System Security
System Security
Outsiders:
Description: External entities with no legitimate access to the system.
Insiders:
Description: Authorized users who misuse their access privileges, either maliciously or
unintentionally.
Objectives of Intruders
Data Theft:
Stealing confidential information such as personal details, financial records, or trade
secrets.
System Disruption:
Causing downtime or interrupting services (e.g., Distributed Denial-of-Service attacks).
Resource Exploitation:
Using the system's resources for personal gain (e.g., cryptocurrency mining or launching further
attacks).
Espionage:
Collecting sensitive information for intelligence purposes.
Sabotage:
Intentionally harming a system's functionality or reputation.
Characteristics of a Virus
1. Replication:
o A virus replicates itself by attaching to other programs, files, or boot sectors.
2. Activation Trigger:
o It activates when the infected file is executed or opened.
3. Payload:
o Viruses often carry a payload, which may corrupt files, delete data, or crash
systems.
Types of Viruses
Viruses can cause a wide range of problems, depending on their purpose and payload. Below
are some of the key threats associated with computer viruses:
A firewall is a network security system that monitors and controls incoming and
outgoing network traffic based on predefined security rules. Its primary purpose is to act as a
barrier between trusted internal networks (like a private LAN) and untrusted external networks
(like the internet), preventing unauthorized access while allowing legitimate communication.
1. Traffic Filtering:
o Allows or blocks data packets based on security rules.
2. Network Segmentation:
o Separates networks to contain potential breaches.
3. Monitoring:
o Logs network activity for auditing and troubleshooting.
4. Threat Prevention:
o Protects against malware, hackers, and other cyber threats.
Types of Firewalls
1. Packet-Filtering Firewalls:
o Operate at the network layer (Layer 3) of the OSI model.
o Analyze incoming and outgoing packets based on IP addresses, ports, and
protocols.
o Do not inspect packet contents, making them fast but limited in security.
o Example: Blocking traffic from a specific IP address.
2. Stateful Inspection Firewalls:
o Operate at the transport layer (Layer 4).
o Maintain a state table to track active connections and ensure that packets are part
of a valid session.
o Offer better security than packet-filtering firewalls.
o Example: Allowing responses to an outgoing request but blocking unsolicited
packets.
3. Proxy Firewalls:
o Operate at the application layer (Layer 7).
o Act as an intermediary between internal and external networks, inspecting
application-specific traffic (e.g., HTTP, FTP).
o Can provide deep packet inspection and block malicious content.
o Example: A web proxy firewall filtering malicious websites.
4. Next-Generation Firewalls (NGFWs):
o Combine traditional firewall functions with additional features like:
Deep packet inspection (DPI).
Intrusion prevention systems (IPS).
Application awareness.
o Operate across multiple OSI layers.
o Example: Detecting and blocking specific application-layer attacks.
5. Network Address Translation (NAT) Firewalls:
o Mask internal IP addresses by translating them into a single public IP address.
o Provide basic security by preventing direct access to internal devices.
o Example: Home routers often use NAT firewalls.
6. Web Application Firewalls (WAFs):
o Focus specifically on protecting web applications.
o Protect against attacks like SQL injection, cross-site scripting (XSS), and
distributed denial-of-service (DDoS).
o Operate at the application layer.
o Example: Cloudflare WAF for securing websites.
7. Cloud Firewalls:
o Delivered as a cloud-based service.
o Scalable and suitable for protecting cloud infrastructures.
o Example: AWS Firewall Manager for securing Amazon Web Services
environments.
8. Host-Based Firewalls:
o Installed on individual devices to protect against threats at the device level.
o Control traffic entering and leaving a specific host.
o Example: Windows Defender Firewall.
The effectiveness of a firewall depends on how well it is designed and implemented. Below are
the key principles of firewall design: