Academia.eduAcademia.edu

Yassin

With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution. With the development of computer and communication technologies have developed numerous tools to protect files and other information. A set of tools, procedures, policies and solutions to defend against attacks are collectively referred to as computer network security. It is necessary above all to define and learn about the concepts of attack, risk, threat, vulnerability and asset value. During the design and implementation of information systems should primarily take into account a set of measures to increase security and maintenance at an acceptable level of risk. In any case, there is a need to know the risks in the information system. Sources of potential security problems are challenges and attacks, while the risk relates to the probable outcome and its associated costs due to occurrence of certain events.

ASSOSA UNIVERSTIY COLLEGE OF COMPUTING AND INFORMATICS DEPARTMENT OF COMPUTER SCIENCE COURSE TITTLE: COMPUTER SECURITY Prepared by: Yassin Mohammed Id No.RU/2184/09 Submitted To: Instractor Azeze K. Submission Date 13/04/2013 E.C Assosa, Ethiopia COMPUTER SECURITY Abstract With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution. With the development of computer and communication technologies have developed numerous tools to protect files and other information. A set of tools, procedures, policies and solutions to defend against attacks are collectively referred to as computer network security. It is necessary above all to define and learn about the concepts of attack, risk, threat, vulnerability and asset value. During the design and implementation of information systems should primarily take into account a set of measures to increase security and maintenance at an acceptable level of risk. In any case, there is a need to know the risks in the information system. Sources of potential security problems are challenges and attacks, while the risk relates to the probable outcome and its associated costs due to occurrence of certain events. There are numerous techniques help protect your computer: cryptography, authentication, checked the software, licenses and certificates, valid authorization... This paper explains some of the procedures and potential threats to break into the network and computers as well as potential programs that are used. Guidance and explanation of these programs is not to cause a break-in at someone else's computer, but to highlight the vulnerability of the computer's capabilities. I SECURITY One of the accepted definitions of security is that security is the maintenance of the level of acceptable risk. The risk is the result of accumulation of threats and weaknesses of the consequences. Since it is a process means that it must be planned and systematically monitor the system status and possible threats that can come from outside. We cannot say with certainty that a system is fully protected. There is no absolute security. Everything is relative. When the protection system is necessary to accept some level of risk and the possibility that a certain loss i.e. reasonable level of risk. Since security is a process it cannot pay for the purchase of a product. Each process is in a dynamic state, so the safety can be implemented using several different products and services, procedures and rules. However, the very products and services, procedures and rules are not sufficient in themselves. Need a proper and timely training of authorized persons in charge of the protection system. All that investment in staff training, procurement of goods and services, procedures and rules are far more profitable than paying damages. On the possibility of losing important data to say nothing. Must find a balance between investments in safety and immediate effects in order to reduce risk. Security is based on four basic steps as follows: Evaluation (assess the possible risks and predictions for their removal),  protection (prevent potential attacks in order to reduce the possibility of compromising the system),  discovery (the process of identifying the attack) and  Answer (a recovery with the possibility of further work or restoration of the system itself). Three basic principles of information security make up the trinity of ''great'':  Confidentiality - an attempt to prevent the intentional, unauthorized disclosure,  Integrity - data is a system and as such must remain and must not be changed,  Availability - only certain staff can access the data. Possible attacks and threats Since we defined that the security process, the protection system can select various security products, policies, procedures and practices. When we speak of the protection system must be protected from attacks that threaten the information systems. To protect against possible attacks have the ability to predict and know the attacks and the types of attacks. If you understand the types of attacks and ways in which they come, we can 1 COMPUTER SECURITY more easily monitor and control the risk of data loss. Ensuring safety should and must become the responsibility of each system administrator. Should always pay attention and ask: ''What is the probability that someone will break into a wired or wireless network, the company where you work and listen to network traffic? If this happens the measures taken? ''If you do not take certain steps there is a likelihood that an attack occurs or wired wireless network. When trying to improve security of information systems are mostly used six Categories of security measures including: general security policies and procedures, software, virus protection, digital signatures, encryption, firewalls and proxy servers.