Computer Security & Risks - Chapter 11 Part 2 PDF

Document Details

EnergeticCognition8823

Uploaded by EnergeticCognition8823

University of Sharjah

Tags

computer security cybersecurity information security technology

Summary

This presentation covers computer security and risks, outlining various protection mechanisms and concepts. It describes different methods like passwords, firewalls, encryption, and audit controls. The document also addresses the balance between security and privacy, touches on cyberwarfare aspects, and includes sections about backups and safe computing practices. The presentation also delves into hardware and software solutions for security and protection of computer systems, outlining procedures like preventative measures and strategies for handling cyberattacks.

Full Transcript

Computer Security & Risks Chapter 11 Part 2 2 Outline Protection ▫ Passwords ▫ Firewalls ▫ Encryption ▫ Audit Control ▫ Backup Security vs Privacy Cyberwar 3 Physical Access Restriction...

Computer Security & Risks Chapter 11 Part 2 2 Outline Protection ▫ Passwords ▫ Firewalls ▫ Encryption ▫ Audit Control ▫ Backup Security vs Privacy Cyberwar 3 Physical Access Restriction Security Biometrics: Identification of humans by their unique traits Somethin Somethin Somethin Somethin g You g You g About g You Do Have Know You Key Password Signature Voice Print Typing Lock Access speed and Combinatio Fingerprint Card error n pattern Retinal Scan 4 Passwords Most common tool used to restrict access to computers Effective Passwords: - Not real words - Changed frequently Password Rules Weak Strong Passwords should have more than 8 password Mtwf!382 characters 12345678 GatsbJ11*) With numbers, symbols, upper and lower case letters Don’t use a password someone can Saeed1994 S@ed#1$9 guess, such as your name, birthday. 1stMarJohn 13j*nUiM 5 Access Privileges Access Control Software ▫ Doesn’t need to treat all users identically ▫ e.g. At least one of the accounts on a PC must be Administrator, which has additional privileges:  Permission to install additional software  Change system settings 6 Firewalls Protect from hackers It filters information between a private system and the rest of the internet. It could be either: ▫ Software program ▫ Hardware device ▫ Both together 7 Encryption Scrambling transmitted messages to secure them using a secret code called Key Reverse process to retrieve original message is called Decryption 8 Left-shift & Right-shift Encryption Left Key: Replace every letter with the 5th letter before it. Right Key: Replace every letter with the 5th successive letter. 9 Protection & Prevention Anti-virus Software ▫ Protect computer/files from harm ▫ Detect viruses and delete them ▫ Run scheduled scans in the background ▫ Needs to be frequently revised for new viruses ▫ Days required to develop patches for new viruses 10 Audit Control Software Monitoring and recording user’s computer transactions ▫ Tracing and identifying suspicious computer activity 11 Backups & Other Precautions Uninterrupted Power Supply (UPS) ▫ Protects data loss due to Power failure Surge Protector ▫ Shields electronic equipment from dangerous power spikes 12 Backups & Other Precautions Backups are used to replace originals Best data recovery insurance is Regular Backups Backup storage: ▫ Online in the cloud – remote storage ▫ Off-site – hard drives or flash drives stored in remote locations ▫ Backup drive in laptops, external hard drives, network storage Types of backups: ▫ Incremental: only new files or modified files  Happens more or less continuously e.g. Hourly, Daily ▫ Bootable: Entire system backup  Makes a complete duplicate of a disk in case of a crash e.g. Weekly or after installing new software 13 Safe Computing If it’s important, back it Share with care. up. Handle shareware and If it’s sensitive, lock it freeware with care. up. Don’t pirate software. If you’re sending Disinfect regularly. sensitive information, Take your passwords consider encryption. seriously. Beware of email bearing gifts. 14 Security vs Privacy Security measures prevent crime but they can also threaten privacy Smart badges ▫ broadcast identification codes ▫ A badge-location database stores data about the location of the badge (or person) ▫ Instead of paging the entire hospital, an operator could route the call. Smart phones have proximity recognition technology 15 UAE Cybercrime Law UAE Cybercrime Law No 5 of 2012 ▫ Any form of misuse of a computer/smart device or an electronic network/system ▫ Stern punishments that could go up to a life sentence and/or a fine varying between Dh50,000 and Dh3 million depending the severity and seriousness of the cybercrime  E.g. breaching someone’s privacy by copying, saving or publishing their photo or personal data using an electronic device is an offence punishable by at least six months in prison and/or a fine of up to Dh500,000, even if the photo was taken in a public place. 16 Security & Reliability Software Bugs ▫ It cause more damage than viruses It is impossible to eliminate all bugs ▫ The bigger the system the bigger the problem 17 Google search Engine - 2010 18 Security & Reliability Y2K Bug ▫ For decades only two digits were used for year; e.g. (89  1989) ▫ But in 2000 it would become 00 causing calculation errors. More than 100 billion dollars spent to avert the disaster ▫ Many programs had to be changed 19 Computers at War Smart weapons ▫ Missiles that use computerized guidance systems to locate their targets Autonomous system ▫ Complex system that can assume almost complete responsibility for a task without human input 20 Computers at War: Cyber Warfare By attacking computer networks the enemy can cripple: ▫ Telecommunications ▫ Power grids ▫ Water and gas supplies

Use Quizgecko on...
Browser
Browser