Unit - I Introduction To Computer Security PDF
Unit - I Introduction To Computer Security PDF
) 14 Marks
Availability: Assures that systems work promptly and service is not denied to
legitimate users.
Risks: Having rated the value of assets, the criticality of vulnerabilities and the
likelihood of threats, we now face the tricky task of calculating our risks.
Counter Measures:
The result of a risk analysis is a prioritized list of threats, together with
recommended countermeasures to mitigate risk. Risk analysis tools usually come
with a knowledge base of countermeasures for the threats they can identify.
It might seem trivially true that one should first go through a risk analysis before
deciding on which security measures to implement. However, there are two
reasons why this ideal approach may not work. Conducting a risk analysis for a
larger organization will take time, but the IT system in the organization and the
world around will keep changing. So, by the time the results of the analysis are
presented, they are already somewhat out of date. Moreover, the costs of a full risk
analysis may be difficult to justify to management.
For these reasons, organizations may opt for baseline protection as an alternative.
This approach analyzes the security requirements for typical cases and
recommends security measures deemed adequate. One of the best known IT
security baseline documents is maintained by the German Information Security
Agency
Viruses: Computer viruses are small software programs that are designed to
spread from one computer to another and to interfere with computer operation. A
virus is a piece of software that can "infect" other programs by modifying them; the
modification includes a copy of the virus program, which can then go on to infect
other programs. A virus can do anything that any other programs can do.
A virus attaches itself to another program and executes secretly when the host
program is running. Once a virus is executing, it can perform any function, such
as erasing files and programs.
Phases of Computer Virus Life Cycle: A typical virus goes through the following
four phases:
Dormant phase
Propagation phase
Triggering phase
Execution phase
Dormant phase: In this phase the virus is idle. The virus will eventually be
activated by some event, such as a date, the presence of another program or file,
or the capacity of the disk exceeding some limit. Not all viruses have this stage.
Propagation phase: In this phase the virus places an identical copy of itself into
other programs or into certain system areas on the disk. Each infected program
will now contain a clone of the virus, which will itself enter a propagation phase.
Triggering phase: The virus is activated to perform the function for which it was
intended. As with the dormant phase, the triggering phase can be caused by a
variety of system events, including a count of the number of times that this copy of
the virus has made copies of itself.
Boot Sector Virus: Infects the boot or MBR of diskettes and hard drives through
the sharing of infected disks and pirated software applications Once your hard
drive is infected all diskettes that you use in your computer will be infected
Program Virus: Becomes active when the program file (usually with extensions
.BIN, .COM, .EXE, .OVL, .DRV) carrying the virus is opened. It then makes copies
of itself and will infect other programs on the computer.
Polymorphic Virus: Act like a chameleon, changing its virus signature (binary
pattern) every time it multiples and infects a new file
Macro Virus: Programmed as a macro embedded in a document, usually found
in Microsoft Word and Excel. Once it gets in to your computer, every document
you produce will become infected. A new type of virus may slip by your antivirus
software if you don't have the most recent version installed
Memory Resident Viruses: This type of virus lives in the memory after its
execution. Its inserts themselves as a part of operating system or application and
can manipulate any file that executed. Copied or moved
Non-resident Virus: This type of virus executes itself and terminated or destroyed
after specific time.
Overwriting Virus: Overwriting viruses deletes the original code and replaces it
by new, malicious code. When the replaced file is executed the virus can try to
replicate again. Since the original file is deleted by overwriting either in whole or
in part, it is not possible to disinfect them. The original file is to be restored from a
backup.
Stealth Virus: It’s a virus that hides the modification it has made in the file or boot
record
Companion Virus: This is the virus which, creates a new program instead of
modifying an existing file
Email Viruses: Virus gets executed when E-mail attachment is open by recipient.
Virus stands itself to everyone on the mailing list of sender
Metamorphic Viruses: This type of virus keeps rewriting itself every time. It may
change their behavior as well as appearance code
Parasitic Viruses: It attaches itself to executable code and replicates itself. When
the infected code is executed, it will find other executable code or program infect.
Dealing with Viruses: How to Deal with Computer Viruses
Step 1: Use a reliable antivirus program
Step 2: Scan your computer
Step 3: Remove the malware
Step 4: Stop future infections
Worms: Computer Worms are reproducing programs that run independently and
travel across network connections. A worm is a computer program that copy itself
from machine to machine in a network. The main difference between viruses and
worms is the method in which they reproduce and spread. A worm usually exploits
some sort of security hole in a piece of software or the operating system. Worms
normally move around and infect other machines through computer networks.
Using a network, a worm can expand from a single copy very rapidly.
Computer worms are malicious software applications that designed to spread via
computer networks. Computer worms are one form of malware along with viruses
and Trojans. A person typically installs worms by inadvertently opening an email
attachment or message that contains executable scripts.
Unlike a computer virus, it does not need to attach itself to an existing program.
Worms almost always cause at least some harm to the network, even if only by
consuming bandwidth, whereas viruses almost always corrupt or modify files on a
targeted computer.
Many worms that have been created are designed only to spread, and do not
attempt to change the systems they pass through.
Trojan horse: A Trojan horse is a program where harmful code is contained inside
another code which can appear to be harmless. Once the apparently harmless
code is in the computer, it releases the malicious code to do its damage. Trojan
horses may even claim to be anti-virus in order to get the user to install it.
The name comes from the deception that the Greek army played on the people of
Troy during the Trojan War. They presented Troy with a large wooden horse in
which they had secretly hidden their warriors. Once inside the city gates, the
warriors emerged from the horse and took control of the city.
Insiders: Insiders may have accounts giving them legitimate access to computer
systems, with this access originally having been given to them to serve in the
performance of their duties; these permissions could be abused to harm the
organization.
An Insider Threat is a malicious threat to an organization that comes from people
within the organization, such as employees, former employees, contractors or
business associates, who have inside information concerning the organization's
security practices, data and computer systems. The threat may involve fraud, the
theft of confidential or commercially valuable information, the theft of intellectual
property, or the sabotage of computer systems.
Insiders are more dangerous in many aspects than the intruders. Since insiders
are having direct access and the necessary knowledge to cause instant damage
to the organization. In most organizations security is designed to protect against
intruders. Insiders may actually already have all the access they need to commit
criminal activity such as fraud. In addition to direct access, insiders also normally
have the details of the security systems in organization and so they can easily
avoid detection. Attacks by insiders are often the result of employees who have
become irritated, dissatisfied, and unhappy with their organization and are looking
for ways to disturb work.
Active Attacks: An active attack attempts to alter system resources or affect their
operation. Active attacks involve some modification of the data stream or the
creation of a false stream and can be subdivided into four categories:
masquerade, replay, modification of messages, and denial of service.
Replay: Replay involves the passive capture of a data unit and its subsequent
retransmission to produce an unauthorized effect
Following are the important differences between Active Attack and Passive Attack.
Sr.
Key Active Attack Passive Attack
No.
1. In Active Attack, information is In Passive Attack, information
Modification
modified. remain unchanged.
Backdoors
Trapdoors
Sniffing
Spoofing
Man in the Middle
Replay
TCP/IP Hacking
Encryption attacks.
1.5. Operating system security: Operating system updates: Hot Fix, Patch, and Service
Pack
1.6. Information: Need and Importance of Information, information classification,
criteria for information classification, Security, need of security, Basics principles
of information security.