Introduction to Computer Security
What is Computer Security?
• Computer Security is the protection of
computing systems and the data that they
store or access.
Why is Computer Security Important?
• Computer Security allows the organization to
carry out its mission by:
– Enabling people to carry out their jobs, education,
and research
– Supporting critical business process
– Protecting personal and sensitive information
Computer Security Risk
• is any event or action that could cause a loss
of or damage to computer hardware,
software, data, information, or processing
capability.
1.Internet and network attacks
• Information transmitted over networks has a
higher degree of security risk than information
kept on an organization’s premises.
Malware
• Malware (malicious software) –
– which are program that act without a user’s
knowledge and deliberately alter the computer
operation.
– Type of malware:
• Computer viruses
• Worms
• Trojan Horses
• Root kit
• Back doors
• Spyware
Malware Symptoms
• Operating system runs much slower than
usual
• Available memory is less than expected
• Files become corrupted
• Screen displays unusual message or image
• Music or unusual sound plays randomly
• Existing programs and files disappear
• Programs or files do not work properly
• Unknown programs or files mysteriously
appear
• System properties change
• Operating system does not start up
• Operating system shuts down unexpectedly
2. Unauthorized Access and Use
• Unauthorized access
– The use of a computer or network without
permission.
• Unauthorized use
– The use of a computer or its data for unapproved
or possibly illegal activities.
3. Hardware Theft
• Hardware theft
– Is the act of stealing computer equipment.
Hardware
– The act of defacing or destroying computer
equipment.
4. Information Theft
• Occurs when someone steals personal or
confidential information.
• If stolen, the loss of information can cause as
much damage as (if not more than) hardware
or software theft.
5. System Failure
• A system failure is the prolonged malfunction
of a computer
• A variety of factors can lead to system failure,
including
– Aging hardware
– Natural disasters
– Electrical power problems
– Under voltages, and over voltages
– Errors in computer programs
The Circle of Life
Birth
Psst!
Self-protection
Pass it on
Your wish is my
Call home
command
Birth
User invites malware onto PC
• Opens infected e-mail attachment
• Surfs infected web sites
• Clicks on link in mail, tweet, text message
• Runs infected app on social networking site
• Plugs in infected USB drive
Self-protection
Malware takes steps to protect itself
• Turn off anti-virus software
• Hide clones in places that users won’t notice
• Block anti-virus sites
• Install rootkit
• Infect common programs: Internet Explorer, Windows
Explorer,
Call home
Malware calls home for guidance
• Disguises the connection as web traffic
• Has internal address book with primary and fallback
addresses
• Reports in frequently, usually several times a day
Your wish is my command
Malware gets instructions from owner
• Download more malware, change own signature
• Send PC information home
• Log and report web sites
• Monitor and steal banking credentials
• Turn on microphone or camera
• Monitor and steal network account credentials
• Whatever the bad guy wants to do
Psst! Pass it on
Malware: the gift that keeps giving
• Sends infected mail from you to addresses found on your PC
From: [email protected]
To: [email protected]
Subject: Check this out!
• Infects writable files on network shares
• Installs itself on removable media
• Scans local network for vulnerable systems
• Scans Internet for vulnerable system
Grayware
• The term grayware (or greyware) refers to a
software program (small or large) that can
cause minor to moderate annoyance, or even
damage, to a computer system and its user.
• Most adware, malware, and spyware programs
can be classified as grayware.
• In general, grayware is not as destructive as
viruses, but rather are more of a irritant or
annoyance.
End