1. Introduction to Computer Security (14 marks)
1. Introduction to Computer Security (14 marks)
Information
1
Information is processed, structured, or organized data that carries
meaning and can be used for decision-making.
Data is nothing but raw facts of real world objects which can be stored. The
raw facts can be in any form like numbers, alphabets, alphanumeric, special
symbols, images, video etc.
When this data is process with some mechanism, we will get meaningful
data which is called as an information.
Example:
- Raw data: GPW, IT, CR, Abhishek
- When this raw data is process with some application we will get
meaningful data as
- Information: Abhishek is a CR of IT department of GPW Institute.
Security
Security is the protection of data from unauthorized access, malware, or
harm.
It ensures the confidentiality, integrity and availability of information.
2
Example: Locking a phone using a password to prevent unauthorized
access.
Types of Security:
1. Physical Security – Locking doors, CCTV cameras
2. Cybersecurity – Firewalls, antivirus, encryption
3. Information Security – Protecting sensitive data (like passwords)
Computer Security
Computer security is the protection of data, computer systems from
unauthorized access, malware, or harm.
3
and to the information on them, moreover as from disruption or misdirection
of the services they supply.
Example:
To Maintain Availability
6
Elements of Computer Security
1. Confidentiality
2. Integrity
3. Availability
4. Accountability
5. Non-Repudiation
6. Authentication
7. Authorization
8. Reliability
1. Confidentiality:
7
Confidentiality ensures that only authorized individuals can access
sensitive information.
Example:
2. Integrity:
8
Integrity ensures that only authorized users should be able to modify the
data when needed.
Example:
- A sends a message to B.
- During transmission, C (an unauthorized person) modifies the
message before it reaches B.
- It is a loss of integrity.
For Example: If you send a file from your computer to your teacher,
integrity makes sure that the file reaches the teacher without any
changes.
3. Availability:
9
Availability ensures that data should be available to users when needed.
Example:
- Above fig. shows the information can be available for 24/7 or 365
days.
For example: In online banking system uses backup servers and 24/7
maintenance to make sure customers can access their accounts anytime,
even during peak hours or technical issues.
4. Accountability:
6. Reliability:
Reliability ensures that a system or component consistently performs its intended function without failure
over time.
Reliability prevents system failures, downtime, performance issues, and inconsistent results, ensuring consistent
and stable operation.
For example:
The website or app stays operational even during high traffic, preventing outages.
7. Authentication:
For example
Something you have: Receiving a one-time code on your phone for two-factor authentication (2FA).
11
8. Authorization:
Authorization ensures that users can only access resources or perform actions they are permitted to, based
on their roles or permissions.
Authorization prevents unauthorized access, actions, and data breaches by limiting user permissions.
Regular users can view files but cannot delete or edit them.
Risk is the possibility of loss, damage, or harm that may happen due to a
threat or weakness in a system.
The process of risk analysis will refer to assets, threats and vulnerabilities.
1. Assets
2. Threats
3. Vulnerabilities
1. Assets:
13
Assets is an element of Risk Analysis. Risk analysis is the process of
identifying, evaluating and understanding risks in order to reduce their
impact on a computer system.
2. Vulnerabilities:
3. Threats:
14
Examples of threats include: viruses, malware, phishing attacks,
hackers, hardware failure, fire, or power outage.
Threat to Security
1. Software attacks:
Methods of software attack:
i) Virus
ii) Worm
iii)Trojan
iv)Intruders
v) Insiders
2. Malware:
Methods of software attack:
i) Infection methods
ii) Malware actions
Threat is any potential danger that could harm a system, network or data.
Threats are divided into five categories:
1. Disclosure: Unauthorized access to information.
2. Deception: Access of wrong data.
3. Disruption: Prevention of correct action.
4. Usurpation: Unauthorized access to system or part of system.
15
Viruses:
Viruses is a method of software attack. Software attack is malicious to
exploit vulnerabilities in software to gain unauthorized access, steal data,
disrupt operations or damage a system.
A virus is a malicious program that attaches itself to files and spread when
the infected file is executing.
It requires a host file and usually needs user action to spread, such as
opening an infected file or running a program.
It is more harmful.
Example:
1. Creeper
2. Blaster
3. Slammer
4. ILOVEYOU
16
Phases of Viruses
1. Dormant phase
2. Propagation phase
3. Triggering phase
4. Execution phase
1. Dormant Phase:
In this phase, the virus is idle and does not perform any harmful activity
immediately.
The goal of this phase is to infect as many systems or files as possible, without being detected.
The virus remains hidden during this process to avoid early detection.
3. Triggering Phase:
In this phase, the virus is activated when a specific condition is met, such as:
This phase acts as the switch that tells the virus, “Now it’s time to start the attack.”
Until this point, the virus may stay hidden.
4. Execution Phase:
The damage can range from mild disruptions to severe system failure or data loss.
18
Types of Virus
1. File infector virus
2. Boot sector virus
3. Macro virus
4. Source code virus
5. Polymorphic virus
6. Encrypted virus
7. Stealth virus
8. Tunneling virus
9. Multilateral virus
10. Armored virus
11. Rootkit virus
12. Ransomware
19
Dealing with Virus
1. Detection
2. Identification
3. Removal
1. Detection:
2. Identification:
3. Removal:
20
Worms
Worms is a method of software attack. Software attack is a
malicious to exploit vulnerabilities in software to gain unauthorized
access, steal data, disrupt operation, or damage a system.
It does not requires a host file and user action to replicate from one
computer to another.
Example:
1. Morris worm
2. Strom worm
3. Wannacry worm
21
Trojan horse
Trojan horse is a method of software attack. A software attack is a
malicious attempt to exploit vulnerabilities in software to gain
unauthorized access, steal data, disrupt operations, or damage a
system.
