Chapter One
Chapter One
Chapter One
1
Outline
Basic concepts of computer security.
Security attack.
2
Basic Concepts of Computer Security.
Computer security refers to protecting and securing computers and their
related data, networks, software, hardware from unauthorized access,
misuse, theft, information loss, and other security issues. The Internet has
made our lives easier and has provided us with lots of advantages but it
has also put our system’s security at risk of being infected by a virus, of
being hacked, information theft, damage to the system, and much more.
3
Cont...
Computer Security is the process of detecting and preventing any
unauthorized use of your computer. It involves the process of
safeguarding against intruders from using your personal or office
based computer resources with malicious intent or for their own
gains, or even for gaining any access to them accidentally.
infected, there is a big chance that all your stored data might be
taken by the attacker.
Reputation Loss:- Just think if your Facebook account or
Airline computers.
Bank theft.
In 1984, a bank manager was able to steal $25 million through un-
6
audited computer transactions.
Cont.…
Cyber crime and Ethiopia.
The general state in Computer Security has the ability to detect and
prevent attacks and to be able to recover. In order to fulfil these
requirements, we come to the three main elements which
are confidentiality, integrity, and availability and the recently
added authenticity and utility.
10
Cont.…
Integrity:- Protect improper information modification. A loss of
integrity is the unauthorized modification or destruction of information.
Example in real life:- Let’s say you are doing an online payment of
5 USD, but your information is tampered without your knowledge in
a way by sending to the seller 500 USD, this would cost you too
much.
12
Cont.…
What is Threat?
Types of Threat.
19
Cont.…
What is Vulnerability?
20
Cont.…
system or insiders.
21
Cont.…
22
Classification of Vulnerabilities
23
Cont.…
Cyber risks can be defined with this simple formula- Risk = Threat
+ Vulnerability.
Types of Risks
25
Cont.…
Threat Vulnerability Risk
Take advantage of Known as the
vulnerabilities in weakness in The potential for
the system and hardware, software, loss or destruction
have the potential or designs, which of data is caused
to steal and might allow cyber by cyber threats.
damage data. threats to happen.
Generally, can’t be
Can be controlled Can be controlled
controlled
26
Security Threats and Attacks
well-known in network
security world.
Bob, Alice (lovers!) want to
communicate “securely”.
Trudy (intruder) may
intercept, delete, add
messages.
27
Categories of Attack
Interruption
Interception
28
Cont.…
Fabrication:- An attack on
authenticity.
29
Types of Attacks
32
Cont.…
34
Cont.…
A. Web attacks.
Phishing, Cross-site scripting (XSS) it is a web security
vulnerability.
Not all hackers are evil wrongdoers trying to steal your info.
38
Cont.…
Network Attacks.
Packet Sniffing.
information stealing.
Authentication.
Authorization.
Auditing.
41
Cont.…
Authentication:- assurance that the communicating entity is the one
claimed.
44
Cont.…
45
Model for Network Access Security
46
Prevention, detection mechanisms
Countermeasures can take the form of software, hardware
and modes of behavior. Software countermeasures include:-
personal firewalls.
anti-virus software.
pop-up blockers.
Spyware detection/removal programs.
Alarms.
48
Cont.…
Behavioral counter measures include:-
50
Cont.…
52
How Software Security Assurance Works
53
Cont.…
54
Cont.…
55
Benefits of SSA
56
Cont.…
SSA helps to ensure that your product (and company) can scale.
Prioritizing security during application planning can account for
and help the app scale by considering security needs from the
outset and implementing measures that will facilitate growth
without introducing additional risks.
57
End.
58