Professional Documents
Culture Documents
Information Security
Concepts
Information Security Overview
Types of Attacks
Goals of Security
E-Commerce Security
Computer Forensics
Steganography
• Integrity (means the quality of being honest)[covers both data and system
integrity]: Guarding against improper information modification or damage, and
includes ensuring information authenticity. A loss of integrity is the unauthorized
modification or destruction of information.
Computer security
The protection of resources from unauthorized access,
use, alteration, or destruction.
Physical security
Includes touchable protection devices.
Logical security
Protection of resources using nonphysical (data) means.
Threat
Any act or object that poses a danger to computer
resources.
Types of Threats
The players
Hackers (Ethical Hackers)
Crackers (Data thieves)
Malicious code
Viruses
Worms
Trojan horses
What is Computer Forensics?
Criminal Prosecutors
Rely on evidence obtained from a computer to prosecute
suspects and use as evidence
Civil Litigations
Personal and business data discovered on a computer can be
used in fraud, divorce, harassment, or discrimination cases
Insurance Companies
Evidence discovered on computer can be
used to mollify costs (fraud, worker’s
compensation, arson, etc.)
Private Corporations
Obtained evidence from employee computers can
be used as evidence in harassment, fraud, and imp data
misuse cases.
Goals of Computer Forensics
Deleted Files
Hidden Files
Bad Blocks
Steganography
Steganography –”Cover Writing” (Short History)
Example1:
In 1615 Giovanni Porta described how to conceal a message within a
Hard Boiled Egg by writing on the shell with a special Ink made with a
small amount of Alum and pinch of Vinegar.
The solution penetrates the porous shell, leaving no visible trace, but
message is stained on the surface of the hardened egg albumen, so it
can read when the shell is removed.
Example2:
Ancient Chinese wrote notes (Message) on small pieces of silk that then
folded into a small balls and coated with wax to be swallowed by a
messenger and retrieved at the messenger’s gastrointestinal
convenience.
Example3:
A Greek shaved the head of a slave, wrote a message, then waited for
the hair to grow back before sending the slave to his destination.
Steganography –”Cover Writing”