KEMBAR78
Information and Computer Security 7 | PDF | Information Security | Security
0% found this document useful (0 votes)
50 views14 pages

Information and Computer Security 7

Operating system, database, and web security are important types of protection and security. [1] Operating system security ensures integrity, confidentiality and availability through techniques like regular patches, antivirus software, firewalls, and secure user accounts. [2] Database security protects the database, data, management system and applications through encryption, access controls, and firewalls. [3] Web security reduces security risks from malware and phishing through solutions like firewalls, intrusion prevention systems, sandboxing, and URL filtering.

Uploaded by

Jehad Mogy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views14 pages

Information and Computer Security 7

Operating system, database, and web security are important types of protection and security. [1] Operating system security ensures integrity, confidentiality and availability through techniques like regular patches, antivirus software, firewalls, and secure user accounts. [2] Database security protects the database, data, management system and applications through encryption, access controls, and firewalls. [3] Web security reduces security risks from malware and phishing through solutions like firewalls, intrusion prevention systems, sandboxing, and URL filtering.

Uploaded by

Jehad Mogy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Principle of Information and

Computer Security
Lecture 7

1
Protection and security require that computer recourses such as CPU,
software, memory etc. are protected. This extends to the operating
system as well as the data in the system.

Some of this Protection and security schemas are Operating System


security, Database security and Web security.

2
Operating System Security
• OS security is the process of ensuring OS integrity, confidentiality and
availability.
• It refers to specific steps and measures used to protect OS from
threats, malware and remote hacker intrusions.
• OS security encompasses all different techniques, which safeguard any
computer assets capable of being stolen, edited or deleted if OS
security is compromised.
• Note: An asset is any data, device or other component of an organization's
systems that is valuable – often because it contains sensitive data or can be used to
access such information. For example, an employee's desktop computer, laptop or
company phone would be considered an asset, as would applications on those
devices.
3
OS security may be done in many way such as:

1. Performing regular OS patch updates.

Note: Patches are software and operating system (OS) updates that address
security vulnerabilities within a program or product.

2. Installing updated antivirus engines and software.

3. Monitor all incoming and outgoing network traffic through a firewall.

4. Creating secure accounts with required privileges only ( i.e., user


management)

4
5. Authentication

6. One Time Password:


➢ It can be generated for login every time a user wants to enter the system.
➢ It is a password that cannot be used more than once.
➢ It can be implemented by: Random Numbers or Secret Key.

5
Database Security
• It refers to the various measures organizations take to ensure their
databases are protected from internal and external threats.
• Database security includes protecting:
➢ The database itself
➢ The data it contains
➢ Its database management system.
➢ The various applications that access it.
Note: Database Management Systems (DBMS) are software systems used to store,
retrieve, and run queries on data. A DBMS serves as an interface between an
end-user and a database, allowing users to create, read, update, and delete data
in the database.
6
• Organizations must protect their database from deliberate attacks such
as cyber security threats, as well as the misuse of data and database
from those can access them.

• The challenges of database security is represented in:

➢Internet-base attacks especially those that are difficult to detect


such as phishing scams in which the user credentials are
compromised and used without permission.
➢The employees, partners, and contractors who abuse their
credentials to database access (ex: take data from the database to
own purposes).

7
Deploying Database Security
There are three layers of database security:

1. Database Level --- occurs within the database itself where the data
live.
2. Access Level --- focuses on controlling who is allowed to access
certain data or system containing them.
3. Perimeter Level --- determines who can and cannot get into
database.

8
Each level requires unique security solutions such as:

Database Level:: Encryption

Access Level :: ACL / Permission

Perimeter :: Firewalls

9
Web Security
• It a security solutions that protect users, devices and wider network
against internet-based cyberattacks (malware, phishing, and more) that
can lead to breaches and data lose.

• These security solutions reduce the security risks when users


accidentally access malicious files and websites.

10
Some Traditional Web Security Models:
1. Firewall
2. Intrusion Prevention System (IPS):
• It is a network security tool (which can be a hardware device or software)
that continuously monitors a network for malicious activity and takes action
to prevent it, including reporting, blocking, or dropping it, when it does
occur.

• It is a network security technology that examines network traffic flows to


detect and prevent malicious threats.
• The major distinction is that a firewall blocks and filters network traffic, but
an IPS detects and alerts an administrator or prevents the attack, depending
on the setup. A firewall permits traffic depending on a set of rules that have
been set up. It is based on the source, destination, and port addresses.
11
3. Sandboxing:

• It is a cybersecurity practice where you run code and then observe and
analyze its behavior in a safe, isolated environment on a network that
mimics end-user operating environments.

• Sandboxing is designed to prevent threats from getting on the network and


is frequently used to inspect untested or untrusted code.

• Some specific examples of using a sandbox to isolate code execution


include: Web browsers. A trusted web browser can be run inside a sandbox.
Then if a website exploits a vulnerability in that web browser, the damage is
limited to the sandbox and minimized.

12
4. URL Filtering

• It is a type of technology that helps businesses control their users' and


guests' ability to access certain content on the web.

• It works by comparing all web traffic against URL filters, which are
typically contained in a database of sites that users are permitted to access
or denied from accessing

13
The Benefits of Web Security for a Modern Enterprise

1. Protect the business: by preventing loss of sensitive data


2. Protect customers and employees: by securing their private
information
3. Avoid costly service information: by preventing infection and their
consequences
4. Offer better user experience: by helping the user stay safe and
productive

14

You might also like