[5] Security breaches and attacks on information systems most often arise from the following sources: employees of firms, hackers, terrorists, and computer viruses. The most common steps in the attack are as follows:  Testing and Assessment,  Exploitation and penetration,  Increased privileges,  Maintenance of access,  Refusal of services. During the attack may lead to different consequences and the most common are: the destruction of resources, theft of resources, theft of services, refusal of service, corruption of data and applications. During normal flow of information data is moving from one place to another there are several types of attacks but, all attacks can be classified into four categories: 1. Cutting or breaking This kind of attack interrupts the flow of information in the system. This is a direct or active attack 2. Interception 2 COMPUTER SECURITY This kind of attack is difficult to see, and unlike the previous, active attacks, is a passive attack. This kind of attack the person trying to collect information or to perform monitoring of current performance. After gathering sufficient data can be exported active attack or some other kind of attack. 3. Changed This kind of attack falls into the category of active attacks, because the attack on the integrity. There may be a changing of the data or the whole system. 4. Fabrication This kind of attack is also an active attack and an attack on authenticity. This kind of attack is faking data, traffic etc. Attackers could use the software vulnerabilities in operating systems that allow remote programs and entities to be entered into the computer the victim and take control over it. As such, the computer becomes a kind of' ''zombie'' PCs that can continue to attack other computers, to burden the network and the like. No less dangerous or worms that can do damage, duplicated and converted into Zombie computers. Security of wireless networks Today, PC cards is most frequently used in home and business networks. All computers have a security protocol called Wired Equivalent Privacy (WEP). A device Using an 802.11 card is configured with a key, that in practice usually consists of a password or a key derived from a password. Wired Equivalent Privacy (WEP) is a protocol for encrypting wirelessly transmitted packets on IEEE 802.11 networks. In a WEP protected network, all packets are encrypted using the stream cipher RC4 under a common key, the root key1 Rk. Rk is the WEP or root key and IV is the initialization vector for a packet. K = Rk║IV is the session or per packet key. X is a key stream generated using K. The WEP protocol is designed to provide privacy to packet based wireless networks based on the 802.11b standard. The WEP encrypts by taking a secret key and a per-packet 3 byte IV, and using the IV followed by the secret key as the RC4 key. The attacker is able to retrieve the first byte of the RC4 output from each packet. The potential risks with the advent of wireless networks with manifold increase. Wireless is greatly vulnerable for the simple reason - incompetence that‟s been properly adjusted. We said that there is no absolute security. The same is true of networks. By placing an increasing number 3 COMPUTER SECURITY of ''hot spots'' (the location where the greatest number of people - cafes, parks for the rest ...) opens up the possibility that data theft and intrusion in the user's computer. Wireless networks are defined in IEEE 802.11, which brought the IEEE (Institute of Electrical and Electronics Engineers). Initial version of the IEEE 802.11 standard with the 2.4 GHz frequency and two data rates (from 1 and 2 Mb/s), which was formed in mid-1997 Year. Formed by standard formed working groups - group A, B, D, E, F and G. On the IEEE 802.11 specification is based and WiFi networks. In the beginning it was designed for mobile computing devices (laptop computers, Internet access, VoIP, games ...). Looking at an organization as a system, we can say that the wireless network vulnerable part of the system. Standards often fail to meet the three basic security requirements: reliable user authentication, authorization and user privacy. The first security mechanism (WEP-Wired Equivalent Privacy) has shown that it has significant security vulnerabilities. Relying on this mechanism without taking additional measures did not show good results. He later followed WEP2, EAP; WPA ... Individual explanation of these mechanisms would take away too much time and space so we can keep things in general. The attacker broke into someone‟s system, the wireless network; he must first catch a signal that now is not so difficult. By capturing the signal can be performed on active or passive attacks. In the beginning, are generally conducted passive attacks, i.e. listening for a signal and traffic between? Access points and users. The attached is clear that the attacker must know the physical layer is defined in the 802.11 standard. For an active attack, the attacker must have the proper equipment that can send data to the network. If the attacker does not have the service set identifier SSID - Service Set Identifier, the access point rejects the connection. However, since all control frames are not sent in encrypted form, an attacker can capture the control frames sent by the access point to communicate with other network users, find out the SSID and join the network. Preventing and limiting public access computer network The public computer network in Terms of criminal law is considered a set of interconnected computers that communicate by exchanging data. A public computer network is the computer network that it is subject to certain conditions, available to everyone and it can be global in character as the internet, regional or local character. Preventing and limiting public access computer network