12
submitted by: RENU YADAV  Mba(eb) 3 rd sem IIyear 

Computer Security Issues and Concerns[1]

  • Upload
    renuya2

  • View
    218

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Computer Security Issues and Concerns[1]

8/2/2019 Computer Security Issues and Concerns[1]

http://slidepdf.com/reader/full/computer-security-issues-and-concerns1 1/12

submitted by:RENU YADAV 

 Mba(eb) 3 rd sem IIyear 

Page 2: Computer Security Issues and Concerns[1]

8/2/2019 Computer Security Issues and Concerns[1]

http://slidepdf.com/reader/full/computer-security-issues-and-concerns1 2/12

What does it mean to be secure? “Include protection of information from theft or corruption, or

the preservation of availability, as defined in the securitypolicy.” 

Types of Security Network Security

System and software security

2

Page 3: Computer Security Issues and Concerns[1]

8/2/2019 Computer Security Issues and Concerns[1]

http://slidepdf.com/reader/full/computer-security-issues-and-concerns1 3/12

In 1983, Kevin Mitnick did an intrusion on a Pentagon’s

computer

Robert Tappan Morris created the first worm and sent itfrom MIT to the web and caused $50,000 of damages

In 1994, Vladimir Levin intruded in an American bankcomputer and stole 10 millions dollars

Today (CSI Report, 2007): 46% of companies have admitted to suffering financial losses due to

security incidences. The reported loss amounted to a total ofapproximately $66,930,000.

39% of companies have been unable (or unwilling) to estimate the costof their losses.

Financial Losses, Personal losses, Privacy losses, DataLosses, Computer Malfunction and more….. 

Page 4: Computer Security Issues and Concerns[1]

8/2/2019 Computer Security Issues and Concerns[1]

http://slidepdf.com/reader/full/computer-security-issues-and-concerns1 4/12

Computer and Network security was not atall well known, even about 12 years ago

Today, it is something everyone is aware of

the need, but not sure what is really means Interesting topic of threats,

countermeasures, risks, stories, events andparanoia

With some mathematics, algorithms, designs andsoftware issues mixed in

Yet, not enough people, even security specialistsunderstand the issues and implications

Page 5: Computer Security Issues and Concerns[1]

8/2/2019 Computer Security Issues and Concerns[1]

http://slidepdf.com/reader/full/computer-security-issues-and-concerns1 5/12

Type of attacks:

Denial of Service.

Information Theft.

Intrusion.

Page 6: Computer Security Issues and Concerns[1]

8/2/2019 Computer Security Issues and Concerns[1]

http://slidepdf.com/reader/full/computer-security-issues-and-concerns1 6/12

Phishing An evil website pretends to be a trusted website

Example: You type, by mistake, “mibank.com” instead of 

“mybank.com” 

mibank.com designs the site to look like mybank.comso the user types in their info as usual

Cross Site Scripting Writing a complex Java script program that steals

data left by other sites that you have visited insame browsing session

6

Page 7: Computer Security Issues and Concerns[1]

8/2/2019 Computer Security Issues and Concerns[1]

http://slidepdf.com/reader/full/computer-security-issues-and-concerns1 7/12

Packet Sniffing Internet traffic consists of data “packets”, and these

can be “sniffed” 

Leads to other attacks such aspassword sniffing, cookie,

information stealing

Man in the Middle Insert a router in the path between client and

server, and change the packets as they pass through

7

Page 8: Computer Security Issues and Concerns[1]

8/2/2019 Computer Security Issues and Concerns[1]

http://slidepdf.com/reader/full/computer-security-issues-and-concerns1 8/12

Integrity:

Guarantee that the data is what we expect

Confidentiality

The information must just be accessible to theauthorized people

Reliability

Computers should work without having

unexpected problems Authentication

Guarantee that only authorized persons canaccess to the resources

8

Page 9: Computer Security Issues and Concerns[1]

8/2/2019 Computer Security Issues and Concerns[1]

http://slidepdf.com/reader/full/computer-security-issues-and-concerns1 9/12

Online banking, trading, purchasing may beinsecure Credit card and identity theft

Personal files could be corrupted All data, music, videos, etc. may be lost

Computer may become too slow to run If you aren't part of the solution you are part of the

problem

Upon discovery, vulnerabilities can be usedagainst many computers connected to theinternet.

9

Page 10: Computer Security Issues and Concerns[1]

8/2/2019 Computer Security Issues and Concerns[1]

http://slidepdf.com/reader/full/computer-security-issues-and-concerns1 10/12

 Vulnerability is a point where a system issusceptible to attack.

A threat is a possible danger to the system.

The danger might be a person (a systemcracker or a spy), a thing (a faulty piece ofequipment), or an event (a fire or a flood)that might exploit a vulnerability of the

system.Countermeasures are techniques for

protecting your system

Page 11: Computer Security Issues and Concerns[1]

8/2/2019 Computer Security Issues and Concerns[1]

http://slidepdf.com/reader/full/computer-security-issues-and-concerns1 11/12

Many techniques exist for ensuring computerand network security Cryptography

Secure networks

Antivirus software Firewalls

In addition, users have to practice “safecomputing”  Not downloading from unsafe websites Not opening attachments

Not trusting what you see on websites

Avoiding Scams

Page 12: Computer Security Issues and Concerns[1]

8/2/2019 Computer Security Issues and Concerns[1]

http://slidepdf.com/reader/full/computer-security-issues-and-concerns1 12/12