Lecture 7 Security
Lecture 7 Security
Security
Introduction
Computer systems are vulnerable to many threats
that can inflict various types of damage resulting in
significant losses of information and or the hard
and software components of a system.
criminal attacks.
Information security
Is the process by which an organization protects and secures its
systems, media, and facilities that process and maintain information
vital to its operations.
Basic security Concepts
Security refers to the policies, procedures, and
technical measures used to prevent unauthorized
access, alteration, theft, or physical damage to
information systems.
Controls are methods, policies, and organizational
procedures that ensure the safety of the
organization’s assets, the accuracy and reliability of
its records, and operational adherence to
management standards.
Basic security Concepts
Computer security:
This is the process that involves security of computer
system assets from damages.
E.g. physical damage, electric shock etc. allowing the
information and property to remain accessible and
productive to its intended users.
Basic security Concepts
Threat -a possible danger that might exploit a
vulnerability to breach security and thus cause
possible harm
Attacks-A vulnerability that has been
compromised and exploited to cause harm to a
computer system
Basic security Concepts
Risk-Event or action that causes loss of or damage
to computer system
A vulnerability that could allow loss of
confidentiality, integrity, or availability of
computer services and where there is a possibility
of the vulnerability being exploited.
Differences between Information security and
computer security
Computer security mainly involves protecting the computer
system hardware from theft, physical damages etc.
Involves the review of physical security of your premises which
include door locks, storage of duplicate keys etc
Confidentiality:
It involves keeping information away from people who should not have
it.
Accomplishing this objective requires that we know what data we are
protecting and who should have access to it.
It requires that we provide protection mechanisms for the data while it
is stored in the computer and while it is being transferred over networks
between computers.
Integrity:
This is the second objective of information security.
Keeping data away from those who should not have it and making sure
that those who should have it can get it are fairly basic ways to maintain
the integrity of the data.
Availability:
It ensures that data stored in the computer can be accessed by the
people who should access it.
Availability is a broad subject addressing things such as denial of
service and access control to ensure that data is available to those
authorized to access it.
Availability means ensuring that the data can be accessed by all
authorized people.
Availability Aspects
Non repudiation:
Method by which the sender of data is provided with proof of
delivery and the recipient is assured of the sender's identity, so that
neither can later deny having processed the data.
Objectives of Information
security.
Non repudiation:
Prevents an individual or entity from denying having
performed a particular action related to electronic data
(such as origin, intent or ownership).
The violation needs not to actually occur for a threat to be there; the
fact that the violation may occur means that those actions that could
cause it to occur must be guarded against (or prepared for).
Those actions are called attacks and the people who execute such
actions or cause them to be executed are called attackers.
Threats
Threats
Neither replicates nor copies itself, and its file name is normally
misleading to entice you to open it. ...
Threats
Errors and Omissions
Caused by all types of users who create and edit
data.
Users, data entry clerks, system operators, and
programmers frequently make errors that contribute
directly or indirectly to security problems. In some
cases, the error is the threat, such as a data entry
error or a programming error that crashes a system.
In other cases, the errors create vulnerabilities.
Threats
Fraud and Theft
Computer systems can be exploited for both fraud
and theft both by "automating" traditional methods
of fraud and by using new methods.
For example, individuals may use a computer to
skim small amounts of money from a large number
of financial accounts, assuming that small
discrepancies may not be investigated
Threats
Computer fraud and theft can be committed by
insiders or outsiders. Insiders (i.e., authorized users
of a system) are responsible for the majority of
fraud.
Since insiders have both access to and familiarity
with the victim computer system (including what
resources it controls and its flaws), authorized
system users are in a better position to commit
crimes.
Threats
Insiders can be both general users (such as clerks)
or technical staff members.
An organization's former employees, with their
knowledge of an organization's operations, may
also pose a threat, particularly if their access is not
terminated promptly.
Software Theft
Act of stealing or illegally stealing software,
copying software or intentionally erasing programs
Software piracy is illegal duplication of
copyrighted software
Software Theft
Some software can be free for use, editing and
distribution for example open source software
while other types of software are free for sharing
and use especially in the education sector while
other types of software have to be purchased –
copying of these types of software is not allowed as
this breaches the developers copyrights.
Employee Sabotage
Employees are most familiar with their employer's
computers and applications, including knowing
what actions might cause the most damage,
mischief, or sabotage.
The downsizing of organizations in both the public
and private sectors has created a group of
individuals with organizational knowledge, who
may retain potential system access (e.g., if system
accounts are not deleted in a timely manner).
Employee Sabotage
Destroying hardware or facilities,
Planting logic bombs that destroy programs or data,
Entering data incorrectly, "crashing" systems,
Deleting data,
Holding data hostage, and
Changing data.
Some ways of ensuring computer security so
as to guarantee information security
• Using Password
A good pass word is at least 6 characters long, is not a word that appears in
any dictionary and includes at least one special character.
It should be easy for the user to remember so that the user wont be prompted
to write it down
it should not be based on the users birthday, dogs name, or any such
personal attribute.
One way to create acceptable pass word is to replace letters with numerals
or characters. e.g.
-Dest%360#
-Ge380ther$
Some ways of ensuring computer security so as to
guarantee information security
Using firewall.
A firewall is software or hardware that checks information coming from
the Internet or a network, and then either blocks it or allows it to pass
through to your computer, depending on your firewall settings.
A firewall can also help stop your computer from sending malicious
software to other computers.
Fire- the most serious and costly hazard. It destroys data, information,
software and hardware.
Security measures against fire include:
Fire proof cabinets
Have fire extinguishers
Have fire detectors
Training of fire officers
Observation of safety procedures e. avoid smoking in computer rooms.
Environmental threats/Hazards to
computers and Information systems
Water/Flood and moisture. This causes components of a
computer to rust. Security measures include;
Setting up computer rooms on higher grounds to avoid floods.
Adequate drainage system
Use of water proof ceiling and floors.
Environmental threats/Hazards cont…d
Lightening & electricity- this causes power failure which can cause
damage to data which have not been transferred to permanent
storage media services.
Security measures;
Use of uninterrupted power supply (UPS)
Use stand by power generators/source
Have lightening arrestors in the building
Use power stabilizers.
Environmental threats/Hazards cont…
d
Terrorist Attacks. This includes activities like political
terrorists e.g. bombs, criminal type of activities. Security
measures include;
Control physical access to be building housing the computer room.
Consult with police and fire authorities about potential risks and co-
operation.
Conclusion
Security Is a Process
Security is never finished
– Technology changes
– People forget working methods
Security is a continuous loop of
– Planning
– Implementing
– Evaluating
Reading: Laudon and Laudon 15
edition Chapter 8
Why are information systems vulnerable to
destruction, error and abuse?
Why are systems vulnerable?
Identify contemporary security challenges and
vulnerabilities
Internet vulnerabilities
Wireless security challenges
Malicious software
Hackers and computer crime
Reading: Laudon and Laudon 15
edition Chapter 8
Spoofing and Sniffing
Denial-of-Service Attacks
Identity Theft
Click Fraud
Global Threats: Cyberterrorism and Cyberwarfare
Internal threats: employees
Software vulnerability
Reading: Laudon and Laudon 15
edition Chapter 8
Business value of security and control
Legal and regulatory requirements for electronic
records management
Electronic evidence and computer forensics
Components of organizational framework for
security and control
Information system controls
Risk assessment
Security policy
Reading: Laudon and Laudon 15
edition Chapter 8
Disaster recovery planning and business continuity
planning
Role of auditing
Tools and technologies for safeguarding
information resources
Identity management and authentication
Firewalls, intrusion detection systems and antivirus
software
Securing wireless networks
Reading: Laudon and Laudon 15
edition Chapter 8
Encryption and public key infrastructure
Ensuring system availability
Security issues for cloud computing and mobile
platforms
Ensuring software quality