthreats.
threats.

Privacy:
Privacy: The
The right
right of
of the
the individual
individual to
to be
be protected
protected
against
against intrusion
intrusion into
into his
his personal
personal life
life or
or affairs,
affairs, or
or
those
those of
of his
his family,
family, byby direct
direct physical
physical means
means or or by
by
publication
publicationofofinformation.
information.

Security/Privacy
Security/Privacy Threat:
Threat: Any
Any person,
person, act,
act, or
or object
object
that
thatposes
posesaadanger
dangerto
tocomputer
computersecurity/privacy.
security/privacy.
Computer Security and Privacy/ History

Until
Until 1960s
1960s computer
computer security
security was
was limited
limited to
to
physical
physical protection
protection of
of computers
computers
In
In the
the 60s
60s and
and 70s
70s

Evolutions
Evolutions
Computers
Computersbecame
becameinteractive
interactive
Multiuser/Multiprogramming
Multiuser/Multiprogrammingwas wasinvented
invented
More
More and
and more
more data
data started
started to
to be
be stored
stored in
in computer
computer
databases
databases

Organizations
Organizationsand andindividuals
individualsstarted
startedto worryabout
toworry about
What
Whatthe
theother
otherpersons
personsusing
usingcomputers
computersare aredoing
doingto totheir
their
data
data
What
What isis happening
happening toto their
their private
private data
data stored
stored inin large
large
databases
databases
Computer Security and Privacy/ History

In
In the
the 80s
80s and
and 90s
90s

Evolutions
Evolutions
Personal
Personalcomputers
computerswere
werepopularized
popularized
LANs
LANsandandInternet
Internetinvaded
invadedthe
theworld
world
Applications
Applicationssuch
suchasasE-commerce,
E-commerce,E-government
E-governmentand
and
E-health
E-healthstarted
startedto
todevelop
develop
Viruses
Virusesbecame
becamemajor
majorthreats
threats

Organizations
Organizationsand
andindividuals
individualsstarted
startedto
toworry
worryabout
about

Who
Whohas
hasaccess
accessto
totheir
theircomputers
computersand
anddata
data

Whether they can trust a mail, a website, etc.
Whether they can trust a mail, a website, etc.

Whether
Whethertheir
theirprivacy
privacyisisprotected
protectedin
inthe
theconnected
connectedworld
world
Computer Security and Privacy/ History

Famous
Famous security
security problems
problems

Morris worm––Internet
Morrisworm InternetWorm
Worm
November
November 2,2, 1988 1988 aa worm
worm attacked
attacked more
more than
than 60,000
60,000
computers
computersaround
aroundthe theUSA
USA
The
Theworm
wormattacks
attackscomputers,
computers,and
andwhen
whenitithas
hasinstalled
installeditself,
itself,itit
multiplies
multipliesitself,
itself,freezing
freezingthe
thecomputer
computer

Robert
Robert Morris
Morris became
became the the first person to
first person to be
be indicted
indicted
under
underthe
theComputer Fraudand
ComputerFraud andAbuse
AbuseAct.
Act.

He
He was
was sentenced
sentenced to
to three
three years
years of
of probation,
probation, 400
400 hours
hours of
of
community
communityservice
serviceand
andaafine
fineof
of$10,050
$10,050

He
He isis currently
currently an an associate
associate professor
professor at
at the
the
Massachusetts
MassachusettsInstitute
Instituteof
ofTechnology
Technology(MIT)
(MIT)
Computer Security and Privacy/ History

Famous
Famous security
security problems
problems …


NASA shutdown
NASA shutdown

In
In1990,
1990,an
anAustralian
Australian computer
computerscience
sciencestudent
student was
was
charged
charged for
forshutting
shutting down
down NASA’s
NASA’s computer
computer system
system
for
for24
24hours
hours

Airline computers
Airline computers
In
In 1998,
1998, aa major
major travel
travel agency
agency discovered
discovered thatthat
someone
someone penetrated
penetrated itsits ticketing
ticketing system
system and and has
has
printed
printedairline
airlinetickets
ticketsillegally
illegally

Bank theft
Bank theft
In
In 1984,
1984, aa bank
bank manager
manager waswas able
able to
to steal
steal $25
$25million
million
through
throughun-audited
un-auditedcomputer
computertransactions
transactions
Computer Security and Privacy/ History

Famous
Famous security
security problems
problems …

 InEthiopia
In Ethiopia

Employees of
Employees of aa company
company managed
managed to
to change
change their salaries by
their salaries by
fraudulently
fraudulentlymodifying
modifyingthe
thecompany’s
company’sdatabase
database

InIn1990s
1990sInternet
Internetpassword
passwordtheft
theft
Hundreds
Hundreds ofof dial-up
dial-up passwords
passwords were
were stolen
stolen and
and sold
sold to
to
other
otherusers
users
Many
Manyofofthe
theowners
ownerslost
losttens
tensof
ofthousands
thousandsof ofBirr
Birreach
each

AA major
major company
company suspended
suspended the
the use
use of
of aa remote login software
remote login software by
by
technicians
technicians who
who were
were looking at the
looking at the computer
computer of
of the
the General
General
Manager
Manager
 InAfrica:
In Africa:Cote
Coted’Ivoire
d’Ivoire

An
Anemployee
employeewho
whohas
hasbeen
beenfired
firedby
byhis
hiscompany
companydeleted
deletedall
allthe
the
data
datain
inhis
hiscompany’s
company’scomputer
computer
Computer Security and Privacy/ History

Early
Early Efforts
Efforts

1960s:
1960s: Marked
Marked as
as the
the beginning
beginning of
of true
true
computer
computer security
security

1970s:
1970s: Tiger
Tiger teams
teams

Government and
Government and industry
industry sponsored
sponsored crackers
crackers who
who
attempted
attempted to
to break
break down
down defenses
defenses ofof computer
computer systems
systems in
in
order
order to
to uncover
uncover vulnerabilities
vulnerabilities so
so that
that patches
patches can
can be
be
developed
developed

1970s:
1970s: Research
Research and
and modeling
modeling

Identifying
Identifyingsecurity
securityrequirements
requirements

Formulating security policy models
Formulating security policy models

Defining
Definingrecommended
recommendedguidelines
guidelinesand
andcontrols
controls

Development
Developmentofofsecure
securesystems
systems
Computer Security and Privacy/ Legal Issues
In
In the
the US,
US, legislation
legislation was
was enacted
enacted with
with regards
regards toto
computer
computer security
security and
and privacy
privacy starting
starting from
from late
late
1960s.
1960s.
European
European Council
Council adopted
adopted aa convention
convention on
on Cyber-
Cyber-
crime
crime in
in 2001.
2001.
The
The World
World Summit
Summit for for Information
Information Society
Society
considered
considered computer
computer security
security and
and privacy
privacy as
as aa
subject
subject of
of discussion
discussion in
in 2003
2003 and
and 2005.
2005.
The
The Ethiopian
Ethiopian Penal
Penal Code
Code ofof 2005
2005 has
has articles
articles on
on
data
data and
and computer
computer related
related crimes.
crimes.
Computer Security and Privacy/Attacks

Categories
Categories of
of Attacks
Attacks

Interruption:
Interruption: An
An attack
attack on
on availability
availability

Interception:
Interception: An
An attack
attack on
on confidentiality
confidentiality

Modification:
Modification: An
An attack
attack on
on integrity
integrity

Fabrication:
Fabrication: An
An attack
attack on
on authenticity
authenticity
Computer Security and Privacy/Attacks

Categories
Categoriesof
ofAttacks/Threats
Attacks/Threats(W.
(W.Stallings)
Stallings)
Source

Destination
Normal flow of information
Attack

Interruption Interception

Modification Fabrication
Computer Security and Privacy/Vulnerabilities

Types
Types of
of Vulnerabilities
Vulnerabilities

Physical
Physicalvulnerabilities
vulnerabilities(Ex.
(Ex.Buildings)
Buildings)

Natural
Naturalvulnerabilities
vulnerabilities(Ex.
(Ex.Earthquake)
Earthquake)

Hardware
Hardwareand
andSoftware
Softwarevulnerabilities
vulnerabilities(Ex.
(Ex.Failures)
Failures)

Media
Mediavulnerabilities
vulnerabilities(Ex.
(Ex.Disks
Diskscan
canbe
bestolen)
stolen)

Communication
Communicationvulnerabilities
vulnerabilities(Ex.
(Ex.Wires
Wirescan
canbe
betapped)
tapped)

Human
Humanvulnerabilities
vulnerabilities(Ex.
(Ex.Insiders)
Insiders)
Computer Security and Privacy/ Countermeasures

Computer
Computer security
security controls
controls

Authentication
Authentication (Password,
(Password, Cards,
Cards,
Biometrics)
Biometrics)
(What
(What we
we know,
know, have,
have, are!)
are!)

