Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

EFFECTS AND CONTRIBUTIONS OF COMPUTER since then until now in modern > LAUNCH DENIAL-OF-SERVICE ATTACKS RENDERING THE

HE MACHINE
society TEMPORARILY UNUSABLE

EDUCATION COMPUTER SECURITY ISSUES

Ø CHILDREN ARE OUTPACING ADULTS ON THE TECHNOLOGY TRACK. Ø BROWSER-SIDE RISKS INCLUDING:

Ø EDUCATION PLAYS A MAJOR ROLE IN GUIDING THE CHILDREN TO MAKE > ACTIVE CONTENT THAT CRASHES THE BROWSER, DAMAGES THE USER’S
USE OF THE BEST OF THE COMPUTER TECHNOLOGY. SYSTEM, BREACHES THE USER’S PRIVACY, OR MERELY CREATES AN
ANNOYANCE
Ø CURRENT EDUCATION SYSTEMS MUST UNDERGO SIGNIFICANT REFORM
TO SERVE THE NEEDS OF THE YOUNGER GENERATIONS. > THE MISUSE OF PERSONAL INFORMATION KNOWINGLY OR UNKNOWINGLY
PROVIDED BY THE END-USER
Ø COMPUTERS AND THE INTERNET CAN HELP IN MAKING LESSONS
CUSTOMIZED AND STUDENT-CENTERED > INTERCEPTION OF NETWORK DATA SENT FROM BROWSER TO SERVER OR
VICE VERSA VIA NETWORK EAVESDROPPING
CAREERS AND PROFESSIONAL OUTLOOK
ASPECTS OF COMPUTER SECURITY
Ø CHANGE THAT INVOLVES NEW AND COMPLEX TECHNOLOGIES ARE
STRESSFUL TO OLDER AND LESS EDUCATED WORKERS. > PHYSICAL SECURITY

Ø COMPUTER LITERACY IS AN ADVANTAGE ON MOST JOBS NOWADAYS. Ø > VIRUSES


MANAGEMENT SUPPORTS THE USE OF TECHNOLOGY TO IMPROVE
PRODUCTIVITY WHICH IN MANY INSTANCES MEAN THE ELIMINATION OF > MALICIOUS LOGIC
JOBS.
> HACKING
SECURITY -COMPUTER CRIMES
> INTERNAL MISUSE
> COULD REASONABLY INCLUDE A WIDE VARIETY OF CRIMINAL OFFENSES,
ACTIVITIES, OR ISSUES > SPOOFING

> CAN BE SEPARATED INTO TWO (2) CATEGORIES: ETHICS

• CRIMES FACILITATED BY A COMPUTER > THE RULES AND STANDARDS GOVERNING THE CONDUCT OF AN
INDIVIDUAL WITH OTHERS
• CRIMES WHERE THE COMPUTER IS THE TARGET
• COPYRIGHT - A FORM OF PROTECTION PROVIDED BY LAW TO AUTHORS OF
ORIGINAL WORKS, OTHERWISE KNOWN AS THEIR INTELLECTUAL PROPERTY

COMPUTER SECURITY ISSUES • A COPYRIGHT OWNER HAS THE SOLE RIGHT TO: – REPRODUCE THE
MATERIAL – PREPARE DERIVATIVE WORKS BASED ON THE MATERIAL –
Ø BUGS OR MISCONFIGURATION PROBLEMS THAT ALLOW UNAUTHORIZED DISTRIBUTE THE COPIES OF THE MATERIAL TO THE PUBLIC – PERFORM THE
REMOTE USERS TO: WORK PUBLICLY (IF APPLICABLE) – DISPLAY THE WORK PUBLICLY

> STEAL CONFIDENTIAL DOCUMENTS > EXECUTE COMMANDS ON THE HOST • PRIVACY
MACHINE, ALLOWING THEM TO MODIFY THE SYSTEM
• CENSORSHIP
> GAIN INFORMATION ABOUT THE HOST MACHINE, ALLOWING THEM TO
BREAK INTO THE SYSTEM SECURITY INCIDENTS
Ø THERE ARE MANY DIFFERENT WAYS TO ATTACK COMPUTERS AND Ø INTEGRITY — RELATED TO CONCEPT BUT DEALS WITH THE GENERATION
NETWORKS TO TAKE ADVANTAGE OF WHAT HAS MADE SHOPPING, BANKING, AND MODIFICATION OF DATA.
INVESTMENT, AND LEISURE PURSUITS A SIMPLE MATTER OF “DRAGGING
AND CLICKING” FOR MANY PEOPLE. Ø AVAILABILITY — ENSURE THAT THE DATA, OR THE SYSTEM ITSELF, IS
AVAILABLE FOR USE WHEN THE AUTHORIZED USER WANTS IT.
Ø DIFFERENT TYPES OF ELECTRONIC CRIME FALL INTO TWO MAIN
CATEGORIES: > AUTHENTICATION — DEALS WITH THE DESIRE TO ENSURE THAT AN
INDIVIDUAL IS WHO THEY CLAIM TO BE.
> CRIMES IN WHICH THE COMPUTER WAS THE TARGET OF THE ATTACK
> NONREPUDIATION — DEALS WITH THE ABILITY TO VERIFY THAT A
> INCIDENTS IN WHICH THE COMPUTER WAS A MEANS OF PERPETRATING A MESSAGE HAS BEEN SENT AND RECEIVED AND THAT THE SENDER CAN BE
CRIMINAL ACT IDENTIFIED AND VERIFIED.

