You are on page 1of 47

Unit 1

Introduction to Computer Security


COSC 4035
1.1 Evolution of Computer Security and Privacy Issues and Ethics
• Computer security, meaning safeguarding hardware, software
and their physical locations,
• 1960s- Larry Roberts, hailed as the internet’s founder, designed
the ARPANET (Advanced Research Projects Agency Network),
which is called the internet’s predecessor.
• "worldwide system of interconnected networks and
computers“- Internet by Larry
Evolution Contd…
• 1960s - 70s
 New paradigms of Multiuser and Multiprogramming were
introduced
 Data storage systems like concepts of database and RDBMS
were introduced
New Concerns arise –
 The issue of computer security first arose in the 1970s as
individuals began to break into telephone systems.
 People and companies started focusing on database
processing
 What is being done to their privately stored data in large
databases
Evolution Contd…
• 1980s & 90s
 Local Area Network introduced
 Internet entered in the world
 PCs were popularized
 Net based business models like E-commerce, E-government and
E-health services started to develop new computerized systems
 Malwares like Viruses become majors threats

New Concerns –
 People and Companies start thinking about their security of
computers and stored data
 Trust on emails and websites were primarily suspected.
 They were worried about their information privacy in
networked environment / world
Salient Security Cases
• Salient Security Cases.
 Internet Worm (Morris worm )
 November 2, 1988 a worm attacked more than 60,000
computers around the USA
 The worm attacks computers, and when it has installed
itself, it multiplies itself, freezing the computer
 It exploited UNIX security holes in Sendmail
 A nation wide effort enabled to solve the problem within 12
hours
 Robert Morris [ A Professor at the MIT] became the first
person to be indicted under the Computer Fraud and Abuse
Act.
 He was sentenced to three years of probation, 400 hours of
community service and a fine of $10,050
Salient Security Cases Contd…
• Salient security harms …
 NASA shutdown
 In 1990, an Australian computer science student was charged for
shutting down NASA’s computer system for 24 hours
 Digital Equipment Corp. and MCI Communications Corp, Attack
 a 25-year-old hacker named Kevin Mitnick began tapping into the e-
mail system used by computer security managers. As a result, Mitnick
was arrested and sentenced to one year in jail.
 Airline computers
 In 1998, a major travel agency discovered that someone penetrated
its ticketing system and has printed airline tickets illegally
 Bank theft
 In 1984, a bank manager was able to steal $25 million through un-
audited computer transactions
Salient Security Cases Contd…

 During 1995, computers at the U.S. Department of


Defense were attacked roughly 250,000 times.

 In 1998, the U.S. Department of Justice created the


National Infrastructure Protection Center, charging
it with task of safeguarding domestic technology,
telecommunications, and transportation systems
from unethical hackers.
Salient Security Cases Contd…
 Cyber crime and Ethiopia
 Employees of a company managed to change their salaries by
fraudulently modifying the company’s database
 In 1990s Internet password theft

Hundreds of dial-up passwords were stolen and sold to


other users
Many of the owners lost tens of thousands of Birr each
 In Africa: Cote d’Ivoire
 An employee who has been fired by his company deleted all the
data in his company’s computer
Salient Security Cases Contd…
Early Efforts
• 1960s: Marked as the beginning of true computer security
• 1970s: Research and modeling
 Identifying security requirements
 Formulating security policy models
 Defining recommended guidelines and controls
 Development of secure systems
• European Council adopted a convention on Cyber-crime
in 2001.
• The World Summit for Information Society considered
computer security and privacy as a subject of discussion
in 2003 and 2005.
• The Ethiopian Penal Code [EPC] of 2005 has articles on
data and computer related crimes.
1.2 Computer Security
• It is Information security as applied to computers and networks.

• The objectives- Protection of information from


 Theft,
 Corruption,
 Damage from disaster,
Definition
Security: The prevention and protection of computer assets from
unauthorized access, use, alteration, degradation, destruction, and other
threats.

“ The term computer system security means the collective processes and
mechanisms by which sensitive and valuable information and services are
protected from publication, alter or collapse by unauthorized activities or
untrustworthy individuals and unplanned events respectively.
Privacy
• Privacy: The legal rights of the
groups/individuals/organizations to
be protected against unauthorized
intrusion into his personal
life/affairs, by direct physical means
or by publication of information.
• Security or Privacy Threat: Any
individual group, act, or object that
poses a danger to computer security
and privacy is known as threat.
No Tension ??
 No Computer
 No Network
 No Internet
• The most secured manner
Either no computers or are
those not connected to any
Network or Internet and
protected from any intrusion
Defining- Computer Security
• Computer or Information Technology can be
used for productive or destructive purposes

• Computer Security  refers to techniques


for ensuring that data stored in a computer
cannot be read or compromised by any
individuals without authorization.