Encryption
Encryption

Auditing
Auditing

Administrative
Administrative procedures
procedures

Standards
Standards

Certifications
Certifications

Physical
Physical Security
Security
Computer Security and Privacy/ The Human Factor

The
The human factor is
human factor is an
an important
important component
component ofof
computer
computer security
security
Some
Some organizations
organizations viewview technical solutions as
technical solutions as
“their
“their solutions”
solutions” for
for computer
computer security.
security. However:
However:

Technologyisisfallible
Technology fallible(imperfect)
(imperfect)

Ex.
Ex.UNIX
UNIXholes
holesthat
thatopened
openedthe
thedoor
doorfor
forMorris
Morrisworm
worm

The
Thetechnology
technologymay notbe
maynot beappropriate
appropriate

Ex.
Ex.ItItisisdifficult
difficultto
todefine
defineall
allthe
thesecurity
securityrequirements
requirementsand
andfind
find
aasolution
solutionthat
thatsatisfies
satisfiesthose
thoserequirements
requirements

Technical
Technicalsolutions
solutionsare
areusually
usually(very)
(very)expensive
expensive

Ex.
Ex.Antivirus
Antiviruspurchased
purchasedby byETC
ETCtotoprotect
protectits
itsInternet
Internetservices
services

Given
Givenall
allthese,
these,someone,
someone,aahuman,
human,has
hasto
toimplement
implementthethesolution
solution
Computer Security and Privacy/ The Human Factor

Competence of
Competence of the
the security
security staff
staff

Ex.
Ex.Crackers
Crackersmay
mayknow
knowmore
morethan
thanthe
thesecurity
securityteam
team
Understanding
Understanding and support of
and support of management
management

Ex.
Ex. Management
Management does
does not
not want
want to
to spend
spend money
money on
on
security
security
Staff’s discipline to
Staff’s discipline to follow
follow procedures
procedures

Ex.
Ex.Staff
Staffmembers
memberschoose
choosesimple
simplepasswords
passwords
Staff
Staff members
members may not be
may not be trustworthy
trustworthy

Ex.
Ex.Bank
Banktheft
theft
Computer Security and Privacy/ Physical Security

“The most robustly secured


computer that is left sitting
unattended in an unlocked room
is not at all secure !!”
[Chuck Easttom]
Computer Security and Privacy/ Physical Security

Physical
Physical security
security isis the
the use
use ofof physical controls to
physical controls to
protect
protect premises,
premises, site,
site, facility,
facility, building
building or or other
other
physical
physical asset
asset of
of an
an organization
organization [Lawrence
[LawrenceFennelly]
Fennelly]

Physical
Physical security
security protects
protects your
your physical
physical computer
computer
facility (your
facility (your building,
building, your
your computer
computer room,
room, your
your
computer,
computer, your your disks
disks and
and other
other media)
media) [Chuck
[Chuck
Easttom].
Easttom].
Computer Security and Privacy/ Physical Security

In
In the
the early
early days
days of
of computing
computing physical
physical security
security
was simple
was simple because
because computers
computers were
were big,
big,
standalone,
standalone, expensive
expensive machines
machines

It
It almost impossible
isis almost impossible to to move
move them
them (not
(not
portable)
portable)

They
They were were very
very few and itit isis affordable
few and affordable to to
spend
spend on on physical
physical security
security for
for them
them

Management
Management was was willing
willing to
to spend
spend money
money

Everybody understands
Everybody understands and and accepts
accepts that
that there
there
isis restriction
restriction
Computer Security and Privacy/ Physical Security

Today
Today

Computers
Computers are
are more
more and
and more portable (PC,
more portable (PC, laptop,
laptop,
PDA,
PDA,Smartphone)
Smartphone)

There
There are
are too many of
too many of them
them to to have
have good
good physical
physical
security
securityfor
foreach
eachofofthem
them

They
They are
are not
not “too
“too expensive”
expensive” to justify spending
to justify spending more
more
money
moneyononphysical
physicalsecurity
securityuntil
untilaamajor
majorcrisis
crisisoccurs
occurs

