Chp 11 Section 1-3 Notes
Download
Report
Transcript Chp 11 Section 1-3 Notes
Chapter 11
What is a computer security risk?
Any event or action that could cause a loss of or
damage to computer hardware, software, data,
information, or processing capability.
Intentional Breach of Computer Security
Computer Crime (illegal act involving a computer)
Cybercrime (Online or Internet-based illegal acts)
Hacker – Access a computer illegally
Cracker – Access a computer illegally but has
the intent of destroying
Script Kiddie – Same intent but not have the
technical skills and knowledge
Corporate Spies – Hired to break into a
computer, steal data info, to help indentify
security risks
Unethical employees-want to exploit a
security weakness
Cyberextortionist – Use the email as a vehicle
for extortion
Cyberterriorist - Destroy or damage for
political reason
Both requires a team of highly skilled
individuals, millions of dollars and years of
planning
Internet and Network Attacks
Unauthorized Access and Use
Hardware theft
Software theft
Information theft
System failure
What are Computer Viruses, worms, Trojan
horses and Rootkits?
Computer
Viruses
Potentially
damaging
computer
program
Worm
A program that
copies itself
repeatedly, using
up resources and
possibly shutting
down computer
or network
Trojan Horse
Hides within or
looks likes a
legitimate
program until
triggered
Rootkits
Hides in a
computer and
allows someone
from a remote
location to take
full control
What is Malware?
Programs that act without a user’s knowledge and
deliberately alters the computer operation.
Unscrupulous programmer write malware
and then test to ensure it can deliver it
payload (destructive event or prank the
program is intended to deliver)
When a user:
Opens an infected file
Runs an infected program
Boots the computer with an infected removable
media
Connect to an unprotected computer
Most common way – email attachments
No guarantee methods
Some ways to Prevent Viruses
Do not start computer with removable disks
Never open email attachment unless from trusted
source
Install an Antivirus program
Stay informed about new virus and virus hoax
What is an Antivirus program?
•Identifies and removes
computer viruses
•Most also protect against
worms, Trojan horses and
spyware
Popular Antivirus Programs
AVG Anti-Virus
avast! Antivirus
CA Anti-Virus
F-Secure Anti-Virus
Kaspersky Anti-Virus
McAfee Virus Scan
Norton AntiVirus
Trend Micro AntiVirus
Vexira Antivirus
What is a virus signature?
Specific pattern of virus code
•Also called virus definition
Antivirus programs look for virus signatures
How does an antivirus program
Records
inoculate a program file?
information
Uses
information
to detect if
virus
tampers
with file
about
program such
as file s and
creation date
Attempts to
remove any
detected
virus
Quarantines
Infected
files that
cannot
remove
What are a Botnet, denial of service attack,
back door and spoofing?
A Botnet is a group of comprised computers
connected to a network that are used as part of a
network that attack other networks
A denial of service attack is an assault whose
purpose is to disrupt a computer access to an
Internet data
A back door is a program or set of instruction in a
program that allow users to bypass security
controls when accessing a computer resource
Spoofing is a technique intruders use to make
their network or Internet transmission appear
legitimate to a victim computer or network
Firewalls
Protects a network’s resources from intrusion by user on
another network
Intrusion Detection Software
Automatically analyze all network traffic, assess system
vulnerabilities, identifies any unauthorized intrusion, and
notifies network administration of suspicious behavior
pattern.
Honeypots
A vulnerable computer that is setup to enticed an intruder
to break into it
What is Unauthorized Access and
Unauthorized Use?
Unauthorized Access – use of a computer in a
network without permission
Unauthorized Use – the use of a computer or
its data for unapproved or possibility illegal
activities
Use Written Acceptable Use Policy (AUP)
Disable file and printer sharing on your
Internet connection
Use Firewalls
Use Intrusion detection software
Identify and authenticate users
Access controls (security measure that
defines who can access a computer)
Maintain an audit trail (records in a file both
successful and unsuccessful access attempt)
Two – Phase Process
Identification – verifies individual is a valid user
Authentication – verifies the individual is the
person he/she claims to be
User Names and Passwords
Possessed Objects
Biometrics Devices
What are User Names and Passwords?
