Introduction To Computer Security TOPIC 1
Introduction To Computer Security TOPIC 1
However, information security involves more than protecting the information itself. Because this information is
stored on computer hardware, manipulated by software, and transmitted by communications, each of these areas
must also be protected. The third objective of information security is to protect the confidentiality, integrity, and
availability of information on the devices that store, manipulate, and transmit the information.
1
Challenges of securing information
2
• Attackers can detect vulnerabilities more quickly and more readily exploit these vulnerabilities—the number of
newly discovered system vulnerabilities doubles annually. This has resulted in an increasing number of zero day
attacks. While most attacks take advantage of vulnerabilities that someone has already uncovered, a zero day attack
occurs when an attacker discovers and exploits a previously unknown flaw. Providing “zero days” of warning, a
zero day attack can be especially crippling to networks and computers because the attack runs rampant while
precious time is spent trying to identify the vulnerability.
• Delays in patching hardware and software products—Software vendors are often overwhelmed with trying to keep
pace with updating their products against attacks. For example, the flood of potential malware each month has
increased to the point that the traditional signature-based defense method of detecting viruses and other malware
is increasingly seen as an insufficient defense. (A signature-based defense identifies malware on a computer by
matching it to an antivirus signature file that must be updated regularly.) One antivirus software vendor receives
over 200,000 submissions of potential malware each month. At this rate, the antivirus vendors would have to
update and distribute their signature files every 10 minutes to keep users protected.
The delay in vendors patching their own products adds to the difficulties in defending against attacks.
• Most attacks are now distributed attacks, instead of coming from only one source— Attackers can now use
thousands of computers in an attack against a single computer or network. This “many against one” approach makes
it impossible to stop an attack by identifying and blocking a single source.
• User confusion—increasingly, users are called upon to make difficult security decisions regarding their computer
systems, sometimes with little or no information to direct them. It is not uncommon for a user to be asked security
questions such as “Is it okay to open this port?”, “Is it safe to quarantine this attachment?”, or “Do you want to
permit your bank to install this add-in?” With little or no direction, users are inclined to answer “Yes” to these
questions without understanding the implications.
3
Understanding the Importance of Information Security
Information security is important to businesses and individuals. The main goals of information security are to
prevent data theft, thwart identity theft, avoid the legal consequences of not securing information, maintain
productivity, and foil cyberterrorism.
4
and take the information without drawing any attention to their actions. Spies, like hackers, possess excellent
computer skills.
Employees
one of the largest information security threats to a business actually comes from an unlikely source: its employees.
Why would employees break into their company’s computer? Sometimes an employee might want to show the
company a weakness in their security. On other occasions, disgruntled employees may be intent on retaliating
against the company. Some employees may be motivated by money. A competitor might approach an employee and
offer money in exchange for stealing information. In some instances, employees have even been blackmailed into
stealing from their employer. In addition, carelessness by employees, who have left laptop computers in airports or
who have failed to password protect sensitive data, has also resulted in information being stolen.
Cybercriminals
There is a new breed of computer attackers known as cybercriminals. Cybercriminals are a loose-knit network of
attackers, identity thieves, and financial fraudsters. These cybercriminals are described as being more highly
motivated, less risk-averse, better funded, and more tenacious than hackers. Many security experts believe that
cybercriminals belong to organized gangs of young and mostly Eastern European attackers
Cyberterrorists
many security experts fear that terrorists will turn their attacks to the network and computer infrastructure to cause
panic among citizens. Known as cyberterrorists, their motivation may be defined as ideology, or attacking for the
sake of their principles or beliefs. A report distributed by the Institute for Security Technology Studies at Dartmouth
College lists three goals of a cyberattack:
• To deface electronic information (such as Web sites) and spread misinformation and propaganda
• To deny service to legitimate computer users
• To commit unauthorized intrusions into systems and networks that result in critical infrastructure outages and
corruption of vital data
Cyberterrorists are sometimes considered the attackers that should be feared the most, for it is almost impossible to
predict when or where an attack may occur. Unlike hackers who continuously probe systems or create attacks,
cyberterrorists can be inactive for several years and then suddenly strike a network in a new way. Their targets may
include a small group of computers or networks that can affect the largest number of users, such as the computers
that control the electrical power grid of a state or region. An isolated attack could cause a power
blackout that could affect tens of millions of people.
5
4. Circulate to other systems. Once the network or system has been compromised, the attacker then uses it as a base
to attack other networks and computers. The same tools that are used to probe for information are then directed
toward other systems.
5. Paralyze networks and devices—If the attacker chooses, he or she may also work to maliciously damage the
infected computer or network. This may include deleting or modifying files, stealing valuable data, crashing the
computer, or performing denial of service attacks.
6
The Hope diamond has not always had multiple layers of security. In 1958, this priceless diamond was placed in a plain brown
paper wrapper and sent by registered first-class U.S. mail to the Smithsonian Institution! The envelope in which it was sent is on
display at the Smithsonian along with the diamond itself.
Information security must likewise be created in layers. One defense mechanism may be relatively easy for an
attacker to circumvent. Instead, a security system must have layers, making it unlikely that an attacker has the tools
and skills to break through all the layers of defenses. A layered approach can also be useful in resisting a variety of
attacks. Layered security provides the most comprehensive protection.
Limiting
Consider again protecting a precious diamond. Although a diamond may be on display for the general public to
view, permitting anyone to touch the stone increases the chances that it will be stolen. Only approved personnel
should be authorized to handle the diamond. Limiting who can access the diamond reduces the threat against it.
