Topic 7a Computer Security PDF
Topic 7a Computer Security PDF
Topic 7a Computer Security PDF
BISF 1104
Course Description:
Installation and Customization
Lesson 7a : Computer Security
Course Description:
Installation and Customization
Lesson 4 : Computer Security
Lecturer Name: Eric G Kariuki
Email: ekariuki@kca.ac.ke
Tel: 0721487915
Computer and Network
Security Requirements
Confidentiality
Requires information in a computer system only be
accessible for reading by authorized parties
Integrity
Assets can be modified by authorized parties only
Availability
Assets be available to authorized parties
Authenticity
Requires that a computer system be able to verify the
identity of a user
Types of Threats
Interruption
An asset of the system is destroyed of becomes
unavailable or unusable
Attack on availability
Destruction of hardware
Cutting of a communication line
Disabling the file management system
Types of Threats
Interception
An unauthorized party gains access to an asset
Attack on confidentiality
Wiretapping to capture data in a network
Illicit copying of files or programs
Types of Threats
Modification
An unauthorized party not only gains
access but tampers with an asset
Attack on integrity
Changing values in a data file
Altering a program so that it performs
differently
Modifying the content of messages being
transmitted in a network
Types of Threats
Fabrication
An unauthorized party inserts counterfeit objects
into the system
Attack on authenticity
Insertion of spurious messages in a network
Addition of records to a file
Computer System Assets
Hardware
Threats include accidental and deliberate damage
Software
Threats include deletion, alteration, damage
Backups of the most recent versions can maintain
high availability
Computer System Assets
Data
Involves files
Security concerns fro availability, secrecy, and
integrity
Statistical analysis can lead to determination of
individual information which threatens privacy
Computer System Assets
Communication Lines and Networks –
Passive Attacks
Release of message contents for a telephone
conversion, an electronic mail message, and a
transferred file are subject to these threats
Traffic analysis
encryption masks the contents of what is transferred
so even if obtained by someone, they would be unable
to extract information
Computer System Assets
Communication Lines and Networks – Active
Attacks
Masquerade takes place when one entity pretends to
be a different entity
Replay involves the passive capture of a data unit and
its subsequent retransmission to produce an
unauthorized effect
Modification of messages means that some portion of
a legitimate message is altered, or that messages are
delayed or reordered, to produce an unauthorized
effect
Computer System Assets
Communication Lines and Networks – Active
Attacks
Modification of messages means that some
portion of a legitimate message is altered, or that
messages are delayed or reordered, to produce
an unauthorized effect
Denial of service prevents or inhibits the normal
use or management of communications facilities
Disable network or overload it with messages
User-Oriented Access Control
Log on
Requires both a user identifier (ID) and a
password
System only allows users to log on if the ID is
known to the system and password associated
with the ID is correct
Users can reveal their password to others either
intentionally or accidentally
Hackers are skillful at guessing passwords
ID/password file can be obtained
Data-Oriented Access Control
Associated with each user, there can be a
user profile that specifies permissible
operations and file accesses
Operating system enforces these rules
Database management system controls
access to specific records or portions of
records
Access Matrix
Subject
An entity capable of accessing objects
Object
Anything to which access is controlled
Access rights
The way in which an object is accessed by a
subject
Malicious Programs
Those that need a host program
Fragments of programs that cannot exist
independently of some application program, utility,
or system program
Independent
Self-contained programs that can be scheduled
and run by the operating system
Trapdoor
Entry point into a program that allows
someone who is aware of trapdoor to gain
access
used by programmers to debug and test
programs
Avoids necessary setup and authentication
Method to activate program if something wrong
with authentication procedure
Logic Bomb
Code embedded in a legitimate program that
is set to “explode” when certain conditions
are met
Presence or absence of certain files
Particular day of the week
Particular user running application
Trojan Horse
Useful program that contains hidden code
that when invoked performs some unwanted
or harmful function
Can be used to accomplish functions
indirectly that an unauthorized user could not
accomplish directly
User may set file permission so everyone has
Viruses
Program that can “infect” other programs by
modifying them
Modification includes copy of virus program
The infected program can infect other programs
A computer virus is a computer program that can
copy itself and infect a computer without the
permission or knowledge of the owner.
