SlideShare una empresa de Scribd logo
1 de 21
Computer Security Management
(ISYS20261)
Lecture 2 –Threats and Vulnerabilities




 Module Leader: Dr Xiaoqi Ma
 School of Science and Technology
Last week …

• Computer security - protection of information related assets:
  – Data
  – Hardware
  – Software
  – People
  – Intangible assets

• Information security requirements:
  – Confidentiality
  – Integrity
  – Availability




Computer Security Management
Page 2
Remember definitions?

• Harm
  – Something happens to an asset that we do not want to happen

• Threat
  – Possible source of harm

• Attack
  – Threatening event (instance of a threat)

• Attacker
  – Someone or something that mounts a threat

• Vulnerability
  – Weakness in the system (asset) that makes an attack more likely to successes

• Risk
  – Possibility that a threat will affect the business or organisation

Computer Security Management
Page 3
Security risks and management




                                                            Risk Analysis
                     Asset      Vulnerability      Threat




                                                                            Risk Management
                                   Risk



                               Security Measures




Computer Security Management
Page 4
Today ...

… we will discuss:


• Harm and threats
• Vulnerabilities
• Methods of defence




Computer Security Management
Page 5
Harm and threats

• Six basic types of harm:
  – Modification
  – Destruction
  – Disclosure
  – Interception
  – Interruption
  – Fabrication

• A threat is a possible source of harm
• Example: a virus formats the hard disk of a computer
• Threats exploit vulnerabilities of systems




Computer Security Management
Page 6
Modification

• Data held in a computer system is accessed in an unauthorised
  manner and is changed without permission
• Somebody changes either values in a database or alters routines in
  a computer programme to perform additional computations
• Modification can also occur when data is changed during
  transmission
• Modification of data can also be caused by changing the hardware of
  an information system




Computer Security Management
Page 7
Destruction

• Occurs when hardware, software, or data is destroyed because of
  malicious intent
• Can not only happen to stored data, but also to data at the input
  stage (before processing)




Computer Security Management
Page 8
Disclosure

• Takes place when data is made available or access to software is
  made available without consent of the individual responsible for the
  data or software
• Serious impact on security and privacy
• Responsibility for data and/or software is usually linked to a position
  within an organisation
• Although disclosure of data can occur because of malicious intent, it
  also happens many times because of lack of proper procedure within
  an organisation




Computer Security Management
Page 9
Interception

• Occurs when an unauthorised person or software gains access to
  data or computer resources
• May result in copying of programs or data
• An interceptor may use computing resources at one location to
  access assets elsewhere




Computer Security Management
Page 10
Interruption

• Occurs when a computer resource becomes unavailable for use
• Might be a consequence of malicious damage of computing
  hardware, erasure of software, or malfunctioning of an operating
  system
• Example: Denial of Service (DoS) attacks




Computer Security Management
Page 11
Fabrication

• Occurs when spurious transactions are inserted into a network or
  records are added to an existing database




Computer Security Management
Page 12
Information security requirements

• Confidentiality
  – Protecting sensitive information from unauthorised disclosure or intelligible
    interception

• Integrity
  – Safeguarding the accuracy and completeness of information (and software)

• Availability
  – Ensuring that information (and vital services) are available to users when
    required

• Authentication
  – Ensuring that information is from the source it claims to be from

• Non repudiation
  – Prevents an entity from denying having performed a particular action related to
    data

Computer Security Management
Page 13
Vulnerabilities

• Weaknesses in a system
• Might arise from:
  – Poor design
  – Poor implementation
  – technological advances

• Examples:
  – Password management flaws
  – Fundamental operating system design flaws
  – Software bugs
  – Unchecked user input
  – Social engineering
  – Etc.



Computer Security Management
Page 14
Password management flaws

• Using of weak passwords that could be discovered by brute force
• Passwords are stored on the computer where a program can access
  it
• Users re-use passwords between many programs and websites
• System administrator uses factory-set default passwords
• Etc.




