Computer Security Module 13, Saudi Electronic University 2011-1432 PDF
Document Details
Uploaded by PalatialMoonstone8208
Saudi Electronic University
2011
Saudi Electronic University
Tags
Summary
This document is a module on computer security from Saudi Electronic University, covering topics like wireless network authentication, security threats, cybercrime, malware, spoofing, sniffing, phishing, and best practices. It's part of a wider Computer Essentials course, and it is intended for an undergraduate audience.
Full Transcript
College of Computing and Informatics CS001: Computer Essentials Computer Essentials Module 13 Computer Security 1. Wireless Network Authentication 2. Summarize the danger of sharing personal information on the Inter...
College of Computing and Informatics CS001: Computer Essentials Computer Essentials Module 13 Computer Security 1. Wireless Network Authentication 2. Summarize the danger of sharing personal information on the Internet. 3. Explain how cookies and global unique identifiers endanger privacy. 4. Security Threats Posed by Computer Criminals 5. Explain cybercrime and its technique. 6. Spoofing & Sniffing Contents 7. Discuss different types of malwares. 8. Malicious Programs 1. WLOC1: Summarize the danger of sharing personal information on the Internet 2. WLOC2: Explain how cookies and global unique identifiers endanger privacy. 3. WLOC3: Explain cybercrime and its technique. 4. WLOC4: Discuss different types of malwares. 5. WLOC5: How to avoid cybercrime. Weekly Learning Outcomes Required Reading 1. Chapter 32 - (Introduction to Computers and Information Technology: Preparing for IC3 Certification) Recommended Reading 1. Chapter 15- Essential for Computing Studies, Profession And Entrance Examinations 2. Link1: https://lms.seu.edu.sa/bbcswebdav/pid-11200106-dt-content-rid- 199260556_1/xid-199260556_1 Cyber Security اﻷﻣﻦ اﻟﺴﻴﺒﺮاﻧﻲ Cyber Security Cyber security is an essential aspect of our digital lives, requiring continuous effort from individuals, organizations, and C S governments to protect against a wide 0 range of cyber threats. 0 1 ﻳﻌﺪ اﻷﻣﻦ اﻟﺴﻴﺒﺮاﻧﻲ ﺟﺎﻧ ًﺒﺎ ،أﺳﺎﺳﻴﺎ ﻣﻦ ﺣﻴﺎﺗﻨﺎ اﻟﺮﻗﻤﻴﺔ ً ﻣﺴﺘﻤﺮا ﻣﻦ ً وﻳﺘﻄﻠﺐ ﺟﻬﺪً ا اﻷﻓﺮاد واﻟﻤﻨﻈﻤﺎت واﻟﺤﻜﻮﻣﺎت.ﻟﻠﺤﻤﺎﻳﺔ ﻣﻦ ﻣﺠﻤﻮﻋﺔ واﺳﻌﺔ ﻣﻦ اﻟﺘﻬﺪﻳﺪات اﻟﺴﻴﺒﺮاﻧﻴﺔ 8 Restricted - ﻣﻘﻴﺪ ﻫﻮ ﻣﻤﺎرﺳﺔ:اﻷﻣﻦ اﻟﺴﻴﺒﺮاﻧﻲ ﺣﻤﺎﻳﺔ أﺟﻬﺰة اﻟﻜﻤﺒﻴﻮﺗﺮ واﻟﺨﻮادم Definition of cyber security واﻷﺟﻬﺰة اﻟﻤﺤﻤﻮﻟﺔ واﻷﻧﻈﻤﺔ اﻹﻟﻜﺘﺮوﻧﻴﺔ واﻟﺸﺒﻜﺎت واﻟﺒﻴﺎﻧﺎت ﻣﻦ اﻟﻬﺠﻤﺎت اﻟﻀﺎرة أو اﻟﺘﻠﻒ Cyber security:.أو اﻟﻮﺻﻮل ﻏﻴﺮ اﻟﻤﺼﺮح ﺑﻪ وﻳﺸﻤﻞ ﻣﺠﻤﻮﻋﺔ ﻣﻦ is the practice of protecting computers, servers, اﻟﺘﻘﻨﻴﺎت واﻟﻌﻤﻠﻴﺎت اﻟﻤﺼﻤﻤﺔ ﻟﺤﻤﺎﻳﺔ ﺳﻼﻣﺔ وﺳﺮﻳﺔ.وﺗﻮاﻓﺮ اﻟﻤﻌﻠﻮﻣﺎت واﻷﻧﻈﻤﺔ اﻟﺘﻲ ﺗﻌﺎﻟﺠﻬﺎ أو ﺗﺨﺰﻧﻬﺎ mobile devices, electronic systems, networks, and data from malicious attacks, damage, or C S unauthorized access. It encompasses a range of 0 0 techniques and processes designed to safeguard the 1 integrity, confidentiality, and availability of information and systems that process or store it. 9 Restricted - ﻣﻘﻴﺪ CIA Triad ﺛﺎﻟﻮث وﻛﺎﻟﺔ اﻟﻤﺨﺎﺑﺮات اﻟﻤﺮﻛﺰﻳﺔ In cyber security, the term "CIA" refers to the CIA Triad, a widely-accepted model designed to guide policies for information security within an organization. The three elements of the CIA Triad are: C Cyber Security S 0 0 Confidentiality 1 CIA Integrity Availability 10 Restricted - ﻣﻘﻴﺪ ﻳﺴﻌﻰ ﻫﺬا اﻟﺠﺎﻧﺐ:اﻟﺴﺮﻳﺔ CIA Triad ﻣﻦ اﻟﺜﺎﻟﻮث إﻟﻰ ﻣﻨﻊ اﻟﻤﻌﻠﻮﻣﺎت اﻟﺤﺴﺎﺳﺔ ﻣﻦ اﻟﻮﺻﻮل إﻟﻰ اﻷﺷﺨﺎص :اﻟﺴﺮﻳﺔ ﻣﻊ اﻟﺘﺄﻛﺪ ﻣﻦ أن اﻷﺷﺨﺎص،اﻟﺨﻄﺄ Confidentiality: This aspect of the triad seeks اﻟﻤﻨﺎﺳﺒﻴﻦ ﻳﻤﻜﻨﻬﻢ اﻟﺤﺼﻮل ﻋﻠﻴﻬﺎ وﻳﺘﻀﻤﻦ ذﻟﻚ اﻟﺘﺸﻔﻴﺮ.