Users
Usersdon’t
don’taccept restrictionseasily
acceptrestrictions easily

Accessories
Accessories (ex.(ex. Network
Network components)
components) are are notnot
considered
considered as important for
as important for security
security until
until there
there is
is aa
problem
problem

Access
Access to
to aa single
single computer
computer may
may endanger many more
endanger many more
computersconnected
computers connectedthrough
throughaanetwork
network
Computer Security and Privacy/ Physical Security

=>
=>
Physical
Physical security
security is
is much
much more
more
difficult
difficult to
to achieve
achieve today
today than
than some
some
decades
decades agoago
Computer Security and Privacy/ Physical Security

Threats and vulnerabilities


Natural
NaturalDisasters
Disasters

Fire
Fireand
andsmoke
smoke

Fire
Firecan
canoccur
occuranywhere
anywhere

Solution – Minimize risk
Solution – Minimize risk
Good
Goodpolicies:
policies:NO SMOKING,,etc..
NOSMOKING etc..
Fire
Fireextinguisher,
extinguisher,good
goodprocedure
procedureand
andtraining
training
Fireproof
Fireproofcases
cases(and
(andother
othertechniques)
techniques)for
forbackup
backup
tapes
tapes
Fireproof
Fireproofdoors
doors

Climate
Climate

Heat
Heat

Direct
Directsun
sun

Humidity
Computer Security and Privacy/ Physical Security
Threats and vulnerabilities …
Natural
NaturalDisasters
Disasters…


Hurricane,
Hurricane,storm,
storm,cyclone
cyclone

Earthquakes
Earthquakes

Water
Water

Flooding
Floodingcan
canoccur
occureven
evenwhen
whenaawater
watertab
tabisisnot
notproperly
properlyclosed
closed

Electric
Electricsupply
supply

Voltage
Voltagefluctuation
fluctuation
Solution:
Solution:Voltage
Voltageregulator
regulator

Lightning
Lightning

Solution
Solution

 Avoid
Avoidhaving
havingservers
serversin
inareas
areasoften
oftenhit
hitby
byNatural
NaturalDisasters!
Disasters!
Computer Security and Privacy/ Physical Security

Threats and vulnerabilities …


People
People

Intruders
Intruders

Thieves
Thieves

People who
People who have
have been
been given
given access
access unintentionally
unintentionally by
by the
the
insiders
insiders

Employees,
Employees,contractors,
contractors,etc.
etc.who
whohave
haveaccess
accessto
tothe
thefacilities
facilities

 External
Externalthieves
thieves

Portable computing
Portable computing devices
devices can
can be
be stolen
stolen outside
outside the
the
organization’s
organization’spremises
premises
Loss
Loss of
of aa computing
computing device
device

Mainly
Mainlylaptop
laptop
Computer Security and Privacy/ Physical Security

Safe area
Safe
Safe area
area often
often isis aa locked
locked place
place where
where
only
only authorized
authorized personnel
personnel can can have
have
access
access
Organizations
Organizations usually
usually havehave safe
safe area
area for
for
keeping
keeping computers
computers and and related
related devices
devices
Computer Security and Privacy/ Physical Security
Safe area … Challenges

Is
Is the
the area
area inaccessible
inaccessible through
through other
other openings
openings
(window,
(window, roof-ceilings,
roof-ceilings, ventilation
ventilation hole,
hole, etc.)?
etc.)?

Design
Designof
ofthe
thebuilding
buildingwith
withsecurity
securityin
inmind
mind

Know
Knowthe
thearchitecture
architectureof
ofyour
yourbuilding
building

During
During opening
opening hours,
hours, isis itit always
always possible
possible to to
detect
detect when
when unauthorized
unauthorized person
person tries
tries to
to get
get to
to the
the
safe
safe area?
area?

Surveillance/guards,
Surveillance/guards, video-surveillance,
video-surveillance, automatic-
automatic-
doors
doorswith
withsecurity
securitycode
codelocks,
locks,alarms,
alarms,etc.
etc.

Put
Putsigns
signsso
sothat
thateverybody
everybodysees
seesthe
thesafe
safearea
area
Computer Security and Privacy/ Physical Security
Safe area…Locks
Are
Arethe
thelocks
locksreliable?
reliable?

