COMPUTER SECURITY in Information Security

EdFeranil 79 views 50 slides Jul 08, 2024
Slide 1
Slide 1 of 50
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50

About This Presentation

computer security


Slide Content

COMPUTER SECURITY information assurance security

What is security?

What is security?

CIA Triad (security properties) Availability Integrity Confidentiality Confidentiality – restrict access to authorized individuals Integrity – data has not been altered in an unauthorized manner Availability – information can be accessed and modified by authorized individuals in an appropriate timeframe

Confidentiality A good example of a method for protecting sensitive data and ensuring confidentiality is requiring an account number or routing number when banking online. Data encryption is another common method of ensuring confidentiality

INtegrity The integrity of your data is maintained only if the data is authentic, accurate, and reliable. For example, if your company provides information about senior managers on your website, this information needs to have integrity.  Hashing, encryption, digital certificates, and digital signatures are examples of the integrity component of the CIA triad

Availability This means that systems, networks, and applications must be functioning as they should and when they should. Also, individuals with access to specific information must be able to consume it when they need to, and getting to the data should not take an inordinate amount of time. Some common causes of availability breaches include hardware or software failures, network outages, power outages, natural disasters and cyberattacks

What is computer security?

Introduction Computers and digital devices are becoming integral to conducting business Which also makes them a target of attack Devices needs to be secured Networks that computers and devices use should also be secured

Computer security computer security , also called  cybersecurity , the protection of  computer  systems and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same means used to protect other valuable or sensitive equipment—namely, serial numbers, doors and locks, and alarms. 

Computer Security Protecting computers, information, and services from unauthorized access, change or destruction.

Information security Information security, sometimes abbreviated to infosec, is  a set of practices intended to keep data secure from unauthorized access or alterations, both when it's being stored and when it's being transmitted from one machine or physical location to another . You might sometimes see it referred to as data security

Internet security Internet Security extends the concept of computer security to systems that are connected to the internet Browsing the Internet Electronic Commerce Social Networking E- mail

Who should care? Anyone who uses Computers Mobile devices The internet E-mail Social Network

Why should we care?

Why should everyone care? Phishing, malware, scam, spams Broken devices Privacy and personal security

Tools for Information Security Authentication Access Control Encryption Passwords Backup Firewalls Virtual Private Networks (VPN) Physical Security Security Policies

Cybercrime cybercrime, also called computer crime,  the use of a computer as an instrument to further illegal ends , such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy.

What law acts as Cybercrime law in the Philippines?

Cybercrime law The Philippine Congress enacted  Republic Act No.   10175 or “Cybercrime Prevention Act of 2012”  which addresses crimes committed against and through computer systems on 12 September 2012. It includes penal substantive rules, procedural rules and also rules on international cooperation.

The key provisions of the Cybercrime Prevention Act of 2012 Illegal Access:   Illegal Interception: Data Interference:   System Interference:   Misuse of devices:   Cybersquatting:   Computer related Forgery: Computer-related Fraud:   Computer-related Identity Theft:   Cybersex:   Child Pornography :  Libel :  Aiding or Abetting in the commission of cybercrime : Attempt in the commission of cybercrime:  Corporate Liability :

Security Problem in computing information assurance security

Cryptography and Network Security Principles

Cryptography Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents. The term is derived from the Greek word kryptos , which means hidden.

Cryptography An example of basic cryptography is an encrypted message in which letters are replaced with other characters. To decode the encrypted contents, you would need a grid or table that defines how the letters are transposed. For example, the translation grid below could be used to decode "1234125678906" as "techterms.com"

Cryptography In present day scenario security of the system is the sole priority of any organization. The main aim of any organization is to protect their data from attackers. In cryptography, attacks are of two types such as Passive attacks and Active attacks.

Cryptography Passive attacks are those that retrieve information from the system without affecting the system resources while active attacks are those that retrieve system information and make changes to the system resources and their operations.

The Principles of Security classification: Confidentiality: The degree of confidentiality determines the secrecy of the information. The principle specifies that only the sender and receiver will be able to access the information shared between them. Confidentiality compromises if an unauthorized person is able to access a message. For example, let us consider sender A wants to share some confidential information with receiver B and the information gets intercepted by the attacker C. Now the confidential information is in the hands of an intruder C.

The Principles of Security classification: Authentication: Authentication is the mechanism to identify the user or system or the entity. It ensures the identity of the person trying to access the information. The authentication is mostly secured by using username and password. The authorized person whose identity is preregistered can prove his/her identity and can access the sensitive information.

The Principles of Security classification: Integrity: Integrity gives the assurance that the information received is exact and accurate. If the content of the message is changed after the sender sends it but before reaching the intended receiver, then it is said that the integrity of the message is lost.

Some examples of passive attacks include eavesdropping, traffic analysis, and monitoring network traffic to obtain sensitive information. In contrast, active attacks include denial-of-service (DoS) attacks, malware infections, and phishing attacks, which involve actively manipulating or modifying data or systems

The Principles of Security classification: Non-Repudiation: Non-repudiation is a mechanism that prevents the denial of the message content sent through a network. In some cases the sender sends the message and later denies it. But the non-repudiation does not allow the sender to refuse the receiver.