Computer Security Management
Page 15
Fundamental operating system design flaws

• Operating system designer implements unsuitable policies on user
  and/or program management
• Example: operating system grants every program and every user
  full access to the entire computer
• Such an operating system flaw allows viruses and malware to
  execute commands on behalf of the administrator




Computer Security Management
Page 16
Software bugs

• The programmer leaves an exploitable bug in a software program
• The software bug may allow an attacker to misuse an application
  through (for example) bypassing access control checks or executing
  commands on the system hosting the application
• Examples:
  – Buffer overflows
  – Dangling pointers




Computer Security Management
Page 17
Unchecked user input

• A program assumes that all user input is safe
• Consequence: the programs does not check validity user input
• Can allow unintended direct execution of commands or SQL
  statements
• Examples
  – Buffer overflows
  – SQL injection




Computer Security Management
Page 18
Social engineering

• Based on specific attributes of human decision-making known as
  cognitive biases
• These biases, sometimes called "bugs in the human hardware," are
  exploited in various combinations to create criminal attack
  techniques
• Examples:
  – Pretexting
  – Phishing
  – Baiting
  – Etc.

• “ … I could often get passwords and other pieces of sensitive
  information by pretending to be someone else and just asking for
  it.” (Kevin Mitnick, The Art of Deception, 2002)

Computer Security Management
Page 19
Methods of defence

• Protecting a technical system: establish controls that satisfy our
  information security requirements
• Dhillon lists three main methods of defence:
  – Encryption
  – Software controls
  – Physical and hardware controls

• More on these methods in the coming lectures …




Computer Security Management
Page 20
Summary

Today we learned:
• Six basic types of harm
• A threat is a possible source of harm
• A threat exploits vulnerabilities in a system
• We need to satisfy our information security requirements
• Need to put controls in place to defend ourselves




Computer Security Management
Page 21

Más contenido relacionado

La actualidad más candente

Application of security computer
Application of security computerApplication of security computer
Application of security computeribrahimzubairu2003
 
The Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and OperationThe Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and OperationHafiza Abas
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11mrmwood
 
Protection and security
Protection and securityProtection and security
Protection and securitymbadhi
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environmentEvan Francen
 
security and ethical challenges in information systems
security and ethical challenges in information systemssecurity and ethical challenges in information systems
security and ethical challenges in information systemshilal12
 
Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2MLG College of Learning, Inc
 
Data Security
Data SecurityData Security
Data SecurityAkNirojan
 
Lecture 2 using an operating system
Lecture 2   using an operating systemLecture 2   using an operating system
Lecture 2 using an operating systemMaxwell Musonda
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professionalciso_insights
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and MoreCommunity IT Innovators
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet SecurityAna Meskovska
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPace IT at Edmonds Community College
 

La actualidad más candente (20)

System security
System securitySystem security
System security
 
Application of security computer
Application of security computerApplication of security computer
Application of security computer
 
Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3
 
The Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and OperationThe Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and Operation
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
 
Protection and security
Protection and securityProtection and security
Protection and security
 
Chap11
Chap11Chap11
Chap11
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environment
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
Chap11
Chap11Chap11
Chap11
 
Data security
Data securityData security
Data security
 
security and ethical challenges in information systems
security and ethical challenges in information systemssecurity and ethical challenges in information systems
security and ethical challenges in information systems
 
Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2
 
Data Security
Data SecurityData Security
Data Security
 
Lecture 2 using an operating system
Lecture 2   using an operating systemLecture 2   using an operating system
Lecture 2 using an operating system
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
 
Week 12
Week 12Week 12
Week 12
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 

Destacado

MediaMosa and webservices
MediaMosa and webservicesMediaMosa and webservices
MediaMosa and webservicesMediaMosa
 
Viruses and internet security
Viruses and internet securityViruses and internet security
Viruses and internet securityhimeag
 
Consumer electronics seminar
Consumer electronics seminarConsumer electronics seminar
Consumer electronics seminarSai Ram
 
Computer Technology
Computer TechnologyComputer Technology
Computer Technologyguest5fd01d
 
Computer viruses
Computer virusesComputer viruses
Computer virusesAnnies Minu
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014Shwana M
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virusYogesh Singh Rawat
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkVolker Hirsch
 

Destacado (12)

Computer security 101
Computer security 101Computer security 101
Computer security 101
 
MediaMosa and webservices
MediaMosa and webservicesMediaMosa and webservices
MediaMosa and webservices
 
Viruses and internet security
Viruses and internet securityViruses and internet security
Viruses and internet security
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
Consumer electronics seminar
Consumer electronics seminarConsumer electronics seminar
Consumer electronics seminar
 
Computer Technology
Computer TechnologyComputer Technology
Computer Technology
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of Work
 