The
Theeffectiveness
effectivenessof
oflocks
locksdepends
dependson
onthe
thedesign,
design,manufacture,
manufacture,
installation
installationand
andmaintenance
maintenanceofofthe
thekeys!
keys!

Among
Amongthe theattacks
attackson
onlocks
locksare:
are:

Illicit
Illicitkeys
keys
Duplicate
Duplicatekeys
keys
Avoid
Avoidaccess
accesstotothe
thekey
keyby
byunauthorized
unauthorizedpersons
personseven
evenfor
foraafew
fewseconds
seconds
Change
Changelocks/keys
locks/keysfrequently
frequently
Key
Keymanagement
managementprocedure
procedure
Lost
Lostkeys
keys
Notify
Notifyresponsible
responsibleperson
personwhen
whenaakey
keyisislost
lost
There
Thereshould
shouldbe
beno
nolabel
labelon
onkeys
keys

Circumventing
Circumventingof
ofthe
theinternal
internalbarriers
barriersof
ofthe
thelock
lock
Directly
Directly operating
operating the
the bolt
bolt completely
completely bypassing
bypassing the
the locking
locking mechanism
mechanism
which
whichremains
remainslocked
locked

Forceful
Forcefulattacks:
attacks:
Computer Security and Privacy/ Physical Security

Safe area… Surveillance

Surveillance
Surveillance with
with guards
guards

The
The most
most common
common in in Ethiopia
Ethiopia

Not
Not always
always the
the most
most reliable
reliable since
since itit adds
adds aa
lot
lot of
of human
human factor
factor

Not
Not always
always practical
practical forfor users
users (employees
(employees
don’t
don’t like
like toto bebe questioned
questioned by by guards
guards
wherever
wherever they
they go)
go)
Computer Security and Privacy/ Physical Security
Safe area… Surveillance
Surveillance
Surveillancewith
withvideo
video

Uses
UsesClosed
ClosedCircuit
CircuitTelevision
Television(CCTV)
(CCTV)

Started in the 1960s
Started in the 1960s

Become
Become more
more and
and more
more popular
popular with
with the
the worldwide
worldwide increase
increase of
of
theft
theftand
andterrorism
terrorism

Advantages
Advantages

AAsingle
singleperson
personcan
canmonitor
monitormore
morethan
thanone
onelocation
location

The intruder doesn’t see the security personnel
The intruder doesn’t see the security personnel

ItItisischeaper
cheaperafter
afterthe
theinitial
initialinvestment
investment

ItItcan
canbeberecorded
recordedandandbe
beused
usedfor
forinvestigation
investigation

Since
Sinceititcan
canbe
berecorded
recordedthe
thesecurity
securitypersonnel
personnelisismore
morecareful
careful

Today’s
Today’sdigital
digitalvideo-surveillance
video-surveillancecancanuse
useadvanced
advancedtechniques
techniquessuch
such
as
asface
facerecognition
recognitiontotodetect
detectterrorists,
terrorists,wanted
wantedpeople,
people,etc.
etc.

Drawback
Drawback
Privacy
Privacyconcerns
concerns
Computer Security and Privacy/ Physical Security
Internal Human factor - Personnel

Choose
Choose employees
employees carefully
carefully

Personal
Personal integrity
integrity should
should be
be as
as important
important aa
factor
factor in
in the
the hiring
hiring process
process as
as technical
technical skills
skills
Create
Create an
an atmosphere
atmosphere in in which
which the
the levels
levels of
of
employee
employee loyalty,
loyalty, morale,
morale, andand job
job
satisfaction
satisfaction are
are high
high
Remind
Remind employees,
employees, on on aa regular
regular basis,
basis, of
of
their
their continuous
continuous responsibilities
responsibilities to to protect
protect
the
the organization’s
organization’s information
information
Computer Security and Privacy/ Physical Security

Internal Human factor – Personnel …


Establish
Establish procedures
procedures for for proper
proper destruction
destruction andand
disposal
disposal ofof obsolete
obsolete programs,
programs, reports,
reports, and
and data
data
Act
Act defensively
defensively when when anan employee
employee mustmust be be
discharged,
discharged, either
either for
for cause
cause or
or as
as part
part of
of aa cost
cost
reduction
reduction program
program

Such
Such anan employee
employee should
should not
not be
be allowed
allowed access
access to
to
the
the system
system andand should
should be
be carefully
carefully watched
watched until
until
he
he or
or she
she leaves
leaves the
the premises
premises

Any
Any passwords
passwords used used by
by the
the former
former employee
employee
should
should be
be immediately
immediately disabled
disabled
Computer Security and Privacy/ Attacks & Threats

Computer
Computer Security
Security Attacks
Attacks and
and
Threats
Threats
Computer security/ Attacks & Threats

A
A computer
computer security
security threat
threat isis any
any
person,
person, act,
act, or
or object
object that
that poses
poses aa
danger
danger to
to computer
computer security
security
Computer
Computer world
world isis full
full of
of threats!
threats!