ﺑﺎﻟﻔﻌﻞ to prevent sensitive information from واﻟﻤﺼﺎدﻗﺔ اﻟﺜﻨﺎﺋﻴﺔ واﻟﻄﺮق اﻷﺧﺮى ﻟﻀﻤﺎن وﺻﻮل اﻷﻓﺮاد اﻟﻤﺼﺮح reaching the wrong people, while making وﻳﺘﻌﻠﻖ.ﻟﻬﻢ ﻓﻘﻂ إﻟﻰ اﻟﻤﻌﻠﻮﻣﺎت.اﻷﻣﺮ ﺑﺎﻟﺤﻔﺎظ ﻋﻠﻰ ﺧﺼﻮﺻﻴﺔ اﻟﺒﻴﺎﻧﺎت وأﻣﺎﻧﻬﺎ sure that the right people can in fact get it. This involves encryption, two-factor authentication, and other methods to ensure that only authorized individuals have access to the information. It's about keeping data private and secure. Restricted - ﻣﻘﻴﺪ. ﺗﺴﺘﺨﺪم اﻟﻤﻨﻈﻤﺎت اﻟﺘﺸﻔﻴﺮ،ﻟﺤﻤﺎﻳﺔ اﻟﺴﺮﻳﺔ CIA Triad اﻟﺘﺸﻔﻴﺮ ﻫﻮ ﻋﻤﻠﻴﺔ ﺗﺤﻮﻳﻞ اﻟﻤﻌﻠﻮﻣﺎت:اﻟﺘﻌﺮﻳﻒ وﺧﺎﺻﺔ ﻟﻤﻨﻊ اﻟﻮﺻﻮل،أو اﻟﺒﻴﺎﻧﺎت إﻟﻰ رﻣﺰ To safeguard confidentiality, organizations use encryption اﻟﺴﻴﺒﺮاﻧﻲ. ﻳﺘﻀﻤﻦ ﻫﺬا اﻷﻣﻦ.ﻏﻴﺮ اﻟﻤﺼﺮح ﺑﻪ اﺳﺘﺨﺪام ﺧﻮارزﻣﻴﺔ ﻟﺘﺤﻮﻳﻞ اﻟﻨﺺ اﻟﻌﺎدي Definition: Encryption is the process of إﻟﻰ ﺗﻨﺴﻴﻖ ﻏﻴﺮ ﻗﺎﺑﻞ ﻟﻠﻘﺮاءة ﻳُ ﻌﺮف ﻳﺴﺘﺨﺪم اﻟﺘﺸﻔﻴﺮ.ﺑﺎﺳﻢ اﻟﻨﺺ اﻟﻤﺸﻔﺮ converting information or data into a code, ،ﻋﺎد ًة اﻟﻤﻔﺎﺗﻴﺢ وﻫﻲ أﻛﻮاد ﺳﺮﻳﺔ أو.ﺧﻮارزﻣﻴﺎت ﺗﺴﺘﺨﺪم ﻟﺘﺸﻔﻴﺮ وﻓﻚ ﺗﺸﻔﻴﺮ اﻟﺒﻴﺎﻧﺎت especially to prevent unauthorized access. This C Cyber Security S involves using an algorithm to transform plain 0 text into an unreadable format known as 0 1 ciphertext. Encryption typically uses keys, which are secret codes or algorithms used to encrypt and decrypt the data. 12 Restricted - ﻣﻘﻴﺪ CIA Triad Types of Encryption: 1.Symmetric Encryption: Uses the same key for both encryption and decryption. It's fast and efficient for large amounts of data but requires secure key management since the same key must be shared among users. C Cyber Security S Decryption Encryption 0 0 1 same key 13 Restricted - ﻣﻘﻴﺪ CIA Triad Types of Encryption: 2.Asymmetric Encryption: Utilizes a pair of keys – a public key and a private key. The public key is shared openly, while the private key is kept secret. C Cyber Security Encryption Decryption S 0 0 1 Public Private 14 Restricted - ﻣﻘﻴﺪ CIA Triad Integrity: data should not be altered in transit, and steps should be taken to ensure that data cannot be altered by unauthorized people (for instance, through access controls or version control). It's crucial for operations that rely on accurate and reliable data, like financial services. C Cyber Security S 0 0 1 The data was not modified during the sending process 15 Restricted - ﻣﻘﻴﺪ CIA Triad To maintain integrity, implement Hashing. Definition: Hashing is the process of converting data (of any size) into a fixed- size value or a hash code using a mathematical function, known as a hash function. This hash code acts as a digital fingerprint of the data. C Cyber Security S Unique Output: Ideally, each unique input will produce a unique hash. Even a 0 0 small change in the input data will result in a significantly different hash value. 