Cit 101
Cit 101
INTRODUCTION TO SECURITY
Why security
What to Secure
Hardware
Laptops, desktop PCs, CPU, hard disk, storage devices, cables etc.
Software
Information
Communications
Computer and network security are crucial in protecting data and systems from
unauthorized access, data breaches, and cyber threats. Here are some
fundamental concepts:
1. Authentication: The process of verifying the identity of users or systems
trying to access a network or computer. Common methods include
passwords, biometrics, and two-factor authentication.
2. Authorization: After authentication, determining what actions and
resources users or systems are allowed to access based on their
permissions.
3. Encryption: The process of converting data into a coded format to prevent
unauthorized access. Common encryption methods include AES and RSA.
4. Firewalls: Security mechanisms that control incoming and outgoing
network traffic based on an organization's previously established security
policies.
5. Intrusion Detection and Prevention Systems (IDS/IPS): Tools that monitor
network traffic for suspicious activity and can either alert administrators
(IDS) or take automated actions to block threats (IPS).
6. Vulnerability Assessment: The process of identifying and assessing
weaknesses in a system's security, often through automated scanning tools.
7. Patch Management: Keeping software and systems up to date with the
latest security patches and updates to fix known vulnerabilities.
8. Security Policies: Written guidelines and rules that define an organization's
security objectives, responsibilities, and procedures.
9. Phishing Awareness: Training users to recognize and avoid phishing emails
and websites, which are common tactics used by cybercriminals to steal
information.
10. Network Segmentation: Dividing a network into smaller, isolated segments
to limit the spread of threats and reduce the attack surface.
11.Incident Response: A plan and process for responding to security incidents,
including steps to contain, mitigate, and recover from breaches.
12.Backup and Disaster Recovery: Regularly backing up data and having a plan
in place to recover it in case of data loss or system failure.
13.Security Updates and Patching: Regularly applying security updates and
patches to software and systems to fix known vulnerabilities.
14.User Education and Awareness: Training users and employees on security
best practices to reduce human error-related security risks.
15.Antivirus and Anti-malware: Software that scans for and removes malicious
software and viruses from computers and networks.
16.Physical Security: Protecting physical access to computer systems and data
centers to prevent unauthorized access.
17.Security Auditing and Logging: Monitoring and recording events and
activities on systems for later analysis and auditing.
18.Penetration Testing: Ethical hacking to identify vulnerabilities by simulating
real-world attacks on a system or network.
19.Zero Trust Security: A security model that assumes no trust, even within an
organization's network, and verifies every access request.
20.Security Complian ce: Adhering to industry-specific security standards and
regulations (e.g., GDPR, HIPAA) to ensure legal and ethical data handling.
TYPES OF SECURITY
The most basic example of Network Security is password protection which the
user of the network oneself chooses. In recent times, Network Security has
become the central topic of cyber security with many organizations inviting
applications from people who have skills in this area. The network security
solutions protect various vulnerabilities of the computer systems such as:
Users
Locations
Data
Devices
Applications
Network Security has several benefits, some of which are mentioned below:
The basic principle of network security is protecting huge stored data and
networks in layers that ensure the bedding of rules and regulations that have to
be acknowledged before performing any activity on the data.
1. Physical Network Security: This is the most basic level that includes protecting
the data and network through unauthorized personnel from acquiring control
over the confidentiality of the network. These include external peripherals and
routers that might be used for cable connections. The same can be achieved by
using devices like biometric systems.
Access Control
Cloud Security
Email Security
Firewalls
Application Security
1. Access Control: Not every person should have a complete allowance for the
accessibility to the network or its data. One way to examine this is by going
through each personnel’s details. This is done through Network Access Control
which ensures that only a handful of authorized personnel must be able to work
with the allowed amount of resources.
4. Email Security: Email Security depicts the services, and products designed to
protect the Email Account and its contents safe from external threats. For
Example, you generally see, fraud emails are automatically sent to the Spam
folder. because most email service providers have built-in features to protect the
content.
3. Data at Rest: Encrypting data at rest means protecting files and data stored
on devices or servers, preventing unauthorized access if the physical device is
stolen or compromised.
1. If the password or key is lost, the user will be unable to open the
encrypted file. Using simpler keys in data encryption, on the other
hand, makes the data insecure, and anybody may access it at any time.
2. Data encryption is a valuable data security approach that necessitates
a lot of resources, such as data processing, time consumption, and the
use of numerous encryption and decryption algorithms. As a result, it is
a somewhat costly approach.
3. Data protection solutions might be difficult to utilize when the user
layers them for contemporary systems and applications. This might
have a negative influence on the device’s normal operations.
4. If a company fails to realize any of the restrictions imposed by
encryption techniques, it is possible to set arbitrary expectations and
requirements that might undermine data encryption protection.
