Computer Security and Privacy: COSC 624
Computer Security and Privacy: COSC 624
COSC 624
Chapter 1
1. Fundamentals of computer security & privacy
Overview,
Evolution (history),
Vulnerabilities,
Countermeasures,
Physical security
Computer Security
•Computer Security is a Branch of Computer Technology
•It is Information security as applied to computers and networks.
Definition
Security: The prevention and protection of computer assets from
unauthorized access, use, alteration, degradation, destruction, and other
threats.
“ The term computer system security means the collective processes and
mechanisms by which sensitive and valuable information and services are
protected from publication, tamper [ alter ]or collapse by unauthorized
activities or untrustworthy individuals and unplanned events respectively.
Privacy
• Privacy: The legal rights of the
groups/individuals/organizations to
be protected against unauthorized
intrusion into his personal
life/affairs, by direct physical
means or by publication of
information.
• Security or Privacy Threat: Any
individual group, act, or object that
poses a danger to computer security
and privacy is known as threat.
No Tension ??
No Computer
No Network
No Internet
• The most secured manner
Either no computers or are
those not connected to any
Network or Internet and
protected from any intrusion
Defining- Computer Security
• Computer or Information Technology can be
used for productive or destructive purposes
Confidentiality
Integrity
Availaibility
Categories of attacks
Categories of attacks
Source
Destination
Normal flow of information
Attack
Interruption Interception
Modification Fabrication
Some Types of Attacks
• What are some common attacks?
– Network Attacks
• Packet sniffing, man-in-the-middle
– Web attacks
• Phishing, Cross Site Scripting
– OS, applications and software attacks
• Virus, Trojan, Worms, Rootkits, Buffer Overflow
• Not all hackers are evil wrongdoers trying to steal your info
– Ethical Hackers, Consultants, Penetration testers, Researchers
12
Network Attacks
• Packet Sniffing
– Internet traffic consists of data “packets”, and these can
be “sniffed”
– Leads to other attacks such as
password sniffing, cookie
stealing session hijacking,
information stealing
• Man in the Middle
– Insert a router in the path between client and server,
and change the packets as they pass through
13
Web Attacks
• Phishing
– An evil website pretends to be a trusted website
– Example:
• You type, by mistake, “mibank.com” instead of “mybank.com”
• mibank.com designs the site to look like mybank.com so the user
types in their info as usual
• BAD! Now an evil person has your info!
14
Evolution of Computer Security and Privacy
Issues and Ethics
• Computer security, meaning safeguarding
hardware, software and their physical locations,
first took shape in World War 2, when the military
began using mainframes designed to assist in code
breaking.
• 1960s- Larry Roberts, hailed as the internet’s
founder, designed the ARPANET (Advanced
Research Projects Agency Network), which is called
the internet’s predecessor.
• "worldwide system of interconnected networks
and computers“- Internet by Larry
Evolution of Computer Security and Privacy
Issues and Ethics
• In the mid-1960s
• Donn B. Parker, at the time with SRI International in
Menlo Park, CA, began examining unethical and illegal
uses of computers and documenting examples of
computer crime and other unethical computerized
activities.
• He published "Rules of Ethics in Information
Processing" in Communications of the ACM in 1968,
and headed the development of the first Code of
Professional Conduct for the Association for Computing
Machinery, which was adopted by the ACM in 1973.
Evolution Contd…
• 1960s
Computer security issues limited to physical protection of
computers. No networking
• 1960s - 70s
New paradigms of Multiuser and Multiprogramming were
introduced
Data storage systems like concepts of database and RDBMS
were introduced
New Concerns arise –
The issue of computer security first arose in the 1970s as
individuals began to break into telephone systems.
People and companies started focusing on database processing
What is being done to their privately stored data in large
databases
Evolution Contd…
• 1980s & 90s
Local Area Network introduced
Internet entered in the world
PCs were popularized
Net based business models like E-commerce, E-government and
E-health services started to develop new computerized systems
Malwares like Viruses become majors threats
New Concerns –
People and Companies start thinking about their security of
computers and stored data
Trust on emails and websites were primarily suspected.
They were worried about their information privacy in networked
environment / world
Salient Security Cases
• Salient Security Cases
The Federal Bureau of Investigation (FBI) made one of its first arrests related
to computer hacking in the early 1980s.
A group of hackers known as the 414s, named after their area code in
Milwaukee, Wisconsin, were indicted for attacking 60 different computer
systems including the Los Alamos National Laboratory and the Memorial
Sloan-Kettering Cancer Center.
Internet Worm (Morris worm )
November 2, 1988 a worm attacked more than 60,000 computers around the USA
The worm attacks computers, and when it has installed itself, it multiplies itself,
freezing the computer
It exploited UNIX security holes in Sendmail
A nationwide effort enabled to solve the problem within 12 hours
Robert Morris [ A Professor at the MIT] became the first person to be indicted
under the Computer Fraud and Abuse Act.
He was sentenced to three years of probation, 400 hours of community service and a fine of
$10,050
Salient Security Cases Contd…
• Salient security harms …
NASA shutdown
In 1990, an Australian computer science student was charged for
shutting down NASA’s computer system for 24 hours
Digital Equipment Corp. and MCI Communications Corp, Attack
a 25-year-old hacker named Kevin Mitnick began tapping into the e-
mail system used by computer security managers. As a result, Mitnick
was arrested and sentenced to one year in jail.
Airline computers
In 1998, a major travel agency discovered that someone penetrated
its ticketing system and has printed airline tickets illegally
Bank theft
In 1984, a bank manager was able to steal $25 million through un-
audited computer transactions
Salient Security Cases Contd…
During 1995, computers at the U.S. Department of Defense were attacked
roughly 250,000 times.
In 1998, the U.S. Department of Justice created the National Infrastructure
Protection Center, charging it with task of safeguarding domestic
technology, telecommunications, and transportation systems from
unethical hackers.
• Frequent deletion of stored cookies and temporary files from Web browsers
• Regular scanning for viruses and other malware
• Regular installation of updates and patches for operating systems
• Refusing to click on links that appear within e-mail messages
• Refraining from opening e-mail messages and attachments from unknown senders
• Staying away from questionable Web sites
• Regularly backing up data on external media.
Computer security controls
• Lock the CPU case. Most desktop and tower cases have locking lugs that you
can use to keep an intruder from opening the case.
• Use a cable-type security lock to keep someone from stealing the whole
computer. This is particularly good advice for laptops or small desktops that can
easily be hidden inside a backpack or coat.
• Configure the BIOS not to boot from the floppy drive. This makes it harder for
an intruder to remove passwords and account data from your system's disks.
• Consider whether it's worth the expense of using a motion-sensor alarm in the
room where the computers located. (Remember, for home offices, security
systems that cover the office area are generally deductible business expenses!)
Contd…