Unit 1 Introduction To Computer Security: COSC 4035
Unit 1 Introduction To Computer Security: COSC 4035
Unit 1 Introduction To Computer Security: COSC 4035
New Concerns –
People and Companies start thinking about their security of
computers and stored data
Trust on emails and websites were primarily suspected.
They were worried about their information privacy in
networked environment / world
Salient Security Cases
• Salient Security Cases.
Internet Worm (Morris worm )
November 2, 1988 a worm attacked more than 60,000
computers around the USA
The worm attacks computers, and when it has installed
itself, it multiplies itself, freezing the computer
It exploited UNIX security holes in Sendmail
A nation wide effort enabled to solve the problem within 12
hours
Robert Morris [ A Professor at the MIT] became the first
person to be indicted under the Computer Fraud and Abuse
Act.
He was sentenced to three years of probation, 400 hours of
community service and a fine of $10,050
Salient Security Cases Contd…
• Salient security harms …
NASA shutdown
In 1990, an Australian computer science student was charged for
shutting down NASA’s computer system for 24 hours
Digital Equipment Corp. and MCI Communications Corp, Attack
a 25-year-old hacker named Kevin Mitnick began tapping into the e-
mail system used by computer security managers. As a result, Mitnick
was arrested and sentenced to one year in jail.
Airline computers
In 1998, a major travel agency discovered that someone penetrated
its ticketing system and has printed airline tickets illegally
Bank theft
In 1984, a bank manager was able to steal $25 million through un-
audited computer transactions
Salient Security Cases Contd…
“ The term computer system security means the collective processes and
mechanisms by which sensitive and valuable information and services are
protected from publication, alter or collapse by unauthorized activities or
untrustworthy individuals and unplanned events respectively.
Privacy
• Privacy: The legal rights of the
groups/individuals/organizations to
be protected against unauthorized
intrusion into his personal
life/affairs, by direct physical means
or by publication of information.
• Security or Privacy Threat: Any
individual group, act, or object that
poses a danger to computer security
and privacy is known as threat.
No Tension ??
No Computer
No Network
No Internet
• The most secured manner
Either no computers or are
those not connected to any
Network or Internet and
protected from any intrusion
Defining- Computer Security
• Computer or Information Technology can be
used for productive or destructive purposes
Confidentiality
Integrity
Availaibility
1.4 Aspects of Security
– security attack
– security service
– security mechanism
Security Attack
• any action that compromises the security of
information owned by an organization
• information security is about how to prevent attacks,
or failing that, to detect attacks on information-based
systems
• often threat and attack used to mean same thing
• have a wide range of attacks
• can focus of generic types of attacks
– passive
– active
Passive Attacks
Active Attacks
Security Service
– enhance security of data processing systems
and information transfers of an organization
– intended to counter security attacks
– using one or more security mechanisms
– often replicates functions normally
associated with physical documents
have signatures, dates; need protection from disclosure
Security Services
• Authentication - assurance that the communicating
entity is the one claimed: Fabrication
• Access Control - prevention of the unauthorized use
of a resource
• Data Confidentiality –protection of data from
unauthorized disclosure: Interception
• Data Integrity - assurance that data received is as
sent by an authorized entity: Modification
• Non-Repudiation - protection against denial by one
of the parties in a communication
• Availability - ensure info delivery : Interruption
Security Mechanism
• feature designed to detect, prevent, or
recover from a security attack
• no single mechanism will support all services
required
• however one particular element underlies
many of the security mechanisms in use:
– cryptographic techniques
Model for Network Security
Categories of Attacks/Threats
Source
Destination
Normal flow of information
Attack
Interruption Interception
Modification Fabrication
Some Types of Attacks
• What are some common attacks?
– Network Attacks
• Packet sniffing, man-in-the-middle, 5G based attack,
SQL injection attacks, Ransomware
– Web attacks
• Phishing, Cross Site Scripting
– OS, applications and software attacks
• Virus, Trojan, Worms, Rootkits, Buffer Overflow
• Not all hackers are evil wrongdoers trying to steal your info
26
Network Attacks
• Packet Sniffing
– Internet traffic consists of data “packets”, and these can
be “sniffed”
– Leads to other attacks such as
password sniffing, cookie
stealing session hijacking,
information stealing
• Man in the Middle
– Insert a router in the path between client and server,
and change the packets as they pass through
27
How Man-in-the-Middle Attack work
30
1.5 Computer Security Components
• Vulnerability Is a point where a system Is
susceptible to attack.
• A threat Is a possible danger to the system.
The danger might be a Person (a system
cracker), a thing (a faulty piece of Equipment),
or an event (a fire or a flood) that might
exploit a Vulnerability of the system.
• Countermeasures are techniques for
protecting your system.
Types of Vulnerabilities
tapped)