Mis
Mis
Mis
A comprehensive security system includes hardware, software, procedures, and personnel that collectively protect information resources and keep intruders and hackers at bay. There are three important aspect of computer and network security: confidentiality, integrity, and availability, collectively referred to as the CIA TRIANGLE.
and networks are operating, and authorized users can access the information they need. It should also ensure quickly recovery in case of system failure or disaster.
TYPES OF HACKERS
hacker who uses programs others have developed to attack computer and network systems and deface Web sites.
computer security experts who specialize in penetration testing and other testing methods to ensure that a companys information systems are secure.
When planning a comprehensive security system, the first step is designing faulttolerant system, which have a combination of hardware and software for improving reliability-a way of ensuring availability in case of a system failure. Some commonly used methods includes the following: a. Uninterruptible power supply (UPS) b. Redundant array of independent disks (RAID) c. Mirror disk
VIRUSES- consists of self propagating program code thats triggered by a specified time or event. WORM- also travels from a computer to computer in a network, but it doesnt usually erase data. Unlike viruses, worms are independent programs that can spread themselves without having to be attached to a host program. TROJAN PROGRAM- contains code intended to disrupt a computer, network, or Web site and is usually hidden inside a popular program. Users run the popular programs, unaware that the malicious program is also running in the background.
LOGIC BOMB- is a type of trojan program used to release a virus, worm, or other destructive code. Logic bombs are triggered at a certain time or by an event, such as user pressing Enter or running a specific program. BACKDOOR- (trapdoor) is a programming routine built into a system by its designer or programmer. This routine enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files. BLENDED THREATS- is a security threat that combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks. DENIAL-OF-SERVICE (DoS) ATTACK- floods a network or server with service requests to prevent legitimate users access to the system.
SOCIAL ENGINEERING- means using people skills-such as being a good listener and assuming a friendly, unthreatening air-to trick others into revealing private information. This attack takes advantage of the human element of security systems.
BIOMETRIC SECURITY MEASURES- use a physiological element to enhance security measures. These elements are unique to a person and cant be stolen, lost, copied, or passed on to others. The following list describes some biometric devices and measures : *facial recognition, fingerprints, hand geometry, iris analysis, palm prints, retinal scanning, signature analysis, vein analysis, and voice recognition
PHYSICAL SECURITY MEASURESprimary control access to computers and networks and include devices for securing computers and peripherals from theft.
systems from authorized access to preserve data integrity. The following sections describe two used access controls: terminal resource security and passwords.
characters, and symbols thats entered to allow access to a system. A passwords length and complexity determines its vulnerability to discovery by unauthorized users.
VIRTUAL PRIVATE NETWORKprovides a secure tunnel through the internet for transmitting messages and data via a private network.
encryption the same key is used to encrypt and decrypt the message. The sender and receiver must agree on the key and keep it secret.
In e-commerce transactions, three factors are critical for security: authentication, confirmation, and nonrepudiation. Authentication is important because using a credit card number in an online transaction doesnt mean the person using it is the cards legitimate owner. Confirmation- must also be incorporated into ecommerce transactions to verify orders and reciept of shipments. Nonrepudiation- is essential in case a dispute over a transaction is raised. Digital signatures are used for this factor and serve to bind partners in transaction.
E-commerce transaction security is concerned with the following issues: CONFIDENTIALITY AUTHENTICATION INTEGRITY NONREPUDIATION OF ORIGIN NONREPUDIATION OF RECEIPT