Non- repudation Nonrepudiation provides proof of the origin, authenticity and integrity of data. It provides assurance to the sender that its message was delivered, as well as proof of the sender's identity to the recipient. This way, neither party can deny that a message was sent, received and processed. Real life example, if you take a pen and sign a (legal) contract your signature is a nonrepudiation device. You cannot later disagree to the terms of the contract or refute ever taking party to the agreement

The Principles of Security classification: Access control: The principle of access control is determined by role management and rule management. Role management determines who should access the data while rule management determines up to what extent one can access the data. The information displayed is dependent on the person who is accessing it.

The Principles of Security classification: Availability: The principle of availability states that the resources will be available to authorize party at all times. Information will not be useful if it is not available to be accessed. Systems should have sufficient availability of information to satisfy the user request.

Elevation of Privilege Elevation of privilege results from giving an attacker authorization permissions beyond those initially granted. For example, an attacker with a privilege set of "read only" permissions somehow elevates the set to include "read and write.“ A hacker might compromise a user's internet bank account user and then try to get access to site administrative functions

Elevation of Privilege Vertical privilege escalation, also known as a privilege elevation attack, involves an increase of privileges/privileged access beyond what a user, application, or other asset already has. This entails moving from a low-level of privileged access, to a higher amount of privileged access

Data Encryption Data encryption translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it. Encrypted data is commonly referred to as ciphertext, while unencrypted data is called plaintext. Currently, encryption is one of the most popular and effective data security methods used by organizations. Two main types of data encryption exist - asymmetric encryption , also known as public-key encryption, and symmetric encryption .

THE PRIMARY FUNCTION OF DATA ENCRYPTION The purpose of data encryption is to protect digital data confidentiality as it is stored on computer systems and transmitted using the internet or other computer networks. The outdated data encryption standard (DES) has been replaced by modern encryption algorithms that play a critical role in the security of IT systems and communications.

THE PRIMARY FUNCTION OF DATA ENCRYPTION These algorithms provide confidentiality and drive key security initiatives including authentication, integrity, and non-repudiation. Authentication allows for the verification of a message’s origin, and integrity provides proof that a message’s contents have not changed since it was sent. Additionally, non-repudiation ensures that a message sender cannot deny sending the message.

THE PROCESS OF DATA ENCRYPTION Data, or plaintext, is encrypted with an encryption algorithm and an encryption key. The process results in ciphertext, which only can be viewed in its original form if it is decrypted with the correct key.

THE PROCESS OF DATA ENCRYPTION Symmetric-key ciphers use the same secret key for encrypting and decrypting a message or file. While symmetric-key encryption is much faster than asymmetric encryption, the sender must exchange the encryption key with the recipient before he can decrypt it.

THE PROCESS OF DATA ENCRYPTION On the other hand, asymmetric cryptography, sometimes referred to as public-key cryptography, uses two different keys, one public and one private. The public key, as it is named, may be shared with everyone, but the private key must be protected.

THE PROCESS OF DATA ENCRYPTION The Rivest-Sharmir-Adleman (RSA) algorithm is a cryptosystem for public-key encryption that is widely used to secure sensitive data, especially when it is sent over an insecure network like the internet. The RSA algorithm’s popularity comes from the fact that both the public and private keys can encrypt a message to assure the confidentiality, integrity, authenticity, and non- repudiability of electronic communications and data through the use of digital signatures.

THE PROCESS OF DATA ENCRYPTION The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.S. government to protect classified information. AES is implemented in software and hardware throughout the world to encrypt sensitive data. It is essential for government computer security, cybersecurity and electronic data protection.

THE PROCESS OF DATA ENCRYPTION How AES encryption works AES includes three block ciphers: AES-128 uses a 128-bit key length to encrypt and decrypt a block of messages. AES-192 uses a 192-bit key length to encrypt and decrypt a block of messages. AES-256 uses a 256-bit key length to encrypt and decrypt a block of messages.

THE PROCESS OF DATA ENCRYPTION How AES encryption works AES includes three block ciphers: AES-128 uses a 128-bit key length to encrypt and decrypt a block of messages. AES-192 uses a 192-bit key length to encrypt and decrypt a block of messages. AES-256 uses a 256-bit key length to encrypt and decrypt a block of messages. Each cipher encrypts and decrypts data in blocks of 128 bits using cryptographic keys of 128, 192 and 256 bits, respectively.

What's the difference between AES vs. RSA? AES is used widely for protecting data at rest. Applications for AES include: self-encrypting disk drives database encryption storage encryption The  RSA  (Rivest-Shamir-Adleman) algorithm is often used in web browsers to connect to websites, in virtual private network ( VPN ) connections and in many other applications.

References https://www.geeksforgeeks.org/active-and-passive-attacks-in-information-security/?ref=lbp https://docs.microsoft.com/en-us/dotnet/framework/wcf/feature-details/elevation-of-privilege https://www.google.com/ search?q = elevation+priviledge&rlz =1C1GCEU_enPH969PH969&oq= elevation+priviledge&aqs =chrome..69i57j0i13j0i13i30l2j0i10i22i30j0i5i10i13i30j0i5i13i30j0i8i13i30l3.4238j0j4&sourceid= chrome&ie =UTF-8 https://digitalguardian.com/blog/what-data-encryption https://www.techtarget.com/searchsecurity/definition/Advanced-Encryption-Standard
Tags