One of the first detected virus was the Creeper
virus in the early 70’s
Before computer networks became widespread,
most viruses spread on removable media,
particularly floppy disk.
Worms
Use network connections to spread form
system to system
Electronic mail facility
A worm mails a copy of itself to other systems
Remote execution capability
A worm executes a copy of itself on another system
Remote log-in capability
A worm logs on to a remote system as a user and
then uses commands to copy itself from one system to
the other
Zombie
Program that secretly takes over another
Internet-attached computer
It uses that computer to launch attacks that
are difficult to trace to the zombie’s creator
Virus Stages
Dormant phase
Virus is idle
Propagation phase
Virus places an identical copy of itself into other
programs or into certain system areas on the disk
Virus Stages
Triggering phase
Virus is activated to perform the function for which
it was intended
Caused by a variety of system events
Execution phase
Function is performed
Types of Viruses
Parasitic
Attaches itself to executable files and replicates
When the infected program is executed, it looks
for other executables to infect
Memory-resident
Lodges in main memory as part of a resident
system program
Once in memory, it infects every program that
executes
Types of Viruses
Boot sector
Infects boot record
Spreads when system is booted from the disk
containing the virus
Stealth
Designed to hide itself form detection by antivirus
software
May use compression
Types of Viruses
Polymorphic
Mutates with every infection, making detection by
the “signature” of the virus impossible
Mutation engine creates a random encryption key
to encrypt the remainder of the virus
The key is stored with the virus
Macro Viruses
Platform independent
Most infect Microsoft Word
Infect document, not executable portions of
code
Easily spread
Macro Viruses
A macro is an executable program embedded in
a word processing document or other type of file
Autoexecuting macros in Word
Autoexecute
Executes when Word is started
Automacro
Executes when defined event occurs such as opening or
closing a document
Command macro
Executed when user invokes a command (e.g., File Save)
Antivirus Approaches
Detection
Identification
Removal
E-mail Virus
Activated when recipient opens the e-mail
attachment
Activated by open an e-mail that contains the
virus
Uses Visual Basic scripting language
Propagates itself to all of the e-mail
addresses known to the infected host
Signs Your Computer is
Infected
Functions slower than
normal
Responds slowly and
freezes often
Restarts itself often
See uncommon error
messages, distorted
menus, and dialog boxes
Notice applications fail to
work correctly
Fail to print correctly
First half of the 70'Late 60,s, early 70,s- "Rabbits" cloned
themselves occupied system resources, slowing down the productivity.
-"The Creeper" capable of entering a network by itself and transferring a
copy of itself to the system.
Early 80,s-Increasing number of programs written by individuals not by
software companies. Programs caused miner viruses called "Trojan horses".
1986'Brain virus' - by Amjad and Basit Farooq Alvi.
- spread through floppy disks,
- infected boot records and not computer hard drives
Lahore, Pakistani Brain, Brain-A and UIUC virus
-took over free space on the floppy disk and hid from detection
”disguised itself by displaying the uninfected boot sector on the disk.”
1987-Lehigh virus
- the first memory resident file infector that attacked executable files and
took control when a file was opened
The Love Bug spread far faster than Melissa. Unlike Melissa,
it would mail itself to everyone in your Outlook address book
-- most of whom would probably be delighted to read about
how you love them -- not just the first fifty. Moreover, it would
gobble up certain media files stored on your hard drive.
Did you know?
One German newspaper
tragically lost 2,000
pictures from its archive.
The perpetrator turned out
to be a 23-year-old Filipino
computer science student
who more or less
plagiarized all of his code.
The lack of laws in the
Philippines covering
computer crimes, he pretty
much got away with his
crime.
Prevention
Upload and use antivirus
software
Be aware of the e-mails
and attachments you
open
Check for updates on
antivirus software
regularly
Make sure antivirus
software is installed
correctly
Questions