• Security policies  The provisions and


policies adopted to protect information and
property from theft, corruption, or natural
disaster while allowing the information and
property to remain accessible and
productive to its intended users.
Common Computer Security Measures
• Most computer security measures involve data
encryption and passwords.

• Data encryption is the translation of data into a


form that can not be read without a deciphering
mechanism.

• A password is a secret word or phrase that gives


a user access to a particular program or system.
1.3 Goals of Computer Security
• To maintain information Confidentiality
• To ensure the Integrity and Reliability of data
resources
• To ensure the Uninterrupted Availability of
data resources and online operations
• To prevent Non-repudiation of information
sent in reference to security and privacy laws
and guidelines
Computer Security Goals
It will look like this:

Confidentiality

Integrity
Availaibility
1.4 Aspects of Security
– security attack
– security service
– security mechanism
Security Attack
• any action that compromises the security of
information owned by an organization
• information security is about how to prevent attacks,
or failing that, to detect attacks on information-based
systems
• often threat and attack used to mean same thing
• have a wide range of attacks
• can focus of generic types of attacks
– passive
– active
Passive Attacks
Active Attacks
Security Service
– enhance security of data processing systems
and information transfers of an organization
– intended to counter security attacks
– using one or more security mechanisms
– often replicates functions normally
associated with physical documents
have signatures, dates; need protection from disclosure
Security Services
• Authentication - assurance that the communicating
entity is the one claimed: Fabrication
• Access Control - prevention of the unauthorized use
of a resource
• Data Confidentiality –protection of data from
unauthorized disclosure: Interception
• Data Integrity - assurance that data received is as
sent by an authorized entity: Modification
• Non-Repudiation - protection against denial by one
of the parties in a communication
• Availability - ensure info delivery : Interruption
Security Mechanism
• feature designed to detect, prevent, or
recover from a security attack
• no single mechanism will support all services
required
• however one particular element underlies
many of the security mechanisms in use:
– cryptographic techniques
Model for Network Security
Categories of Attacks/Threats

Source

Destination
Normal flow of information
Attack

Interruption Interception

Modification Fabrication
Some Types of Attacks
• What are some common attacks?
– Network Attacks
• Packet sniffing, man-in-the-middle, 5G based attack,
SQL injection attacks, Ransomware
– Web attacks
• Phishing, Cross Site Scripting
– OS, applications and software attacks
• Virus, Trojan, Worms, Rootkits, Buffer Overflow

• Not all hackers are evil wrongdoers trying to steal your info

26
Network Attacks
• Packet Sniffing
– Internet traffic consists of data “packets”, and these can
be “sniffed”
– Leads to other attacks such as
password sniffing, cookie
stealing session hijacking,
information stealing
• Man in the Middle
– Insert a router in the path between client and server,
and change the packets as they pass through

27
How Man-in-the-Middle Attack work

Mallory can attack public-key key exchange


protocol in the following manner.
• Alice sends her public key to Bob .Mallory
intercepts this key and sends Bob his public
key
• Bob sends Alice his public key. Mallory
intercepts this key and sends Alice his own
public key
Man-in-the-Middle Attack

• When Alice sends a message to Bob, encrypted in “Bob’s”


public key, Mallory intercepts it. Since the message is really
encrypted with his own public key, he decrypts it with his
private key, re-encrypts it with Bob’s public key, and sends it
on to Bob
• When Bob sends a message to Alice, encrypted in “Alice’s”
public key, Mallory intercepts it. Since the message is really
encrypted with his own public key, he decrypts it with his
private key, re-encrypts it with Alice’s public key, and sends it
on to Alice
• This man-in-the-middle attack works because Alice and Bob
have no way to verify that they are talking to each other.
Web Attacks
• Phishing
– An evil website imagines to be a trusted website
– Example:
• You type, by mistake, “mibank.com” instead of “mybank.com”
• mibank.com designs the site to look like mybank.com so the user
types in their info as usual
• BAD! Now an evil person has your info!