The same is true with information security. Limiting access to information reduces the threat against it. Only those
who must use data should have access to it. In addition, the amount of access granted to someone should be limited
to what that person needs to know. For example, access to the human resource database for an organization should
be limited to approved employees, including department managers and vice presidents. An entry-level computer
technician might back up the database every day, but he should not be able to view the data such as the salaries of
the vice presidents, because he has no job-related need to do so. What level of access should users have? The best answer
is the least amount necessary to do their jobs, and no more.
Some ways to limit access are technology-based (such as assigning file permissions so that a user can only read but
not modify a file), while others are procedural (prohibiting an employee from removing a sensitive document from
the premises). The key is that access must be restricted to the bare minimum.
Diversity.
Diversity is closely related to layering. Just as it is important to protect data with layers of security, so too must the
layers be different (diverse) so that if attackers penetrate one layer, they cannot use the same techniques to break
through all other layers. A jewel thief, for instance, might be able to foil the security camera by dressing in black
clothes but should not be able to use the same technique to trick the motion detection system.
Using diverse layers of defense means that breaching one security layer does not compromise the whole system.
Diversity may be achieved in several ways. For example, some organizations use security products provided by
different vendors. An attacker who can circumvent a Brand A device would have more difficulty trying to break
through both Brand A and Brand B devices because they are different.
Obscurity
Suppose a thief plans to steal a precious diamond during a shift change of the security guards. When the thief
observes the guards, however, she finds that the guards do not change shifts at the same time each night. On Monday
they rotate shifts at 7:15 PM, while on Tuesday they rotate at 6:50 PM, and the following Monday at 6:25 PM. The
thief cannot find out the times of these changes because they are kept secret. The thief, not knowing when a change
takes place, cannot detect a clear pattern of times. Because the shift changes are confusing and not well known, an
attack becomes more difficult. This technique is sometimes called “security by obscurity.” Obscuring what goes on
inside a system or organization and avoiding clear patterns of behavior make attacks from the outside much more
difficult.
An example of obscurity would be not revealing the type of computer, operating system, software, and network
connection a computer uses. An attacker who knows that information can more easily determine the weaknesses of
the system to attack it. However, if this information is hidden, it takes much more effort to acquire the information
and, in many instances, an attacker will then move on to another computer in which the information is
easily available. Obscuring information can be an important way to protect information.
Simplicity.
Because attacks can come from a variety of sources and in many ways, information security is by its very nature
complex. The more complex something becomes, the more difficult it is to understand. A security guard who does
not understand how motion detectors interact with infrared trip lights may not know what to do when one system
alarm shows an intruder but the other does not. In addition, complex systems allow many opportunities for
something to go wrong. In short, complex systems can be a thief’s ally.
The same is true with information security. Complex security systems can be hard to understand, troubleshoot, and
7
feel secure about. As much as possible, a secure system should be simple for those on the inside to understand and
use. Complex security schemes are often compromised to make them easier for trusted users to work with—yet this
can also make it easier for the attackers. In short, keeping a system simple from the inside but complex on the
outside can sometimes be difficult but reaps a major benefit.
Chapter Summary
■ Attacks against information security have grown exponentially in recent years, despite the fact that
billions of dollars are spent annually on security defenses. Computer systems based on Microsoft
Windows and Apple Macintosh operating systems, as well as other types of operating systems, are all
vulnerable to attacks.
■ There are several reasons why it is difficult to defend against today’s attacks. These include the speed
of the attacks, greater sophistication of attacks, increased simplicity of attack tools, faster detection of
vulnerabilities by attackers, delays in patching hardware and software products, distributed attacks
coming from multiple sources, and user confusion.
■ Information security may be defined as that which protects the integrity, confidentiality, and
availability of information on the devices that store, manipulate, and transmit the information through
products, people, and procedures. As with many advanced subjects, information security has its own set
of terminology.
■ The main goals of information security are to prevent data theft, thwart identity theft, avoid the legal
consequences of not securing information, maintain productivity, and foil cyberterrorism.
■ The types of people behind computer attacks are generally divided into several categories. The term
hacker generally refers to someone who attacks computers. Script kiddies do their work by downloading
automated hacking software (scripts) from Web sites and then using it to break into computers. A
computer spy is a person who has been hired to break into a computer and steal information. One of
the largest information security threats to a business actually comes from its employees. A new breed of
computer attackers is known as cybercriminals, who are a loose-knit network of attackers, identity
thieves, and financial fraudsters. Cyberterrorists turn their attacks to the network and computer
infrastructure to cause panic among citizens for the sake of their principles or beliefs.
■ There are a variety of types of attacks. There are five general steps that make up an attack: probe for
information, penetrate any defenses, modify security settings, circulate to other systems, and paralyze
networks and devices. Although multiple defenses may be necessary to withstand the steps of an attack,
these defenses should be based on five fundamental security principles: layering, limiting, diversity,
obscurity, and simplicity.
Key Terms
Confidentiality. Ensures that only authorized parties can view the information.
cybercrime Targeted attacks against financial networks, unauthorized access to information, and the
theft of personal information.
8
Cybercriminals. A loose-knit network of attackers, identity thieves, and financial fraudsters that are
more highly motivated, less risk-averse, better funded, and more tenacious than hackers.
Cyberterrorism. Attacks launched by cyberterrorists that could cripple a nation’s electronic and
commercial infrastructure.
Hacker (1). Anyone who illegally breaks into or attempts to break into a computer system; (2) A person
who uses advanced computer skills to attack computers but not with malicious intent.
Integrity. Ensures that the information is correct and no unauthorized person or malicious software has
altered that data.
Script kiddie. An unskilled user who downloads automated attack software to attack computers.
Spy. A person who has been hired to break into a computer and steal information.
Threat. An event or action that may defeat the security measures in place and result in a loss.
Threat agent. A person or thing that has the power to carry out a threat.
Zero day attack. An attack that occurs when an attacker discovers and exploits a previously unknown
flaw, providing “zero days” of warning.