Title: Security
1Security
2What is computer security
- Prevention
- prevent assets from being damaged
- Detection
- allow you detect when asset has been damaged
- Reaction
- allow you recover asset
3Threats, Vulnerabilities and Attacks
- Threat
- is any incidences that have an undesirable effect
on asset - Vulnerability
- is some unfortunate characteristic that makes it
possible for a threat - Attack
- is some action involves the exploitation of
certain vulnerabilities and leads to threat
4Types of Threats
- Disclosure Threat
- the dissemination of information to an individual
for whom that information should not be seen - Integrity Threat
- any unauthorized change to information stored on
a computer system - Denial of Service Threat
- occurs when access to computer system resource is
intentionally blocked as a result of bad action
taken by another user
5Trojan Horses and Viruses
- Trojan Horse
- any program that is expected to perform some
desirable function, but it actually performs some
undesirable function - Viruses
- virus can reproduce itself and infect other
program
6Common Attack Methods
- Password Spoof program
- spoofing the use to believe that computer is
correctly and prompting that user for login and
password information - Logic Bomb
- is coded embedded in some program that is set to
explode when certain criteria are met
7Simple Attack Prevention Methods
Individual Screening Checking the background,
credentials, family and other personal
information of individual who can possible
attack Physical Controls securing the
facility and enclosure the surrounding a
computer system. Care in Operations being
careful in our own activities to avoid common
types of attack