E Security System
E Security System
Unit 4
Threats to the computer
System and Control
Measures
Chapter 1
⚫ A computer system threat is anything that leads to loss or
corruption of data or physical damage to the hardware and/or
infrastructure.
⚫ Knowing how to identify computer security threats is the first step in
protecting computer systems.
⚫ The threats could be intentional, accidental or caused by natural
disasters.
⚫ Types of Threat:
⚫ Security Threat
⚫ Physical Threats
⚫ Non-physical threats
What is a Security Threat?
⚫ Security Threat is defined as a risk that which can potentially harm
computer systems and organization.
⚫ The cause could be physical such as someone stealing a computer that
contains vital data.
⚫ The cause could also be non-physical such as a virus attack.
⚫ In these area, we will define a threat as a potential attack from a hacker
that can allow them to gain unauthorized access to a computer system.
What are Physical Threats?
⚫ A physical threat is a potential cause of an incident that may result in
loss or physical damage to the computer systems.
⚫ The following list classifies the physical threats into three (3) main
categories;
⚫ Internal: The threats include fire, unstable power supply, humidity in the
rooms housing the hardware, etc.
⚫ External: These threats include Lightning, floods, earthquakes, etc.
⚫ Human: These threats include theft, vandalism of the infrastructure and/or
hardware, disruption, accidental or intentional errors.
To protect computer systems from the above mentioned physical threats, an
organization must have physical security control measures.
The following list shows some of the possible measures that can be taken:
Humans: Threats such as theft can be prevented by use of locked doors and
restricted access to computer rooms.
What are Non-physical threats?
⚫ A non-physical threat is a potential cause of an incident that may
result in;
⚫ Loss or corruption of system data
⚫ Disrupt business operations that rely on computer systems
⚫ Loss of sensitive information
⚫ Illegal monitoring of activities on computer systems
⚫ Cyber Security Breaches
⚫ Others
⚫ The non-physical threats are also known as logical threats. The following
list is the common types of non-physical threats;
⚫ Virus
⚫ Trojans
⚫ Worms
⚫ Spyware
⚫ Key loggers
⚫ Adware
⚫ Backdoor
⚫ Wabbit
⚫ Exploit
⚫ Phishing
⚫ Other Computer Security Risks
⚫ To protect computer systems from the above-mentioned threats,
an organization must have logical security measures in place.
⚫ The following list shows some of the possible measures that can be
taken to protect cyber security threats :
⚫ To protect against viruses, Trojans, worms, etc. an organization
can use anti-virus software.
⚫ In additional to the anti-virus software, an organization can also have
control measures on the usage of external storage devices and visiting
the website that is most likely to download unauthorized programs onto
the user’s computer.
⚫ Unauthorized access to computer system resources can be
prevented by the use of authentication methods. The authentication
methods can be, in the form of user ids and strong passwords, smart
cards or biometric, etc.
⚫ Intrusion-detection/prevention systems can be used to protect
against denial of service attacks. There are other measures too that
can be put in place to avoid denial of service attacks.
IT Risk
Chapter 2
IT Risk
⚫ Information technology risk, IT risk, IT-related risk, or cyber risk is
any risk related to information technology
⚫ While information has long been appreciated as a valuable and important
asset Various events or incidents that compromise IT in some way can
therefore cause adverse impacts on the organization's business processes
or mission, ranging from inconsequential to catastrophic in scale.
⚫ The following are the list of 3 definitions of IT Risks.
⚫ ISO :
⚫ IT risk: the potential that a given threat will exploit vulnerabilities of
an asset or group of assets and thereby cause harm to the organization. It
is measured in terms of a combination of the probability of occurrence of an
event and its consequence.
1. Risk Acceptance
2. Risk Avoidance
3. Risk Limitations
4. Risk Tranference
Security On the Internet
Chapter 3
Network and Website Security Risks
1. Viruses and Worms
2. Trojan Horses
3. SPAM
4. Phishing
5. Packet Sniffer
6. Maliciously Coded Website
7. Password Attacks
8. Hardware Loss and Residual Data Fragments
9. Shared Computers
10. Zombie Computers and Botnets
Website Hacking and issues Therein
The reality is that access control is much more important than most give credit. It is like the person
that locks their front door but leaves every window unlatched and the alarm system turned off. This
begs the question, why did you even lock the door?
Exploitation of access control often comes in the form of a brute force attack, in which the attacker
attempts to guess the possible username and password combinations in an effort to log in as the user.
2. Software Vulnerabilities :
Third-party integrations and services have become commonplace in today’s website ecosystem,
and are especially popular in the highly extensible Content Management Systems (CMS) like
WordPress, Joomla! and Drupal.
The problem with the exploitation of third-party integrations and services is that
it is beyond the website owner’s ability to control. We assume when we
integrate third-party providers that they are ensuring the service you consume
is safe, but like everything else there is always the chance of compromise.