SYSTEM SECURITY
A system is said to be secure if its resources are used and accessed as intended
under all the circumstances, but no system can guarantee absolute security from
several of various malicious threats and unauthorized access.
Threat: A program that has the potential to cause serious damage to the system.
Henceforth, based on the above breaches, this are the following security goals
Integrity:
The objects in the system mustn’t be accessed by any unauthorized user & any
user not having sufficient rights should not be allowed to modify the important
system files and resources.
Secrecy:
The objects of the system must be accessible only to a limited number of
authorized users. Not everyone should be able to view the system files.
Availability:
All the resources of the system must be accessible to all the authorized users i.e.
only one user/process should not have the right to hog all the system resources. If
such kind of situation occurs, denial of service could happen. In this kind of
situation, malware might hog the resources for itself & thus preventing the
legitimate processes from accessing the system resources.
Program Threats:
Virus:
– stealth – avoids detection by modifying parts of the system that can be used to
detect it, like the read system
call
– tunneling – installs itself in the interrupt service routines and device drivers
Trojan Horse:
A code segment that misuses its environment is called a Trojan Horse. They seem
to be attractive and harmless cover programs but are really harmful hidden
programs that can be used as the virus carrier. In one of the versions of Trojan,
the User is fooled to enter confidential login details on an application. Those
details are stolen by a login emulator and can be further used as a way of
information breaches. One of the major as well as a serious threat or
consequences of the Trojan horse is that it will actually perform proper damage
once installed or run on the computer’s system but at first, a glance will appear to
be useful software and later turns out to be maliciously unwanted one.
Another variance is Spyware, Spyware accompanies a program that the user has
chosen to install and download ads to display on the user’s system, thereby
creating pop-up browser windows and when certain sites are visited by the user,
it captures essential information and sends it over to the remote server. Such
attacks are also known as Convert Channels
Trap Door:
The designer of a program or system might leave a hole in the software that only
he is capable of using, the Trap Door works on similar principles. Trap Doors are
quite difficult to detect as to analyze them, one needs to go through the source
code of all the components of the system. In other words, if we may have to
define a trap door then it would be like, a trap door is actually a kind of a secret
entry point into a running or static program that actually allows anyone to gain
access to any system without going through the usual security access procedures.
Logic Bomb:
Worm:
A computer worm is a type of malware that replicates itself and infects other
computers while remaining active on affected systems. A computer worm
replicates itself in order to infect machines that aren’t already infested. It
frequently accomplishes this by taking advantage of components of an operating
system that are automatic and unnoticed by the user. Worms are frequently
overlooked until their uncontrolled replication depletes system resources, slowing
or stopping other activities.
Physical:
The sites containing computer systems must be physically secured
against armed and malicious intruders. The workstations must be
carefully protected.
Human:
Only appropriate users must have the authorization to access the
system. Phishing (collecting confidential information) and Dumpster
Diving (collecting basic information so as to gain unauthorized access)
must be avoided.
Operating system:
The system must protect itself from accidental or purposeful security
breaches.
Networking System:
Almost all of the information is shared between different systems via a
network. Intercepting these data could be just as harmful as breaking
into a computer. Henceforth, Network should be properly secured
against such attacks
Certainly, let's dive deeper into some of the key aspects of system security:
Access Control: Access control is about managing who has permission to access a
system. This involves user authentication (verifying a user's identity) and
authorization (determining what actions or resources a user can access). Access
control mechanisms can include username and password combinations,
biometrics (like fingerprint or facial recognition), or smart cards.
File and Directory Permissions: Every file and directory on a system has
permissions that dictate who can read, write, or execute them. These permissions
are typically assigned to users and groups. For example, on Unix-based systems,
permissions are represented as read (r), write (w), and execute (x) for owner,
group, and others.
Operating System Security: Keeping the operating system secure is crucial. This
involves regularly applying security patches and updates provided by the OS
vendor. Vulnerabilities in the OS can be exploited by attackers, so prompt patch
management is essential.
System Logs: System logs record various events and activities on the computer.
These logs are essential for monitoring and auditing system security. Security
administrators can use log analysis tools to detect suspicious or unauthorized
activities.
Vendor and Third-Party Security: Organizations often use third-party software and
hardware. It's important to assess the security of these products, as
vulnerabilities in them can impact the overall system. Vendors should have a
history of addressing security issues promptly.
Password cracking
2. Brute forcing: trying combinations of all the characters until the correct
password is discovered
Maintenance: managing all the changes in the computer applications and keeping
them up to date.
Layers of security
Physical security:
It safeguards the personnel, hardware, programs networks, and data from
physical threats
Network security:
- Protects the networks and their service from unauthorized modification,
destruction or disclosure.
System security:
- Protects the system and its information from theft, corruption,
unauthorized access or misuse.
Application security:
Covers the use of software, hardware and procedural methods to protect
application from external threats.
User security:
Ensures that a valid user is logged in and that the logged-in user is allowed
to use an application program.