Lec 5
Lec 5
Ahmed Gadallah
2023
Computer Security
Do you know in all this digital world, what is the biggest hole or the
weakest point of the security?
Answer. It is us, humans.
The potential loses in this cyberspace are many even if you are using a
single computer in your room. Here, I will be listing some examples that
have a direct impact on you and on others −
• Losing you data − If your computer has been hacked or infected, there
is a big chance that all your stored data might be taken by the attacker.
• Bad usage of your computer resources − This means that your network
or computer can go in overload so you cannot access your genuine
services or in a worst case scenario, it can be used by the hacker to
attack another machine or network.
• Reputation loss − Just think if your Facebook account or business email
has been owned by a social engineering attack and it sends fake
information to your friends, business partners. You will need time to
gain back your reputation.
• Identity theft − This is a case where your identity is stolen (photo, name
surname, address, and credit card) and can be used for a crime like
making false identity documents.
Some Basic Computer Security Checklist
There are some basic things that everyone of us in every operating system need
to do −
• Check if the user is password protected.
• Check if the operating system is being updated. In my case, I did a screenshot
of my laptop which is a Windows 7.
• Check if the antivirus or antimalware is installed and updated. In my
case, I have a Kaspersky antivirus being updated.
• Check for the unusual services running that consumes resources.
• Check if your monitor is using a screen saver.
• Check if the computer firewall is on or not.
• Check if you are doing backups regularly.
• Check if there are shares that are not useful.
• Check if your account has full rights or is restricted.
• Update other third party software’s.
Computer Security - Elements
The general state in Computer Security has the ability to detect and
prevent attacks and to be able to recover. If these attacks are
successful as such then it has to contain the disruption of
information and services and check if they are kept low or tolerable.
Example in real life − Let’s say there are two people communicating via an
encrypted email they know the decryption keys of each other and they read the
email by entering these keys into the email program. If someone else can read
these decryption keys when they are entered into the program, then the
confidentiality of that email is compromised.
Integrity is the trustworthiness of data in the systems or
resources by the point of view of preventing unauthorized and improper
changes. Generally, Integrity is composed of two sub-elements – data-
integrity, which it has to do with the content of the data and
authentication which has to do with the origin of the data as such
information has values only if it is correct.
Example in real life − Let’s say you are doing an online payment of 5 USD,
but your information is tampered without your knowledge in a way by
sending to the seller 500 USD, this would cost you too much.
In this case cryptography plays a very major role in ensuring data integrity.
Commonly used methods to protect data integrity includes hashing the
data you receive and comparing it with the hash of the original message.
However, this means that the hash of the original data must be provided
in a secure way.
Availability refers to the ability to access data of a resource
when it is needed, as such the information has value only if the
authorized people can access at right time. Denying access to data
nowadays has become a common attack. Imagine a downtime of a
live server how costly it can be.