Introduction to
computer & systems
security
What is security?
Security is management of access to a resource of a
system.
A complete understanding of security should address
the following:
How does the system work?
How is the system vulnerable and what are the
threats?
How do we prevent harm to the system?
How do we detect and respond to attacks on the
system?
An attack on a system is simply an unauthorised
access or an attempt to access a resource where no
access is permitted. 2
Security cont./
Computer security rests on confidentiality, integrity, and
availability.
CONIDENTIALITY
Confidentiality is the concealment of information or
resources.
Access control mechanisms support confidentiality.
One access control mechanism for preserving confidentiality
is cryptography, which scrambles data to make it
incomprehensible.
3
Security cont./
INTEGRITY
Integrity refers to the trustworthiness of data or
resources, and is usually phrased in terms of preventing
improper or unauthorised change.
Integrity mechanisms fall into two classes: prevention
mechanisms and detection mechanisms.
Prevention mechanisms seek to maintain data integrity by
blocking any unauthorised attempts to change the data or
any attempts to change the data in unauthorised ways.
Detection mechanisms do not try to prevent violations of
integrity; they simply report that the data's integrity is no
longer trustworthy. 4
Security cont./
AVAILABILITY
Availability refers to the ability to use the information or
resource desired.
Availability is an important aspect of reliability because an
unavailable system is at least as bad as no system at all.
The aspect of availability that is relevant to security is that
someone may deliberately deny access to data or to a
service by making it unavailable.
DoS (denial of service) is a type of attack that makes
data or a resource unavailable when it’s not supposed to.
5
Concepts
AccessControl : The process of limiting access to the
resources of a system to only authorised persons,
programs, processes, or other systems.
Authentication : The process to verify the identity of a
user, device, or other entity in a computer system,
often as a prerequisite to allowing access to resources.
Non-repudiation : Method by which the sender is
provided with proof of delivery and the recipient is
assured of the sender’s identity, so that neither can
later deny having processed the data.
6
Security appliances & applications
Firewall: A firewall can be either software or hardware that
is installed to separate a trusted network from a less-
trusted network.
Firewalls in form of hardware (with integrated software) are
installed on networks and are usually configurable.
Personal firewalls are in software form and reside on a host.
A firewall monitors traffic entering or leaving either a
network or a machine and either allows or blocks traffic
based on a policy.
A firewall will by default discard all inbound
connections/traffic that's not in response to outbound
connections/traffic. 7
Intrusion Detection/Prevention Systems
A network intrusion is an unauthorised penetration
of a computer/system of an assigned domain.
Intrusion Prevention System (IPS): IPS is an
active device that listens promiscuously to all
incoming traffic to identify intrusions. It works with
the firewall to modify rule templates to block traffic
from the intruder address(es) while the intrusion is
still in progress.
Intrusion Detection System (IDS): IDS is a
passive device that listens promiscuously to all
incoming traffic to record and generate alerts and
issue TCP resets if necessary. 8
Threats
Threats are potential dangers.
Attacks are actions that exploit vulnerabilities.
Attackers are individuals performing attacks.
Hackers are individuals with high technical skills
(can be ethical or malicious).
• White Hat Hackers (Ethical Hackers)
• Black Hat Hackers (Malicious Hackers)
• Gray Hat Hackers
Crackersare malicious individuals focused on
breaking security measures.
9
Types of Attacks
Passive Attacks
• Involves monitoring or eavesdropping on
communication without altering data.
• Information gathering or surveillance.
• Difficult to detect since no changes are made to data
or systems.
Active Attacks
• Involves direct interaction, altering or disrupting data
or systems.
• Modify data, disrupt communication, or take control
of systems.
• Easier to detect due to changes in data or network
operations.
10
Attacks
There are three main classes of attacks that are commonly
found in today’s network environment:
• Access attacks
• Reconnaissance attacks
• Denial of service (DoS) attacks
ACCESS ATTACKS
This is an attempt to access another user account or
network device through improper means.
Unauthorized attacks are attempted via four means, all of
which try to by-pass some facet of the authentication
process:
(1) Password attacks (2) Trust exploitation
(3) Port redirection (4) Man-in-the-middle (MITM)
attacks. 11
Attacks cont./
RECONNAISSANCE ATTACKS
The attacker surveys a network and collects data for a
future attack. Such information includes the following:
Ports open on a server
Ports open on a firewall
IP addresses on the host network
Hostnames associated with the IP addresses
The four main subcategories or methods for gathering
network data:
(1) Packet sniffers (2) Ping sweeps
(3) Port scans (4) Information queries
Examples of utilities/programs that exploit the above
include: Wireshark, Ettercap, BackTrack, nmap etc. 12
Attacks cont./
DENIAL OF SERVICE (DoS) ATTACKS
DoS attacks are often implemented by a attackers as a
means of denying a service that is normally available to a
user or organization.
The three main forms of DoS are:
(1) Distributed DoS (DDoS) attack, (2) TCP SYN attack (3)
Smurf attack.