● IP Spoofing Attacks
● Denial of service attacks ( DoS Attacks)
● Sniffer Attacks
● Man in the Middle
The national Institute Of Standars and Techonology (NIST) 800 -10 divides
Firewalls Into three basic types:
1. Packet Filters
2. Stateful Inspection
3. Proxys
Other Firewalls :
1. Network Layer
2. Application layer
3. Circuit Level Gateways
4. Application Level Gateways
5. Software firewall
6. Hardware Firewall
Firewall Implentation
Step 1: Secure your firewall
If an attacker is able to gain administrative access to your firewall it is “game over”
for your network security. Therefore, securing your firewall is the first and most
important step of this process.
Once you have finished testing your firewall, your firewall should be ready for production.
Real Time Applications in Business
Real Time System : A real-time system is a type of hardware or software that operates
with a time constraint.
Real time: It is the time span taken by the system to complete all its tasks and
provides an output for an input. This time span should be the same for computation of
all its tasks.
Real time system: Real time systems are those which must produce the correct
response within the specified or defined time limit. If it exceeds these time bonds it
results in performance degradation and/or malfunction of system.
For example in aircraft engine control system, the real time control system should
perform its task within a specified time as the operator/pilot intended and failure of this
can cause the loss of control and possibly the loss of many lives.
Real time program: A program for which the correctness of operation depends upon
the logical output of the computation and the time at which the results are produced.
Every real time system must be having real time clock which specifies the time of the
execution of the task or interruption of the task.
Types of real time system:
As per the clock and execution procedure of task the real time systems are
divided as follows
For example of feedback control of tank level, the real time system should read the
level of the tank, process it with control algorithm and actuate the valve accordingly
to maintain the level. These three tasks should perform in the specified time
interval i.e sampling of input, processing and output response.
This clock can be continuous or discrete. In continuous the system
will perform the task continuously within a specified time. This is
same as above tank level controller where it is a continuous control
process. In some chemical industries, The chemicals should be
added with some specified intervals these are called discrete
control systems.
Event based real time system:
In plants there are some systems where actions have to be performed in response of
some events instead of some particular time intervals.
For example the control system has to close the value if the liquid level in the tank
reaches its high level. Here this action is not time based, its an event based and these
are used extensively to indicate the alarm conditions and initiate alarm actions, for
example indicating the liquid level in the tank high or temperature of the liquid high etc.
The specification of event based systems usually indicates that the system must
respond within specified maximum time to a particular event.
These systems uses interrupts to indicate the real time system that the action is
required. Some small system uses Polling i.e the system periodically asks the various
sensors to see whether the action is required.
These systems are basically aperiodic tasks and may have deadlines expressed in terms
of start up time or finish time.
For example after sensing of level of liquid the the valve closer should start after some
interval.
Interactive systems:
The combination of Clock based system and Event based system
which gives the importance of average execution time of the
task is called interactive systems.
This covers the systems like Automatic teller machine,
reservation system for hotels, Airlines booking etc.
This systems receive the input from the plant or operator and
initiate the task and executes within the average response time.
For an example if you want draw cash from ATM when u put your
card then it process the task of giving the money out.
In this case the response time depends on the network traffic
and internal processing time and it does not bother about other
atmospheric changes.
Classification Of Real-Time Systems
Real-Time systems can be classified from different perspectives
The first two classifications, hard real-time versus soft real-time, and fail-safe
versus fail-operational, depend on the characteristics of the application, i.e., on
factors outside the computer system.
Time Frame
The time between when the user inputs the data into the computer and when
the computer performs the expected output is called the response time.
Real-time systems have predictable response times.
Batch processing does not have a specific moment at which tasks are
completed,
Deadlines
A hard real-time system is one in which the failure to meet even one deadline
indicates a complete system failure. With soft real-time, missing a deadline
indicates that the system is not working at its peak.
In batch processing, missed deadlines might mean that the computer needs more
processing capacity to finish tasks.
Embedded
Real-time processors are usually embedded, meaning they do not have an operating
system interface and are used only to control hardware devices.
For example, a digital thermometer might have a real-time processor embedded in
the thermometer that gives a continuously correct temperature.
Batch processes are usually a part of a larger computer system.
Predictability Vs. Flexibility
Postponing
With batch processing, processes are saved for when the computer is not executing
very many tasks, such as in the evening when a business is not very busy.
For example, a company can refrain from running antivirus scans when the
company is busy, since the scans use up computer processing power.
Administrators often start antivirus scans at night, when most of the workers have
gone home.
Real-time processing usually occurs whenever the processor receives an input.
Outside Computing
The main difference between online and real-time is the interference of a person
behind the web application to check for a certain situation.
In a real-time environment there is no human interference.