User ID – a unique combination of character that
identifies on specific user
Password – a private combination of character
associated the user name
Longer passwords provides greater security
CAPTCHA (Completely Automated Public
Turing Test to Tell Computer and Humans
Apart)
Display a series of distorted characters
What is a Possessed Object?
Any items you must carry to gain access to a
computer or a computer facility
▪ Examples: badges, cards, smart cards and keys
Often used with Personal Identification Number
(PIN)
What is a Biometric Devices?
Authenticated a person’s identify by translating a
personal characteristics into digital codes
Examples: Fingerprint readers,
hand geometry systems, face
recognition system, voice
verification system, signature
verification system, iris
recognition system and retinal
scanner
What is Digital Forensics?
Discovery, collection, and analysis of
evidence found on computers and networks
Involves – examination of computer media,
programs, data and log files
What are hardware theft and hardware
vandalism?
Hardware Theft – act of stealing computer
equipment
Vandalism – act of defacing or destroying a
computer
Physical Access Controls
Locked doors
Install alarms
Use cables that lock the equip
Real time location system
▪ Track and Identify the location of high risk or high value
items)
What is software theft?
Occurs when someone
Steals software media
Intentionally erases programs
Illegally copies a program (piracy)
Illegally register and/or activates a program
Keep original software box in a secure
location
Backup files
Protect from software piracy
License agreement (right to use software)
▪ Don’t own the software
▪ Most common type of license – single-use license
agreement/end-user license agreement (EULA)
Permitted to:
Not Permitted to:
Install the software on
Install the software on a
one computer
Make one copy – Backup
Give or sell only if the
software is removed
network
Gives copies to friends
Export the software
Rent or lease the
software
What are some other safeguards against
software theft?
Business Software Alliance (BSA) promotes better understanding of
software piracy problems
Product activation allows user to input product identification number
online or by telephone and receive unique installation identification number
Occurs when someone steals personal or
confidential information
Safeguards
Use user identification and authentication
Use encryption techniques
What is Encryption?
Process of converting readable data into
unreadable characters to prevent unauthorized
access
Encryption Process
▪ Readable data – plaintext
▪ Scramble data – ciphertext
▪ Encryption key – use to encrypt the plaintext
Private Key (symmetric)
Both the originator and recipient use the same
secret key to encrypt and decrypt data
Public Key (asymmetric)
Two encryption keys (public and private)
A message is encrypted with a public key must be
decrypted along with the corresponding private
key
Popular encryption program – Pretty Good
Privacy (PGP)
Digital Certificates- notice that guarantees a
user on a web site is legitimate
Transport Layer Security- provides encryption
of all data that pasts between a client and a
Internet server
Secure HTTP – allows users to choose an
encryption scheme for data that passes
between a client and a Internet server
VPN-Virtual Private Network
Provide the mobile users with a secure connection
to the company network server
What is a system failure?
Prolonged
malfunction of
computer
Can cause loss of
hardware,
software , or data
Caused by aging
hardware, natural
disaster, or electrical
power disturbances
Noiseunwanted
electrical
signal
Undervoltagedrop in
electrical
supply
Overvoltage or
power surgesignificant power
increase in electrical
power
What is a surge protectors?
Absorb small overvoltage
Not 100% effective
Uninterruptible Power
Supply
A device that contains surge
protection circuits and more
batteries that can provide
power during a temporary or
permanent loss of power
What is a backup?
Duplicate of file, program, or disk
Full backup
all files in computer
Selective backup
Select which files to
back up
Three-generation
backup
Preserves three copies
of important files
Store in a fireproof and heat proof safe or vault, offsite