2 The Need For Security
2 The Need For Security
Security
The need of security
By
Dr. Mudassar Raza
Professor
Department of Computer Science
Namal University Mianwali https://techgirls.ece.vt.edu/slides/introduction_to_cybersecurity.html#39
• A hacker sends a malicious email attachment containing malware. When the victim opens it, the malware installs on their system and steals
sensitive information.
• Malware Attacks – Malicious software like viruses, worms, and Trojans infect a system.
• Phishing Attacks – Fake emails or websites trick users into revealing sensitive information.
• Ransomware Attacks – Encrypts user data and demands payment for its release.
• Man-in-the-Middle (MITM) Attacks – Intercepts communication between two parties to steal or alter data.
• What is a Trojan Horse Software Attack? A Trojan Horse is a type of malware that disguises itself as a legitimate program but secretly
performs harmful actions, such as stealing data or giving hackers remote access to a system.
• A user downloads a free game, but it secretly installs a backdoor, allowing hackers to access their computer.
Principals of Information Security, Fourth Edition
By: Dr. Mudassar Raza
Deliberate Software Attacks
• Malicious software (malware) designed to damage, destroy, or deny
service to target systems
• Includes:
• Viruses
• Worms
• Trojan horses
• Logic bombs
• Back door or trap door
• Polymorphic threats
• Virus and worm hoaxes
• Deviation in QoS occurs when the actual service quality does not meet the expected or agreed standards.
• A banking system relies on a high-speed network to process online transactions securely. However, due to network congestion or a Denial-of-Service (DoS) attack, the system experiences:
• Network Congestion – Too many users or data packets slow down the network.
• High Latency (Delay) – Delayed data transmission affects real-time applications like video calls.
• Packet Loss – Data packets fail to reach their destination, causing missing information.
• Trespass is when someone accesses a system, network, or physical place without permission, even if they don’t steal anything.
• Corporate Espionage: A rival company hacks into another company’s database to steal new product designs.
• Government Espionage: A spy secretly steals military plans from another country.
• Cyber Trespass: A hacker gains unauthorized access to a company’s internal system but does not cause damage.
• Ransomware Attack – A hacker encrypts a company's files and demands payment to unlock
them.
• Data Leak Threat – A cybercriminal steals customer data from an online store and threatens
to publish it unless they are paid.
• Personal Blackmail – A hacker gets access to someone's private photos or messages and
demands money to not share them online.
• These terms refer to problems in data, information, or system requirements that can cause errors, misunderstandings, or failures.
• Example: A software update lacks important security patches, making the system vulnerable.
• Example: A company’s password policy is weak (e.g., allowing "12345" as a password), making it easy for hackers to break in.
• Example: A medical report lacks the patient’s full history, leading to incorrect treatment.
• Example: Someone steals a company's server or hard drive containing sensitive data.
• Electronic Theft (Cyber Theft) → Stealing digital data or hacking into systems.
• Example: A hacker steals customer credit card details from an online store.
• No physical break-in.
• Types of Failures:
• A malfunction is when a device, system, or process fails to work correctly or behaves unexpectedly.
• Unrevealed Faults – Software is released with hidden bugs that only appear in certain conditions.
• Compatibility Issues – Some software works fine alone but fails when combined with certain hardware or other programs.
• Poor Testing – Inadequate testing before release leads to unexpected errors in real-world use.
• Examples:
• Old computers, outdated software, and legacy systems no longer meet modern needs.
• Examples: A company still using Windows XP faces security risks because Microsoft no longer supports it.
• An old router cannot handle high-speed internet, causing slow network performance.
• Businesses using floppy disks or outdated databases struggle to integrate with modern systems.
• IT teams play a key role in ensuring software and hardware stay up to date.