Chapter 1-Introduction To Computer Secuirty
Chapter 1-Introduction To Computer Secuirty
1
Outlines
• Define Computer security
2
Overview of Computer
Security?
3
Computer Security terms
• Threats: is a potential violation of security. It is a new or
newly discovered incident that has the potential to harm a
system or your company overall.
• Vulnerabilities: is a weakness which can be exploited by a
threat actor, such as an attacker, to cross privilege boundaries
within a computer system.
• Attack: the actualization of threat due to weakness in
defense.
• Controls: are safeguards or countermeasures to avoid, detect,
counteract, or minimize security risks to computer systems,
or other assets.
• Risk: is defined as the potential for loss or damage when a
threat exploits a vulnerability
4
Computer Security Goals
Prevention of
unauthorized disclosure
of information Confidentiality
Prevention of
Prevention of
unauthorized withholding
unauthorized modification
of information or resource
of information
Integrity
Availaibility
7
Cont’d
• Confidentiality: is the protection of information or resources.
The need for keeping information secret arises from the use
of computers in sensitive fields such as government and
industry. "need to know" principle.
• Ensure that assets are viewable only by authorized parties
– Example: Abebe peeks at Almaz’s password when she is logging in
– Abebe copies a file from Almaz’s account
6
Cont’d
• Ensure assets are usable by and accessible to all
authorized parties
– Example: There is a process running in Almaz’s machine,
which is updating a database from a remote machine. Abebe
interrupts the process, results in inconsistent databases.
• Availability: Assures that systems work promptly
and service is not denied to authorized users.
• Ensure that assets are usable by and accessible to
all authorized parties
– Example: Abebe deletes the file from Almaz’s directory.
7
Cont’d
A security policy is a statement of what is, and
what is not, allowed.
Security mechanism is a method, tool, or procedure
for enforcing
Given a security policy's specification of "secure"
and "non-secure" actions, these security mechanisms
can prevent the attack, detect the attack, or recover
from the attack.
Prevention means that an attack will fail. For
example, if one attempts to break into a host over
the Internet and that host is not connected to the
Internet, the attack has been prevented.
8
Cont’d
9
Computer Security and
Privacy/Attacks
Categories of Attacks
10
Computer Security and
Privacy/Attacks
Categories of Attacks/Threats
Source
Destination
Normal flow of information
Attack
Interception
Interruption
Modification
Fabrication
11
Exercise
Classify each of the following as a violation of confidentiality, of
integrity, of availability, or of some combination.
a. Abebe copies Betty's homework.
b. Lemmessa crashes DDU's system.
c. Almaz changes the amount of Chaltu's check from 100 birr to 1000
birr.
d. Bruk registers the domain name "AddisonWesley.com" and refuses to
let the publishing house buy or use that domain name.
e. Yohannes obtains Petros's credit card number and has the credit card
company cancel the card and replace it with another card bearing a
different account number.
12
Exercise(Cont’d)
a. Betty spoofs Yohannes's IP address to gain access to
her computer.
b. Yohannes peeks at Almaz’s password when she is
logging in.
c. Yohannes logs into Almaz’s account using Almaz’s
password without Almaz knowing about it.
d. There is a process running in Almaz’s machine,
which is updating a database from a remote
machine. Yohannes interrupts the process, results in
inconsistent databases.
e. Yohannes copies a file from Almaz’s account and
then deletes the file from Almaz’s directory
13
Exercise
Authenticating people is typically based on what you know, what you
have, and who you are. Give an example for each of them.
Answer
What you know: password
What you have: smart card
Who you are: biometrics
14
Many Thanks!
Letting if u
have
any