Similar a Isys20261 lecture 02

chapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdfchapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdfsatonaka3
 
Data Network Security
Data Network SecurityData Network Security
Data Network SecurityAtif Rehmat
 
20210629_104540Information Security L1.pdf
20210629_104540Information Security L1.pdf20210629_104540Information Security L1.pdf
20210629_104540Information Security L1.pdfShyma Jugesh
 
MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.pptEndAlk15
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information systemOnline
 
Security and privacy
Security and privacySecurity and privacy
Security and privacyMohammed Adam
 
Chapter Last.ppt
Chapter Last.pptChapter Last.ppt
Chapter Last.pptmiki304759
 
Securing information system (Management Information System)
Securing information system (Management Information System)Securing information system (Management Information System)
Securing information system (Management Information System)Masudur Rahman
 
Computer Security
Computer SecurityComputer Security
Computer SecurityAkNirojan
 
02-overview.pptx
02-overview.pptx02-overview.pptx
02-overview.pptxEmanAzam
 
Lecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.pptLecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.pptshahadd2021
 
Informations Security and It's Consequence By Sulav Acharya
Informations Security and It's Consequence By Sulav AcharyaInformations Security and It's Consequence By Sulav Acharya
Informations Security and It's Consequence By Sulav AcharyaAchSulav
 
UNit 7 Information Security By Sulav Acharya
UNit 7 Information Security By Sulav AcharyaUNit 7 Information Security By Sulav Acharya
UNit 7 Information Security By Sulav Acharyanmnqknibzxthowqwzc
 

Similar a Isys20261 lecture 02 (20)

chapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdfchapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdf
 
Ch1 cse
Ch1 cseCh1 cse
Ch1 cse
 
Security.pdf
Security.pdfSecurity.pdf
Security.pdf
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
 
Chapter-2 (1).pptx
Chapter-2 (1).pptxChapter-2 (1).pptx
Chapter-2 (1).pptx
 
Network Security Topic 1 intro
Network Security Topic 1 introNetwork Security Topic 1 intro
Network Security Topic 1 intro
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
 
20210629_104540Information Security L1.pdf
20210629_104540Information Security L1.pdf20210629_104540Information Security L1.pdf
20210629_104540Information Security L1.pdf
 
MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.ppt
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
Chapter Last.ppt
Chapter Last.pptChapter Last.ppt
Chapter Last.ppt
 
Securing information system (Management Information System)
Securing information system (Management Information System)Securing information system (Management Information System)
Securing information system (Management Information System)
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
02-overview.pptx
02-overview.pptx02-overview.pptx
02-overview.pptx
 
Lecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.pptLecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.ppt
 
Isys20261 lecture 01
Isys20261 lecture 01Isys20261 lecture 01
Isys20261 lecture 01
 
Informations Security and It's Consequence By Sulav Acharya
Informations Security and It's Consequence By Sulav AcharyaInformations Security and It's Consequence By Sulav Acharya
Informations Security and It's Consequence By Sulav Acharya
 
security in is.pptx
security in is.pptxsecurity in is.pptx
security in is.pptx
 
UNit 7 Information Security By Sulav Acharya
UNit 7 Information Security By Sulav AcharyaUNit 7 Information Security By Sulav Acharya
UNit 7 Information Security By Sulav Acharya
 

Más de Wiliam Ferraciolli

Lecture 12 monitoring the network
Lecture 12   monitoring the networkLecture 12   monitoring the network
Lecture 12 monitoring the networkWiliam Ferraciolli
 
Lecture 11 managing the network
Lecture 11   managing the networkLecture 11   managing the network
Lecture 11 managing the networkWiliam Ferraciolli
 
Lecture 10 the user experience
Lecture 10   the user experienceLecture 10   the user experience
Lecture 10 the user experienceWiliam Ferraciolli
 
Lecture 10 the user experience (1)
Lecture 10   the user experience (1)Lecture 10   the user experience (1)
Lecture 10 the user experience (1)Wiliam Ferraciolli
 
Lecture 7 naming and structuring objects
Lecture 7   naming and structuring objectsLecture 7   naming and structuring objects
Lecture 7 naming and structuring objectsWiliam Ferraciolli
 
Lecture 5&6 corporate architecture
Lecture 5&6   corporate architectureLecture 5&6   corporate architecture
Lecture 5&6 corporate architectureWiliam Ferraciolli
 