• Cross Site Scripting


– Writing a complex JavaScript program that steals data left by other
sites that you have visited in same browsing session

30
1.5 Computer Security Components
• Vulnerability Is a point where a system Is
susceptible to attack.
• A threat Is a possible danger to the system.
The danger might be a Person (a system
cracker), a thing (a faulty piece of Equipment),
or an event (a fire or a flood) that might
exploit a Vulnerability of the system.
• Countermeasures are techniques for
protecting your system.
Types of Vulnerabilities

• Physical vulnerabilities (Ex. Buildings)

• Natural vulnerabilities (Ex. Earthquake)

• Hardware and Software vulnerabilities (Ex. Failures)

• Media vulnerabilities (Ex. Disks can be stolen)

• Communication vulnerabilities (Ex. Wires can be

tapped)

• Human vulnerabilities (Ex. Insiders)


Classification of Vulnerabilities
1. Hardware
• Weakness to humidity
• Weakness to dust
• weakness to soiling
• weakness to unprotected storage
2. Software
• insufficient testing
• lack of audit trail
3. Network
• unprotected communication lines
• insecure network architecture
Contd..
4. Personnel
• inadequate engaging process
• inadequate security awareness
5. Site
• area subject to flood
• unreliable power source
6. Organizational
• lack of regular reviews
• lack of continuity plans
• lack of security
Causes of Vulnerabilities
• Complexity: Large, complex systems increase
the probability of errors and unintentional
access points
• Familiarity: Using common, well-known code,
software, operating systems, and/or hardware
increases the probability an attacker has or can
find the knowledge and tools to exploit the
flaw
Cont..
Connectivity: More physical connections, privileges,
ports, protocols, and services and time each of
those are accessible increase vulnerability
• Password management flaws: The computer user
uses weak passwords that could be discovered by
brute force. The computer user stores the
password on the computer where a program can
access it. Users re-use passwords between many
programs and websites.
Contd…
• Internet Website Browsing: Some internet
websites may contain harmful Spyware or
Adware that can be installed automatically on
the computer systems. After visiting those
websites, the computer systems become
infected and personal information will be
collected and passed on to third party
individuals.
• Software bugs: The programmer leaves an
exploitable bug in a software program. The
software bug may allow an attacker to misuse
Cont..
Not learning from past mistakes: for example most
vulnerabilities discovered in IPv4 protocol software
were discovered in the new IPv6 implementations
• The research has shown that the most vulnerable
point in most information systems is the human
user, operator, designer, or other human: so
humans should be considered in their different
roles as asset, threat, information resources. Social
engineering is an increasing security concern.
Countermeasures

• Countermeasures can take the form of


software, hardware and modes of behavior.
Software countermeasures include:
• personal firewalls
• anti-virus software
• pop-up blockers
• Spyware detection/removal programs……..
Contd…
• The most common hardware countermeasure is
a router that can prevent the IP address of an
individual computer from being directly visible on
the Internet.
• Other hardware countermeasures include:
• Biometric authentication systems
• Physical restriction of access to computers and
peripherals
• Intrusion detectors
• Alarms.
Behavioral countermeasures include:

• Frequent deletion of stored cookies and temporary files from


Web browsers
• Regular scanning for viruses and other malware
• Regular installation of updates and patches for operating
systems
• Refusing to click on links that appear within e-mail messages
• Refraining from opening e-mail messages and attachments
from unknown senders
• Staying away from questionable Web sites
• Regularly backing up data on external media.
1.6 Computer security controls

Authentication (Password, Cards, Biometrics)


(What we know, have, are!)
Encryption
Auditing
Administrative procedures
Standards
Physical Security
Laws
principles of Physical Security

1.Keep people away


• Most large corporations maintain very strict
control over who can enter their datacenters.
They use card key or keypad systems, log books
and human security to limit unauthorized
access.
• If at all possible, sensitive servers should be
kept behind a locked door, not just a door with
a lock, and access should be limited to a select
set of trustworthy administrators
2. Keep backup away from the datacenter
3. Keep them out
• you can't keep everyone away from them. The next layer
of a good physical security plan is to limit what can be
done with the computers.
• Lock the CPU case. Most desktop and tower cases have
locking lugs that you can use to keep an intruder from
opening the case.
• Use a cable-type security lock to keep someone from
stealing the whole computer.
• This is particularly good advice for laptops or small
desktops that can easily be hidden inside a backpack or
coat.
Cont..
• Configure the BIOS not to boot from the floppy
drive.
• This makes it harder for an intruder to remove
passwords and account data from your system's
disks.
• Consider whether it's worth the expense of using a
motion-sensor alarm in the room where the
computers located. (Remember, for home offices,
security systems that cover the office area are
generally deductible business expenses!)
Contd…

4 Protect your plumbing.


• Network cabling, hubs and even the external network
interface are extremely vulnerable points in a network.
• An attacker who can attach to your network can steal
data in transit or mount attacks against computers on
your network or on other networks! If at all possible,
keep hubs and switches behind looked doors or in
locked cabinets, run cabling through walls and ceilings
to make it harder to tap, and ensure that your external
data connection points are kept locked.

E n d

You might also like