Computer worms:
Virus:
Viruses are pieces of code that infect the other programs
and often perform harmful acts such as deletion of files or corruption of boot
blocks.
Threats:
In computer security a threat is an event to cause harm to
the system in the form of destruction, disclosure and modification of data or
denial of service.
Intruders:
People who are creating troubles to others trough the
violation of the security restrictions where they have no business being are
called intruders.
Generally intruders are of two types:-
1. Passive
Intruders (Hackers)
2. Active
Intruders (Crackers)
- The passive intruders just want to read data or copying the files without any permission from owner of the data.
- Active intruders want to modify the data without any permission. Active intruders are more dangerous because we lose the original data permanently from crackers (hackers just copy the information).
Any computer security system has 4 general goals:
1. Data
should be kept secret. The corresponding threat is exposure of data.
2. Data
Integrity. It means unauthorised person should not modify the data without
owner’s permission. The threat is tampering with data.
3. System
availability. The threat for this goal is denial of service.
4. Authenticity.
Not verifying the identity of user.
Types of threat:
Generally threats are of 4 types:
- Interruption: It is one type of threat; it means physically destroying the hardware resource, e.g. the cutting of a communication line, destruction of a hard disk, disabling the file management system, physically damaging the power cables.
- Interception: The person access the data without any proper permission from the owner of the data, this is an attack on the confidentiality, e.g. accessing the mailbox without permission, trace the password and enter into others login, illicit copying of data and files.
- Data modification: It is a very dangerous type of thread compared with interception. In this the unauthorised person gains the data and keeps the copy and then modifies the original data and send to destination.
- Fabrication: It is also damaged one. The unauthorised person inserts the unusueful data to the system. This is attack on ‘system availability’ and “authenticity”.
Accidental data loss: In addition to threats caused by
intruders, valuable data can be lost by accident. Some of the common causes of
accidental data loss are:
- Acts of God – Cyclone, floods, earth quake, fire, riots, war etc.
- Hardware or Software errors – Accidental shut down of the system, disk readable errors, CPU malfunctions, telecommunication errors, program bugs etc.
- Human errors – All these types of data lose can be solved using backup.
Protection Mechanisms
- User authentication
- Password protection
- Authentication using biometric
- Digital signature
- Cryptography (Encryption and Decryption)
Digital Signature:
Once the sender creates a digital signature he cannot
repudiate a letter. One common way is to first run the document through a one-way hashing algorithm that is very hard to invert. The hashing function
produces a fixed-length result independent of the original doc size.
Two popular hashing functions are available:
- MD5 (Message Digest) – It produces the 16-byte result
- SHA (Secure Hash Algorithm ) – 20-byte result
(Cryptography can be applied in digital signature also)
Notes: - 1. Hashing means searching technique, it is a
function popular hashing techniques are division world, mid square method,
folding method.
User
Authentication: In networking supported
OS (Windows 2000 server, windows NT and Unix) knows the identity of each user
the problem of identifying the user when the login is called authentication.
- All OS uses password for user authentication
- Whenever the system turned on, Login program asked the user to type login name and password
- Then password is immediately encrypted, the login program reads the password, it contains all the password, one password for one user then search the appropriate password for the login name
- If the users entered password and the password in the password file matches, then the login is permitted otherwise it asked to enter password again (Unix system asks 3 times inly for the correct login and password)
Authentication using biometrics:
i) the physical
characteristics of the user are hard to forge- so its call biometrics.
ii) the biometrics system, consisting of two part –
enrollment, identification.
iii) In the first part users physical characteristics are
measured and converted into digital form and stored into
iv) In the identification part, system asks for login name,
after entered the login name, the system asks the user physical part for
identification. If the parts are matched, then the login opened otherwise
rejected.
Example 1- Fingerprint:
Fingerprint is a biometric option for its unique identifying
characteristics. placed on a special reading pad a designated finger`s print is
recognized by the computer. A similar biometrics device scans the users whole
hand.
Example 1- Voice reader:
Voice reader can verify the user`s identity. the user speaks
a specified word or sentence to gain access to a secured computer. distinct
patterns , tones and other qualities in the voice must match the authorized
user`s voice in the computer`s security system.
Cryptology:-
Cryptology is the study of code both creating and solving
them.
Cryptography:-
- Cryptography is the art of creating code; it is a mechanism of providing security to the information from unauthorised people.
- A file or message in the source end is called plain text or clear text and it is converted to the cipher text with the help of key and sent to the destination. Only destination knows how to convert it back to the plain text.
- In cryptography key is secret, algorithm is open to all.
Encryption:-
It is the process of converting plain text to cipher text at
the sending end, encryption algorithm applied on the key.
Decryption:-
It is the process of converting cipher text to plain text at
the destination end. The decryption algorithm applied on the key.
Classification of cryptography:-
- Private key algorithm (secret key)
- Public key algorithm (asymmetric key)
- Quantum cryptography
Asymmetric key
cryptography (Public Key algorithm)
Public key methods require two unique keys, one called the
public key and other called the private key. The private key is mathematically
linked to public key. While public keys are published, private keys are never
exchanged and always kept secret. Example: RSA (Rivest Shamir Adelman)
Symmetric cryptography (Private Key algorithm)
Private Key encryption algorithm uses a single key for both
encryption and decryption. In order to communicate using this class of cipher,
the key must be known to both sender and receiver of the message. Example: DES
(Data Encryption Standard), IDEA (International Data Encryption Algorithm).
Comments
Post a Comment