Lecture 3 more on servers and services
Lecture 3   more on servers and servicesLecture 3   more on servers and services
Lecture 3 more on servers and servicesWiliam Ferraciolli
 
Lecture 2 servers and services
Lecture 2   servers and servicesLecture 2   servers and services
Lecture 2 servers and servicesWiliam Ferraciolli
 
Lecture 13, 14 & 15 c# cmd let programming and scripting
Lecture 13, 14 & 15   c# cmd let programming and scriptingLecture 13, 14 & 15   c# cmd let programming and scripting
Lecture 13, 14 & 15 c# cmd let programming and scriptingWiliam Ferraciolli
 

Más de Wiliam Ferraciolli (20)

Lecture 12 monitoring the network
Lecture 12   monitoring the networkLecture 12   monitoring the network
Lecture 12 monitoring the network
 
Lecture 11 managing the network
Lecture 11   managing the networkLecture 11   managing the network
Lecture 11 managing the network
 
Lecture 10 the user experience
Lecture 10   the user experienceLecture 10   the user experience
Lecture 10 the user experience
 
Lecture 10 the user experience (1)
Lecture 10   the user experience (1)Lecture 10   the user experience (1)
Lecture 10 the user experience (1)
 
Lecture 9 further permissions
Lecture 9   further permissionsLecture 9   further permissions
Lecture 9 further permissions
 
Lecture 8 permissions
Lecture 8   permissionsLecture 8   permissions
Lecture 8 permissions
 
Lecture 7 naming and structuring objects
Lecture 7   naming and structuring objectsLecture 7   naming and structuring objects
Lecture 7 naming and structuring objects
 
Lecture 5&6 corporate architecture
Lecture 5&6   corporate architectureLecture 5&6   corporate architecture
Lecture 5&6 corporate architecture
 
Lecture 4 client workstations
Lecture 4   client workstationsLecture 4   client workstations
Lecture 4 client workstations
 
Lecture 3 more on servers and services
Lecture 3   more on servers and servicesLecture 3   more on servers and services
Lecture 3 more on servers and services
 
Lecture 2 servers and services
Lecture 2   servers and servicesLecture 2   servers and services
Lecture 2 servers and services
 
Lecture 1 introduction
Lecture 1   introductionLecture 1   introduction
Lecture 1 introduction
 
Lecture 13, 14 & 15 c# cmd let programming and scripting
Lecture 13, 14 & 15   c# cmd let programming and scriptingLecture 13, 14 & 15   c# cmd let programming and scripting
Lecture 13, 14 & 15 c# cmd let programming and scripting
 
Isys20261 lecture 14
Isys20261 lecture 14Isys20261 lecture 14
Isys20261 lecture 14
 
Isys20261 lecture 12
Isys20261 lecture 12Isys20261 lecture 12
Isys20261 lecture 12
 
Isys20261 lecture 10
Isys20261 lecture 10Isys20261 lecture 10
Isys20261 lecture 10
 
Isys20261 lecture 09
Isys20261 lecture 09Isys20261 lecture 09
Isys20261 lecture 09
 
Isys20261 lecture 08
Isys20261 lecture 08Isys20261 lecture 08
Isys20261 lecture 08
 
Isys20261 lecture 07
Isys20261 lecture 07Isys20261 lecture 07
Isys20261 lecture 07
 
Isys20261 lecture 06
Isys20261 lecture 06Isys20261 lecture 06
Isys20261 lecture 06
 