1 Plain Text Hash Function Hash value 16 Restricted - ﻣﻘﻴﺪ CIA Triad Availability: This refers to ensuring that information is readily available to authorized users when needed. Measures to ensure availability include hardware maintenance, C Cyberpatching/updating, software Security and network S 0 optimization. Also, in the event of an issue such 0 1 as a power outage or hardware failure, there should be a plan in place for recovery to restore information and systems. 17 Restricted - ﻣﻘﻴﺪ CIA Triad To ensure availability, organizations rely on backup systems. Definition: Backup creates redundant copies of data, ensuring that if the primary data source C Cyber Security becomes unavailable (due to issues like hardware S 0 failure, software corruption, or cyber-attacks), 0 1 there is an alternative source from which the data can be retrieved. Implementing a schedule for regular backups (daily, weekly, monthly) to minimize data loss. 18 Restricted - ﻣﻘﻴﺪ Types of Cyber Threats - Malware Malware, short for "malicious software," refers to any software intentionally designed to cause damage to a computer, server, client, or computer network. It is a broad term that encompasses various types of threats on the cyber landscape. Understanding different types of malware is essential in developing C Cyber Security S effective strategies to protect against them. Here's an overview: 0 0 Types of Malware 1 Virus: A malicious code that attaches itself to clean files and spreads throughout a computer system, infecting files with malicious code. 19 Restricted - ﻣﻘﻴﺪ Types of Cyber Threats - Malware Types of Malware Trojan Horse: is hidden in legitimate software. It tends to creates backdoors in your security to let other malware in. C Cyber Security S Worm: A type of malware that spreads copies of itself 0 0 from computer to computer. A worm can replicate 1 itself without any human interaction and does not need to attach itself to a software program to cause damage. 20 Restricted - ﻣﻘﻴﺪ Types of Cyber Threats - Malware Types of Malware Ransomware: Designed to encrypt a user’s files and demand payment in exchange for the key to decrypt them. Spyware: A program that secretly records what a user C Cyber Security S does, so that cybercriminals can make use of this 0 0 information. For example, spyware could capture credit 1 card details. Keyloggers: Record the keys struck on a keyboard to steal passwords or other sensitive information. 21 Restricted - ﻣﻘﻴﺪ Types of Cyber Threats - Malware How Malware Spreads Email Attachments: Malware can be hidden in email attachments. Infected Software: Downloading cracked software can lead to malware infections. C Cyber Security S Malicious Websites: Visiting malicious websites can result in malware being 0 0 downloaded and installed without the user’s knowledge. 1 Removable Drives: USB and other removable drives can be infected and spread malware when connected to different computers. 