… refer
refer to
to the
the first
first assignment…
assignment…
And
And so
so isis the
the real
real world!
world!

Thieves,
Thieves, pick-pockets,
pick-pockets, burglars,
burglars,
murderers,
murderers, drunk
drunk drivers,
drivers, …

Computer security/ Attacks & Threats
What
Whatisisthe
theright
rightattitude?
attitude?

To
Todo
dowhat
whatyou
youdo
doin
inreal
reallife
life
What
Whatdo
doyou
youdo
doin
inreal
reallife?
life?

You
Youlearn
learnabout
aboutthe thethreats
threats

What
Whatare
arethe
thethreats
threats

How
Howcan
canthese
thesethreats
threatsaffect
affectyou
you

What
Whatisisthe
therisk
riskfor
foryou
youtotobe
beattacked
attackedbybythese
thesethreats
threats

How
Howyou
youcan
canprotect
protectyourself
yourselffrom
fromthese
theserisks
risks

How
Howmuch
muchdoesdoesthe
theprotection
protectioncost
cost

What
Whatyou
youcancandodoto
tolimit
limitthe
thedamage
damagein incase
caseyou
youare
areattacked
attacked

How
Howyou
youcan
canrecover
recoverinincase
caseyou
youare
areattacked
attacked

Then,
Then, you
you protect
protect yourself
yourself inin order
order toto limit
limit the
the risk
risk but
but to
to
continue
continueto
tolive
liveyour
yourlife
life

You
Youneed
needto
todo
doexactly
exactlythe
thesame
samething
thingwith
withcomputers!
computers!
Computer security/ Attacks & Threats
Types of Threats/Attacks … (Chuck Eastom)

Hacking
Hacking Attack:
Attack:

Any
Any attempt
attempt to
to gain
gain unauthorized
unauthorized access
access to
to
your
your system
system

Denial
Denial of
of Service
Service (DoS)
(DoS) Attack
Attack

Blocking
Blocking access
access from
from legitimate
legitimate users
users
Physical
Physical Attack:
Attack:

Stealing,
Stealing, breaking
breaking or
or damaging
damaging of
of computing
computing
devices
devices
Computer security/ Attacks & Threats
Types of Threats/Attacks (Chuck Eastom)

Malware
Malware Attack:
Attack:

AA generic
generic term
term for
for software
software that
that has
has malicious
malicious
purpose
purpose

Examples
Examples
Viruses
Viruses
Trojan
Trojan horses
horses
Spy-wares
Spy-wares

New ones:
New ones: Spam/scam,
Spam/scam, identity
identity theft,
theft, e-payment
e-payment
frauds,
frauds,etc.
etc.
Computer security/Threats
Malware Attack:
Viruses
Viruses

“A
“A small
small program
program that
that replicates
replicates and
and hides
hides itself
itself inside
inside
other
other programs
programs usually
usually without
without your
your knowledge.”
knowledge.”
Symantec
Symantec

Similar
Similarto
tobiological
biologicalvirus:
virus:Replicates
Replicatesand
andSpreads
Spreads

Worms
Worms

An
An independent
independent program
program that
that reproduces
reproduces by
by copying
copying
itself
itselffrom
fromone
onecomputer
computertotoanother
another

ItItcan
candodoas
asmuch
muchharm
harmasasaavirus
virus

ItItoften
oftencreates
createsdenial
denialof
ofservice
service
Computer security/Threats
Malware Attack…
Trojan
Trojan horses
horses

(Ancient
(Ancient Greek
Greek tale
tale of
of the
the city
city of
of Troy
Troy and
and the
the wooden
wooden
horse)
horse)--??
??

Secretly
Secretly downloading
downloading aa virus
virus or
or some
some other
other type
type of
of mal-
mal-
ware
wareononto
toyour
yourcomputers.
computers.