Isys20261 lecture 02

  • 1. Computer Security Management (ISYS20261) Lecture 2 –Threats and Vulnerabilities Module Leader: Dr Xiaoqi Ma School of Science and Technology
  • 2. Last week … • Computer security - protection of information related assets: – Data – Hardware – Software – People – Intangible assets • Information security requirements: – Confidentiality – Integrity – Availability Computer Security Management Page 2
  • 3. Remember definitions? • Harm – Something happens to an asset that we do not want to happen • Threat – Possible source of harm • Attack – Threatening event (instance of a threat) • Attacker – Someone or something that mounts a threat • Vulnerability – Weakness in the system (asset) that makes an attack more likely to successes • Risk – Possibility that a threat will affect the business or organisation Computer Security Management Page 3
  • 4. Security risks and management Risk Analysis Asset Vulnerability Threat Risk Management Risk Security Measures Computer Security Management Page 4
  • 5. Today ... … we will discuss: • Harm and threats • Vulnerabilities • Methods of defence Computer Security Management Page 5
  • 6. Harm and threats • Six basic types of harm: – Modification – Destruction – Disclosure – Interception – Interruption – Fabrication • A threat is a possible source of harm • Example: a virus formats the hard disk of a computer • Threats exploit vulnerabilities of systems Computer Security Management Page 6
  • 7. Modification • Data held in a computer system is accessed in an unauthorised manner and is changed without permission • Somebody changes either values in a database or alters routines in a computer programme to perform additional computations • Modification can also occur when data is changed during transmission • Modification of data can also be caused by changing the hardware of an information system Computer Security Management Page 7
  • 8. Destruction • Occurs when hardware, software, or data is destroyed because of malicious intent • Can not only happen to stored data, but also to data at the input stage (before processing) Computer Security Management Page 8
  • 9. Disclosure • Takes place when data is made available or access to software is made available without consent of the individual responsible for the data or software • Serious impact on security and privacy • Responsibility for data and/or software is usually linked to a position within an organisation • Although disclosure of data can occur because of malicious intent, it also happens many times because of lack of proper procedure within an organisation Computer Security Management Page 9
  • 10. Interception • Occurs when an unauthorised person or software gains access to data or computer resources • May result in copying of programs or data • An interceptor may use computing resources at one location to access assets elsewhere Computer Security Management Page 10
  • 11. Interruption • Occurs when a computer resource becomes unavailable for use • Might be a consequence of malicious damage of computing hardware, erasure of software, or malfunctioning of an operating system • Example: Denial of Service (DoS) attacks Computer Security Management Page 11
  • 12. Fabrication • Occurs when spurious transactions are inserted into a network or records are added to an existing database Computer Security Management Page 12
  • 13. Information security requirements • Confidentiality – Protecting sensitive information from unauthorised disclosure or intelligible interception • Integrity – Safeguarding the accuracy and completeness of information (and software) • Availability – Ensuring that information (and vital services) are available to users when required • Authentication – Ensuring that information is from the source it claims to be from • Non repudiation – Prevents an entity from denying having performed a particular action related to data Computer Security Management Page 13
  • 14. Vulnerabilities • Weaknesses in a system • Might arise from: – Poor design – Poor implementation – technological advances • Examples: – Password management flaws – Fundamental operating system design flaws – Software bugs – Unchecked user input – Social engineering – Etc. Computer Security Management Page 14
  • 15. Password management flaws • Using of weak passwords that could be discovered by brute force • Passwords are stored on the computer where a program can access it • Users re-use passwords between many programs and websites • System administrator uses factory-set default passwords • Etc. Computer Security Management Page 15
  • 16. Fundamental operating system design flaws • Operating system designer implements unsuitable policies on user and/or program management • Example: operating system grants every program and every user full access to the entire computer • Such an operating system flaw allows viruses and malware to execute commands on behalf of the administrator Computer Security Management Page 16
  • 17. Software bugs • The programmer leaves an exploitable bug in a software program • The software bug may allow an attacker to misuse an application through (for example) bypassing access control checks or executing commands on the system hosting the application • Examples: – Buffer overflows – Dangling pointers Computer Security Management Page 17
  • 18. Unchecked user input • A program assumes that all user input is safe • Consequence: the programs does not check validity user input • Can allow unintended direct execution of commands or SQL statements • Examples – Buffer overflows – SQL injection Computer Security Management Page 18
  • 19. Social engineering • Based on specific attributes of human decision-making known as cognitive biases • These biases, sometimes called "bugs in the human hardware," are exploited in various combinations to create criminal attack techniques • Examples: – Pretexting – Phishing – Baiting – Etc. • “ … I could often get passwords and other pieces of sensitive information by pretending to be someone else and just asking for it.” (Kevin Mitnick, The Art of Deception, 2002) Computer Security Management Page 19
  • 20. Methods of defence • Protecting a technical system: establish controls that satisfy our information security requirements • Dhillon lists three main methods of defence: – Encryption – Software controls – Physical and hardware controls • More on these methods in the coming lectures … Computer Security Management Page 20
  • 21. Summary Today we learned: • Six basic types of harm • A threat is a possible source of harm • A threat exploits vulnerabilities in a system • We need to satisfy our information security requirements • Need to put controls in place to defend ourselves Computer Security Management Page 21