13
Attacks cont./
DDoS
With Distributed DoS, multiple systems are compromised to send a DoS
attack to a specific target.
The compromised systems are commonly called zombies or slaves.
As a result of the attack, the targeted system denies service to valid
users.
14
Attacks cont./
TCP SYN
In a TCP SYN attack, a SYN request is sent to a device with a
spoofed source IP address. The attacking system does not
acknowledge the resulting SYN-ACK, which causes the session
connection queues to fill up and stop taking new connection
requests.
15
Establishing a Security
Policy
A security policy defines:
◦ Organization’s security requirements
◦ Controls and sanctions needed to meet the
requirements
Security policies are formal rules and
guidelines dictating how an
organization's IT resources and
sensitive data should be protected.
Ensure consistent behavior, guide
employee actions, protect assets, and
mitigate risks.
16
Establishing a Security Policy
(cont’d.)
Areas of concern
◦ Email attachments
◦ Wireless devices
VPN uses the Internet to relay
communications but maintains privacy
through security features
Additional security includes encrypting
originating and receiving network
addresses
17
Establishing a Security Policy
(cont’d.)
Steps in Designing Security Policies:
Identify assets to be protected.
Conduct a risk assessment to identify
potential threats and vulnerabilities.
Define the scope and objectives of the
policy.
Involve stakeholders in the policy
creation process.
Regularly review and update the policy.
18
Educating Employees, Contractors,
and Part-Time Workers
Educate and motivate users to
understand and follow policy
Discuss recent security incidents
Help protect information systems by:
◦ Guarding passwords
◦ Not allowing sharing of passwords
◦ Applying strict access controls to protect
data
◦ Reporting all unusual activity
◦ Protecting portable computing and data
storage devices
19
Detection
Detection systems
◦ Catch intruders in the act
Intrusion detection system
◦ Monitors system/network resources and
activities
◦ Notifies the proper authority when it
identifies:
Possible intrusions from outside the
organization
Misuse from within the organization
◦ Knowledge-based approach
◦ Behavior-based approach
20
Detection Key components
Monitoring Systems
Alerting Mechanisms
Behavioral Analytics
Log Analysis:
21
Prevention
Implement a layered security solution
◦ Make computer break-ins harder
Installing a corporate firewall
◦ Limits network access
Intrusion prevention systems
◦ Block viruses, malformed packets, and other
threats
Installing antivirus software
◦ Scans for sequence of bytes or virus signature
◦ United States Computer Emergency Readiness
Team (US-CERT) serves as clearinghouse
22
Prevention
Access Control
Patch Management
Firewall and Perimeter
Encryption
Security Awareness Training
Regular Security Audits and
Vulnerability Assessments
End point Protection
23
Response
Response plan
◦ Develop well in advance of any incident
◦ Approved by:
Legal department
Senior management
Primary goals
◦ Regain control and limit damage
◦ Not to monitor or catch an intruder
24
Response (cont’d.)
Review
◦ Determine exactly what happened
◦ Evaluate how the organization responded
Weigh carefully the amount of effort
required to capture the perpetrator
Consider the potential for negative
publicity
Legal precedent
◦ Hold organizations accountable for their own
IT security weaknesses
25
Response Key components
Incident Containment
Eradication
Recovery
Communication
Post-Incident Review (Lessons Learned)
26
Key considerations in
Implementing Security Policies
Ensure management buy-in and
support.
Communicate the policy to all
employees.
Provide training on the policy.
Monitor compliance and enforce the
policy.
27
Risk Management
Process of identifying, assessing, and
mitigating security risks to protect an
organization's assets.
28
Key Elements of Risk
Management
• Risk Identification: Identify assets and
potential threats (e.g., cyber-attacks,
insider threats, natural disasters).
• Risk Assessment: Determine the
likelihood and impact of identified risks.
• Risk Mitigation: Implement controls to
reduce risk (e.g., firewalls, encryption,
access controls).
• Risk Monitoring: Continuously monitor
and review risks to address new threats.
29
Vulnerability Assessments
Identify and evaluate security
weaknesses in a system.
◦ Scanning for vulnerabilities (e.g., software
flaws, outdated systems).
◦ Evaluating the impact of discovered
vulnerabilities.
◦ Providing recommendations for fixing
vulnerabilities.
30
Penetration Testing
Simulates real-world attacks to identify
exploitable vulnerabilities.
External (from outside the network) and
internal (from within the network).
◦ Planning and reconnaissance.
◦ Scanning and gaining access.
◦ Maintaining access and exploitation.
◦ Reporting findings and remediation
suggestions.
31
Security Audits
Assess overall security posture and
compliance with policies/regulations.
Internal audits (by the organization)
and
external audits (by third parties).
◦ Review of policies, procedures, and technical
controls.
◦ Assessment of security configurations and
access controls.
◦ Reporting compliance gaps and
recommendations.
32
The End
Questions??