Week 5 IT ERA (ICT Security)
Week 5 IT ERA (ICT Security)
Diamat
ICT Security
Information and
communication
technology (ICT)
security measures are
necessary to protect
confidential information `
• Monitoring and
controlling access
to confidential
information
• Safe transmission `
of data
• Secure storage and
disposal of data
We're going to discuss following
topics:
Authentication
One Time
passwords
Program Threats
System Threats `
Viruses
Security
Fundamentals
1. Authentication
Authentication
refers to identifying
each user of the
system and
associating the `
executing programs
with those users.
Operating Systems generally identifies/authenticates users
using following three ways
A. Username /
Password − User
need to enter a
registered username
and password with `
Operating system to
login into the
system.
Operating Systems generally identifies/authenticates users
using following three ways
B. User card/key −
User need to punch
card in card slot, or
enter key generated
by key generator in
`
option provided by
operating system to
login into the system.
Operating Systems generally identifies/authenticates users
using following three ways
C. User attribute -
fingerprint/ eye retina
pattern/ signature −
User need to pass
his/her attribute via
designated input device `
used by operating
system to login into the
system.
2. One-Time Passwords
In One-Time Password
system, a unique
password is required
every time user tries
to login into the
system. Once a one- `
corresponding to few
alphabets randomly
chosen.
4. Secret Key
4. Secret key − User are
provided a hardware
device which can create
a secret id mapped with
user id. System asks for
such secret id which is
to be generated every `
put user in
trouble.
6. Program Threats
If a user program
made a program
to do malicious
tasks, then it is
known `
as Program
Threats
`
Computer Abuse
"The unauthorized use of,
or access to, a computer
for purposes contrary to
the wishes of the owner of
the computer or the data
held thereon.”
Such as:
`
⮚Hacking
⮚Pornography
⮚Viruses
Computer Viruses
To be defined as a
virus, a program must:
⮚Replicate itself in
order to carry out a
mission.
⮚Create damage to the
`
computer system
"infected".
Virus Components
The
Replication
mechanism
⮚allows virus
`
to copy
itself
Virus Components
The
Protection
mechanism
⮚Hides
`
virus from
detection
Virus Components
The Trigger
⮚Mechanism
which will set
off the
`
payload
Virus Components
The
Payload
⮚Effect of
the virus
`
What is Worm?
- Is a self-replicating program that is
harmful to networks.
Quantitative Risk
Assessment assigns a
monetary value to the
asset. It then uses
the
anticipated exposure
to calculate a dollar
cost.
Steps in quantitative risk assessment.
Step 1. Determine the
single loss expectancy
(SLE): This step involves
determining the single
amount of loss you could
incur on an asset if a threat
becomes realized or the
amount of loss you expect
to incur if the asset is
exposed to the threat one
time.
SLE is calculated as follows:
SLE = asset value ×
exposure factor. The
exposure factor (EF) is
the subjective,
potential portion of
the loss to a specific
asset if a specific
threat were to occur
Steps in quantitative risk assessment.
COMPUTATION
EXAMPLES:
If you have data worth $500 that has an
exposure factor of 50 percent due to lack of
countermeasures such as antivirus, what
would the SLE be?” You would use the
following formula to calculate the answer:
AV × EF = SLE
$250 × 4 = $1,000
This means that, on average,
the loss is $1,000 per year.