CSCL Unit 2
CSCL Unit 2
Textbooks
1. Debby Russell and Sr. G.T Gangemi, "Computer Security Basics (Paperback)”, 2ndEdition, O’ Reilly
Media, 2006. Computer Security Basics - Google Books
2. Cyber Laws and IT Protection, Harish Chander, PHI, 2012
Introduction to computer Security
Continues…
5
Integrity Availability
Availability is making sure that authorized
Integrity refers to protecting parties are able to access the information
information from being modified by when needed.
unauthorized parties.
6
Identification, Authentication, Authorization and Accountability
These are other terms but part of CIA model
Identification describes a method of ensuring that a user is the
entity it claims to be. Identification can be provided with the use
of a username or account number.
Authentication Prove you are XYZ, using multifactor
authentication like password, biometric, passport, ID etc.
Authorization What are you allowed to access?
Accountability (also referred as Auditing)
Trace an action to a User’s Identity
Prove Who/what a given action was perform by (non-repudiation)
Threats to Security
Vulnerability – weakness in a system
Threat – possible danger to the system
Countermeasures – techniques for protecting the system
Vulnerabilities
Physical Vulnerabilities – intruder breaks into buildings & equipment/server
room
Natural Vulnerabilities – computers vulnerable to natural disasters (fire, flood,
earthquakes, power loss) and environmental threats.(Dust, humidity, uneven
temp.)
Hardware and software Vulnerabilities
Media Vulnerabilities – Damaged backup media
Communication Vulnerabilities - interception
Human Vulnerabilities – poorly trained administrator Continues…
Threats
Natural and physical threats – threats related to fire, flood, power failures
and other disasters.
Can’t prevent such disasters but can be detected quickly using fire alarms,
sensors etc.
Unintentional threats – ignorance creates dangers
More information is compromised, corrupted or lost through ignorance
Intentional threats – outsiders and insiders
Countermeasures
Computer security
Communication security
Physical security
Government requirements
The computer vendors who want to sell lot of work
stations to govt., they are forced to build security into
those products.
- Most govt. agencies specify security requirements along
with the operational requirements.
- The seller need to use encryption to protect stored and
transmitted data.
- Information protection : govt. agencies need to protect
sensitive info. from theft, modification, data breaches
and need to ensure integrity of the information.
Information Protection and Access Controls
Access control is a security technique that regulates who or what can view or use resources in a
computing environment. It is a fundamental concept in security that minimizes risk to the business or
organization.
There are two types of access control: physical and logical. Physical access control limits access to
campuses, buildings, rooms and physical IT assets. Logical access control limits connections to
computer networks, system files and data.
Physical access control can be limited by access card readers, auditing and reports to track employee
access to restricted business locations and proprietary areas, such as data centers. Some of these
systems incorporate access control panels to restrict entry to rooms and buildings, as well as alarms
and lockdown capabilities, to prevent unauthorized access or operations.
Logical access control systems perform identification authentication and authorization of users and
entities by evaluating required login credentials that can include passwords, personal identification
numbers, biometric scans, security tokens or other authentication factors. Multifactor authentication
(MFA), which requires two or more authentication factors, is often an important part of a layered
defense to protect access control systems.
For the purposes of jurisdiction websites can be divided into two groups:
Passive and Interactive Sites: These sites provide information in a read
only format.
Interactive Sites: These encourage the browser to enter information
identifying the browser and/or providing background on the browser's
interest or buying habits.
The Role of Electronic Signatures in E-commerce with
Reference to Free Market Economy in India