It does not need a host file but requires user action (like installation or
opening a file) to execute.
Trojans can be detected and removed using updated antivirus and anti-
malware tools.
Examples:
22
Intruders
An intruder is an unauthorized person or program that attempts to
access, damage, or steal information from a computer system or
network.
Insiders
Intrusion is any unauthorized attempt to access, use, modify, or
damage a computer system, network, or data.
Attacks
23
An attack is an information security threat. Threat is any potential danger
that could harm a system, network or data.
Type of Attacks
1. Passive Attack
2. Active Attack
Passive Attack
24
A passive attack is a type of attack. An attack is any attempt by an attacker
to access, damage, steal, or disrupt computer systems, networks, or data
without authorized access or permission.
The meaning of passive is just watching or listening without doing anything.
A passive attack is an attack where the attacker secretly monitors, listens,
or captures data without changing or damaging it.
The goal is usually to steal information secretly.
- In above fig. the sender sends a message to the receiver over the
internet. During transmission, an attacker secretly monitors or
listens to the message without changing or damaging it. The
attacker only tries to gather information. This is called a passive
attack.
Passive attacks are hard to detect because they do not affect system
resources or data.
2. Traffic Analysis:
26
Traffic analysis is a type of passive attack. A passive attack is an attack
where the attacker secretly monitors, listens, or captures data without
changing or damaging it.
In this attack, the attacker observe the pattern, timing and volume of
transmitted data to gather sensitive information without accessing the
actual content of the message.
- In above fig. the sender sends a message to the receiver, and during
transmission, an attacker can observe pattern of the message
without accessing the actual content of message. This is called
traffic analysis.
For example: Watching who is sending messages to whom and how often.
Active Attack
27
An active attack is a type of attack. An attack is any attempt by an attacker
to access, damage, steal, or disrupt computer systems, networks, or data
without authorized access or permission.
In an active attacks, the attacker modify the data stream or the creation of
a false stream.
- In above fig. the sender sends a message to the receiver over the
internet. During transmission, an attacker modifying the message
and then send it to the receiver. The attacker tries to modify the
message. This is called a active attack.
28
1. Interruption
2. Modification
3. Fabrication
4. Replay
5. Masquerade
6. Denial of Service
Sniffing Attack
Sniffing is a type of attack.
29
Sniffing attack is a type of passive attack. A passive attack is an attack
where an attacker secretly monitors, listens, or captures data without
changing or damaging it.
Sniffing means secretly capturing and monitoring data as it travels
across a network.
Sniffing is an attack where an attacker secretly monitor and capture all data
packets passing through a given network using software or a hardware
device.
Sniffing attack is a process of monitoring and capturing all data packets passing through a given
network using software or a hardware device.
It is form of wiretap applied to computer networks.
Attacker use sniffers to capture data containing sensitive information such as password, account
information, etc.
- In the above figure, if you send a request to a website that uses only
HTTP (not HTTPS), your data is not encrypted. Since HTTP is not
secure, a sniffer present on the network can capture and read the
data packets you send. This is called a sniffing attack.
For example: Imagine you want to send a file from your computer to your
friend's computer. Suppose both of you are connected to a particular
network, and a sniffer is also connected to the same network. When the file
is transferred, it is divided into packets at the sender's side. During
transmission, the sniffer can capture and read these packets. This process is
known as packet sniffing, and it is called a sniffing attack.
To detect sniffer, we can use ping method, ARP request method, DNS lookup
test, using detection tool etc.
30
To protect from sniffer attack we can Use HTTPS Instead of HTTP, Use a VPN
(Virtual Private Network), Avoid Public Wi-Fi for Sensitive Tasks, Use
Antivirus and Firewall etc.
Sniffing tools:
1. Wireshark
2. TCP dump
3. Cain and cable
4. Capsa network analyzer
5. Colasoft
6. Nmap
DoS
Denial of Service (DoS) is a cyberattack. A cyberattack is a deliberate
attempt by hackers or malicious individuals to damage, disrupt, steal, or
gain unauthorized access to computers, networks, or data.
In which an attacker overloads a system, server, or network with excessive
traffic or malicious requests, making it slow, unresponsive, or completely
unavailable to legitimate users.
Working:
1 Attacker sends a large number of fake requests to a target server.
2️⃣ The server becomes overwhelmed with the high traffic.
3️⃣ Legitimate users cannot access the service because the server is
too busy handling fake requests.
4️⃣ The website, network, or application crashes or slows down
significantly.
🔹 Flood Attacks – Overloading a system with excessive traffic (e.g., ICMP flood, UDP flood).
🔹 Crash Attacks – Exploiting software vulnerabilities to crash a system.
31
Information Security
32
Information is processed, structured, or organized data that carries
meaning and can be used for decision-making.
Information security is the process of protecting and securing information
and its related data from unauthorized access, misuse, information loss, and
other security threats.
It is also called as cybersecurity or Information Technology (IT) security.
Information security is important for protecting the confidentiality, integrity,
and availability of information systems.
It involves security measures such as data encryption, passwords, antivirus
software, firewalls, and etc. diagram.
Examples:
1. .
2. .
3. .
4. .
Information Classification
Information classification defines what kind of information is stored on the
system.
33
Information Classification is the process of organizing data into
categories based on its level of sensitivity and the impact to the
organization if that information is disclosed, altered, or lost.
Levels of Information Classification:
1. Unclassified
2. Sensitive but unclassified
3. Confidential
4. Secret
5. Top secret
6. Public
7. Sensitive
8. Private
Criteria for Information Classification:
1. Value
2. Age
3. Useful life
4. Personal association
34