22 Restricted - ﻣﻘﻴﺪ Types of Cyber Threats - Spoofing Spoofing The attacker’s computer assumes a false Internet address in order to gain access to a network. This type of attack used by people who do not have a legitimate username or password to the network where the data resides. The attacker waits for a legitimate user to log in, and then hijacks that user’s IP address and takes over. C Cyber Security S 0 0 1 23 Restricted - ﻣﻘﻴﺪ Types of Cyber Threats - Sniffing Sniffing is the capability to capture copies of data packets as they travel across the network and decode their content. Figure below shows an extract from a sniffing program called Wireshark. The snapshot identifies the address of the website that the user is visiting (Google.co.uk), the operating system (Windows), and the browser (in this case, Firefox). C Cyber Security S 0 0 1 24 Restricted - ﻣﻘﻴﺪ Types of Cyber Threats - Phising Phishing is a type of cyber attack that involves tricking individuals into sensitive information, such as login credentials, credit card numbers, and other personal or financial information. It's one of the most common and effective types of cyber threats. C Cyber Security S Types of Phishing Attacks 0 General Phishing: Generic emails sent 0 1 to many people, hoping for a few responses. 25 Restricted - ﻣﻘﻴﺪ Types of Cyber Threats - Phishing Types of Phishing Attacks Spear Phishing: Targeted attacks aimed at specific individuals or organizations. These are often well- researched and seem more legitimate. C Cyber Security S Whaling: A form of spear phishing targeting high-profile 0 0 individuals like senior executives. 1 Pharming: Redirecting users from legitimate websites to fraud ones for the purpose of extracting confidential data. 26 Restricted - ﻣﻘﻴﺪ Types of Cyber Threats - Phishing Considerations to identify Phishing Phishing emails are getting more sophisticated and harder to recognize, but here are some considerations that will help you identify them: Do you actually have an account with that bank or company? If not, it’s reasonable to assume the message is an attempt at phishing. C Cyber Security S Check the source of the email. Does the email address match the organization’s standard email address? Check not only the address that appears as text in the message, but also 0 the address that appears as a ScreenTip when you point the mouse 0 1 at it. If you hover over the link to the company website with your mouse, it shows you the true URL. Is the address correct? 27 Restricted - ﻣﻘﻴﺪ Cyber of Cyber Threats - Phishing Types Security Considerations to identify Phishing Are there grammar and spelling mistakes? Does the message appear in the language you would expect? Even if the body text is in the expected language, are there buttons or other details with text from another language? These are all indications of a possible attempt at phishing. N o tice th a t th e em a il is fro m service@ id -a p p a ctiva te.co m. T h e a d d ress d o esn’t en d in @ a p p le.co m. C S 0 0 1 28 Restricted - ﻣﻘﻴﺪ A n exa m p le o f a p h ish in g em a il. Cyber Types Security of Cyber Threats - Phishing Considerations to identify Fake credentials screen. yo u w o u ld see th e screen b elo w th a t a p p ea rs to b e th e A p p le lo g in screen ,a s resu lt o f clickin g su sp ected embedded lin ks. T h e p a g e m ay lo o k a u th en tic, b u t th e U R L in d ica tes th a t it is n o t th e o fficia l A p p le w eb site. T h e p resen ce o f th e p a d lo ck ico n is n o g u a ra n tee th a t th e p a g e is tru ly secu re. C S 0 0 1 29 Restricted - ﻣﻘﻴﺪ Fa ke cred en tia ls screen. Types of Cyber Threats – Phishing email Considerations to identify Email Phishing R em em b er th a t rea l co m p a n ies a n d b a n ks never a sk fo r p erso n a l in fo rm a tio n Legitimate banks and other companies will never send an email asking you to submit sensitive personal information online. Never click on the links in suspected emails. C Cyber Security S As a good Internet citizen, you should report the emails to the bank or other company 0 to make them aware of the phishing attempts. 0 1 Recipients of phishing email should delete them without opening them. If they do open the mail by mistack, they should not click on the embedded link. 30 Restricted - ﻣﻘﻴﺪ Types of Cyber Threats - Malware Prevention and Mitigation Antivirus Software: Use antivirus software and keep it updated. Software Updates: update all software, including operating systems and applications. C Cyber Security S Email Caution: Be cautious with email attachments and links from 0 0 unknown or untrusted sources. 1 Backups: Regularly backup important data to recover in case of a malware infection. 31 Restricted - ﻣﻘﻴﺪ Types of Cyber Threats - Phishing Prevention and Protection Strategies Education and Awareness: Training users to recognize and report phishing attempts. Use of Spam Filters: Implementing email filtering solutions to catch C Cyber Security S potential phishing emails. 0 0 Regular Updates and Security Measures: Keeping systems and software 1 up-to-date with security patches. Two-Factor Authentication (2FA): Using 2FA can prevent unauthorized access, even if login details are compromised. 32 Restricted - ﻣﻘﻴﺪ Best practices in cyber security Adopting best practices in cyber security is essential for both individuals and organizations to protect against a wide array of cyber threats. Here's a comprehensive list of best practices: 1. Use Strong, Unique Passwords Avoid common words and simple phrases. Use a mix of letters (both uppercase and lowercase), numbers, and symbols. Consider using a passphrase or a password manager to generate and store complex passwords. Restricted - ﻣﻘﻴﺪ Best practices in cyber security 2. Implement Multi-Factor Authentication (MFA) Use additional verification methods beyond just passwords, like OTPs (One-Time Passwords), biometric verification, or security tokens. C Cyber Security S 3. Regular Software Updates and Patch Management 0 0 Keep all software, including operating systems and 1 applications, up-to-date with the latest security patches. Automate updates where possible to ensure timely application. 34 Restricted - ﻣﻘﻴﺪ Best practices in cyber security 4. Use Antivirus and Anti-Malware Solutions Install reputable antivirus and anti-malware programs. Keep these programs updated and run regular scans. 5. Regular Backups C Cyber Security S Backup important data regularly. 0 0 Use multiple methods, such as cloud storage and 1 external hard drives. Ensure backups are secure and easily recoverable. 35 Restricted - ﻣﻘﻴﺪ References Weixel, S., (2018). Introduction to Computers and Information Technology. Pearson. Wepmen, F. (2014). Computing Fundamentals. (IC3 EDITION). Wiley Thank You