SECURITY INCIDENTS SECURITY PRINCIPLES

> THE MORRIS WORM (NOVEMBER, 1988), CITIBANK AND VLADIMIR LEVIN Ø THREE WAYS AN ORGANIZATION CAN CHOOSE TO ADDRESS THE
(JUNE-OCTOBER, 1994), KEVIN MITNICK (FEBRUARY, 1995), OMEGA PROTECTION OF ITS NETWORKS:
ENGINEERING AND TIMOTHY LLOYD (JULY, 1996), JESTER AND THE
WORCESTER AIRPORT (MARCH, 1997), SOLAR SUNRISE (FEBRUARY, 1998), > IGNORE SECURITY ISSUES
THE MELISSA VIRUS (MARCH, 1999), THE LOVE LETTER WORM (MAY, 2000),
THE CODE-RED WORM (2001), ADIL YAHYA ZAKARIA SHAKOUR (AUGUST, > PROVIDE HOST SECURITY
2001-MAY, 2002), THE SLAMMER WORM (2003)
> APPROACH SECURITY AT A NETWORK LEVEL
THREATS TO SECURITY
Ø HOST SECURITY
> VIRUSES AND WORMS > INTRUDERS > INSIDERS > CRIMINAL
> TAKES A GRANULAR VIEW OF SECURITY BY FOCUSING ON PROTECTING
ORGANIZATIONS > TERRORISTS AND INFORMATION WARFARE
EACH COMPUTER AND DEVICE INDIVIDUALLY INSTEAD OF ADDRESSING
SECURITY BASICS PROTECTION OF THE NETWORK AS A WHOLE

Ø IN SOME SENSE, SECURITY IS CONCERNED WITH PREVENTING UNDESIRED Ø NETWORK SECURITY


BEHAVIOR.
> EMPHASIS IS PLACED ON CONTROLLING ACCESS TO INTERNAL
> AN ENEMY/OPPONENT/HACKER/ADVERSARY MAY BE ACTIVELY AND COMPUTERS FROM EXTERNAL ENTITIES
MALICIOUSLY TRYING TO CIRCUMVENT ANY PROTECTIVE MEASURES YOU
LEAST PRIVILEGE
PUT IN PLACE.
Ø LEAST PRIVILEGE MEANS THAT A SUBJECT (WHICH MAY BE A USER,
Ø COMPUTER VS. NETWORK SECURITY
APPLICATION, OR PROCESS) SHOULD HAVE ONLY THE NECESSARY RIGHTS
> COMPUTER SECURITY FOCUSES ON SECURITY ASPECTS OF SYSTEMS IN AND PRIVILEGES TO PERFORM ITS TASK WITH NO ADDITIONAL
ISOLATION. (E.G. VIRUSES, SECURE DATA STORAGE, OS SECURITY) PERMISSIONS.

> NETWORK SECURITY FOCUSES ON SECURITY OF DATA AS IT IS Ø THE CONCEPT OF LEAST PRIVILEGE APPLIES TO MORE NETWORK
TRANSMITTED BETWEEN NETWORKED SYSTEMS. (E.G. AUTHENTICATION SECURITY ISSUES THAN JUST PROVIDING USERS WITH SPECIFIC RIGHTS
PROTOCOLS, ENCRYPTION OF TRANSMITTED DATA, FIREWALLS) AND PERMISSIONS.

THE CIA OF SECURITY Ø ANOTHER ISSUE IN LEAST PRIVILEGE CONCEPT IS THE SECURITY
CONTEXT IN WHICH AN APPLICATION RUNS. ALL APPLICATIONS, SCRIPTS,
Ø CONFIDENTIALITY — ENSURE THAT ONLY THOSE INDIVIDUALS WHO HAVE AND BATCH FILES RUN IN THE SECURITY CONTEXT OF A SPECIFIC USER ON
THE AUTHORITY TO VIEW A PIECE OF INFORMATION MAY DO SO. AN OPERATING SYSTEM
DIVERSITY OF DEFENSE

Ø DIVERSITY OF DEFENSE IS A CONCEPT THAT COMPLEMENTS THE IDEA OF


VARIOUS LAYERS OF SECURITY. IT INVOLVES MAKING DIFFERENT LAYERS
OF SECURITY DISSIMILAR SO THAT EVEN IF ATTACKERS KNOW HOW TO GET
THROUGH A SYSTEM MAKING UP ONE LAYER, THEY MAY NOT KNOW HOW TO
GET THROUGH A DIFFERENT TYPE OF LAYER THAT EMPLOYS A DIFFERENT
SYSTEM FOR SECURITY.

ACCESS CONTROL

Ø DISCRETIONARY ACCESS CONTROL

> AN ACCESS CONTROL MECHANISM IN WHICH THE OWNER OF AN OBJECT


(SUCH AS A FILE) CAN DECIDE WHICH OTHER SUBJECTS (SUCH AS OTHER
USERS) MAY HAVE ACCESS TO THE OBJECT, AND WHAT ACCESS (READ,
WRITE, EXECUTE) THESE SUBJECTS MAY HAVE Ø MANDATORY ACCESS
CONTROL

> AN ACCESS CONTROL MECHANISM IN WHICH THE SECURITY MECHANISM


CONTROLS ACCESS TO ALL OBJECTS (FILES), AND INDIVIDUAL SUBJECTS
(PROCESSES OR USERS) CANNOT CHANGE THAT ACCESS Ø ROLE-BASED
ACCESS CONTROL

> AN ACCESS CONTROL MECHANISM IN WHICH, INSTEAD OF THE USERS


BEING ASSIGNED SPECIFIC ACCESS PERMISSIONS FOR THE OBJECTS
ASSOCIATED WITH THE COMPUTER SYSTEM OR NETWORK, A SET OF ROLES
THAT THE USER MAY PERFORM WILL BE ASSIGNED TO EACH USER

You might also like