Spy-wares
Spy-wares

“A
“A software
software that
that literally
literally spies
spies on
on what
what you
you do
do on
on your
your
computer.”
computer.”

Example:
Example:Simple
SimpleCookies
Cookiesand
andKey
KeyLoggers
Loggers
Computer security/Threats
Most software based attacks are commonly
called Viruses: How do viruses work?
Infection
Infection mechanisms
mechanisms

First,
First, the
the virus
virus should
should search
search for
for and
and detect
detect
objects
objects to
to infect
infect

Installation
Installation into
into the
the infectable
infectable object
object

Writing
Writingon
onthe
theboot
bootsector
sector

Add
Addsome
somecode
codeto
toexecutable
executableprograms
programs

Add
Addsome
somecode
codeto
toinitialization/auto-executable
initialization/auto-executable
programs
programs

……
Computer security/Threats
How do viruses work? …

Trigger
Trigger mechanism
mechanism

Date
Date

Number
Numberof
ofinfections
infections

First
Firstuse
use

Effects:
Effects: It
It can
can be
be anything
anything

AAmessage
message

Deleting
Deletingfiles
files

Formatting
Formattingdisk
disk

Overloading
Overloadingprocessor/memory
processor/memory

Etc.
Etc.
Computer security/Threats
Who Writes Virus

Adolescents
Adolescents

Ethically
Ethically normal
normal and
and of
of average/above
average/above
average
average intelligence.
intelligence.

Tended
Tended to to understand
understand the the difference
difference
between
between what
what isis right
right and
and wrong
wrong

Typically
Typically do
do not
not accept
accept any
any
responsibility
responsibility for
for problems
problems caused
caused
Computer security/Threats
Who Writes Virus …
The
The College
College Student
Student

Ethically
Ethically normal
normal

Are
Are not
not typically
typically concerned
concerned about
about the
the results
results
of
of their
their actions
actions related
related to
to their
their virus
virus writing
writing

The
The Adult
Adult (smallest
(smallest category)
category)

Ethically
Ethically abnormal
abnormal
Computer security/Threats
Anti-Virus
There
There are
are

Generic
Generic solutions
solutions
Ex.
Ex.Integrity
Integritychecking
checking

Virus
Virus specific
specific solution
solution

Ex.
Ex.Looking
Lookingfor
forknown
knownviruses
viruses

Three
Three categories
categories

Scanners
Scanners

Activity
Activity monitors
monitors

Change
Change detection
detection software
software
Computer security/Threats
Anti-Virus …

Functions
Functions of
of anti-viruses
anti-viruses

Identification
Identification of
of known
known viruses
viruses

Detection
Detection of
of suspected
suspected viruses
viruses

Blocking
Blocking of
of possible
possible viruses
viruses

Disinfection
Disinfection of
of infected
infected objects
objects

Deletion
Deletion and
and overwriting
overwriting of
of infected
infected
objects
objects
Computer security/Threats
Hackers/Intrusion Attack:

Hacking:
Hacking: isis any
any attempt
attempt to to intrude
intrude or
or gain
gain
unauthorized
unauthorized access
access to
to your
your system
system either
either via
via
some
some operating
operating system
system flaw
flaw or
or other
other means.
means. The
The
purpose
purpose may
may oror may
may not not be
be for
for malicious
malicious
purposes.
purposes.

Cracking:
Cracking:isishacking
hackingconducted
conductedfor
formalicious
maliciouspurposes.
purposes.
Computer security/Threats
Denial of Service (DoS) Attack:
DoS
DoS Attack:
Attack: isis blocking
blocking access
access of
of legitimate
legitimate
users
users to
to aa service.
service.

Distributed
Distributed DoSDoS Attack:
Attack: is
is accomplished
accomplished by by
tricking
tricking routers
routers into
into attacking
attacking aa target
target or
or using
using
Zumbie
Zumbie hosts
hosts toto simultaneously
simultaneously attack
attack aa given
given
target
target with
with large
large number
number ofof packets.
packets.
Computer security/Threats

Simple
Simpleillustration
illustrationof
ofDoS
DoSattack
attack(from
(fromEasttom)
Easttom)

C:\>Ping <address of X> -l 65000 –w 0 -t

Web Server X

Ping
Ping

Ping

Legitimate User Ping

You might also like