protecting the rights of citizens, that is, communication and 4 COMPUTER SECURITY information through computers, and access to a public computer network sanctioned by criminal legislation. By preventing access to the public computer network involves completely disabling the second to use the computer network. By restricting access to public computer network involves the creation of access difficulties and efforts to prevent it. Prevention or obstruction should be performed without authorization, otherwise there is crime prevention and restriction of public access computer network if there is any legal basis to prevent someone access to a public computer network. Criminal offenses against computer data is often called cyber-crime. The term "cyber" is often used to describe new concepts in computer technology and terms associated with the Internet. Cyber-crime would identify all criminal activities committed using computers. The Convention on Cyber-crime of the Council of Europe, the terms "computer" and “cyber" crime is used as synonyms. The term “computer” and “cyber" Crime can involve all forms of computer use in crime. Often this form of high-tech crime, rather than the word “cyber” uses the term "cyberspace." The prefix “cyber” is a word that comes from the ancient Greek word derived from “cyber", hence the name of scientific disciplines, "Cybernetics". With cybercrime, we can distinguish two types of crimes that can be done by Computer. In one group, the new criminal offenses like the spread of computer viruses, destruction of files or software etc., or crimes where the computer is a means of attack and Care for the facility required separate legislation. In the second group are the classic Crimes such as fraud, child pornography, gambling, copyright infringement and the like, where the computer is used as a means of execution, and that caused it in a new form of cyber space. The rapid growth of computer crime has led to numerous problems, which can be classified as: • Technical problems are caused by rapid changes in technology and the inability of law enforcement to continually keep up to date, as well as technical deficiencies that make it difficult to find and prosecute perpetrators. • Legal problems are caused by the inability of the legal framework to monitor technological developments. • Operational problems are caused by lack of equipment, training and adequate organizational structure and the need to work at high speed regardless of time zone, language and cultural differences. Computer Network Information Security Policy 5 COMPUTER SECURITY Set up a firewall. Firewalls are an important means to ensure network security, network Management applications through the use of technology, packet filtering technology and agent technology, effectively control network access permissions, comprehensive data to external restrictions and discrimination .Meanwhile, the firewall can make the internal network structure Concealed, the external network to the internal network access to be limited in order to ensure the security of the internal network. In short, the firewall plays separated, analysis and its restricted role. Access control. Security policy and security model based on access control body set access permissions, such as to the identity of the user, password authentication, in order to gain the true identity of the user, to facilitate tracing network behavior . Combined with network licensing, issuing access permits the use of effective passwords and other means to prevent unauthorized users on the network information resources maliciously modified or used. Care must be taken to select a password which should enhance the security of the password strength, password and change them regularly to ensure information security. Strengthening Intrusion Detection. Network intrusion detection is a real-time network detection system can effectively compensate for the lack of firewalls and other protective means. Through real-time intrusion monitoring system to detect network security policy violations or external attacks, and calls the security warning and emergency response systems to ensure the security of network Information. Intrusion detection technology with real-time detection, early warning and response to counter other powerful features, is increasingly becoming an important means of enhancing network security. Information encrypted. Information technology is the key encryption technology to achieve information security, help strengthen security, through a particular encryption algorithm translated the important plaintext cipher text, so unauthorized users can not directly read the raw data, even if the data file is lost or stolen, as long as difficult to crack the key, so it will not lead to the leakage of confidential information, which greatly ensure information security. Close some not commonly used services and ports. From the theory in terms of computer security, computer systems were more port system is also more secure. For using the computer in the process, especially when the operating system is installed in inadvertently will not have to install some service functions and ports; it will not only occupy a certain system 6 COMPUTER SECURITY information and also reduce the security of computer systems sex. In addition. In order to understand the use of the user interface can be installed port monitoring program. It can be determined by examining those ports are not commonly used. In addition, once a virus into a computer system, the monitoring program can automatically alarm, some of the function can automatically shut down the port, effectively prevent hacker intrusion. IP addresses are correct hidden PC. IP address of the hacker and virus attacks must have a condition that is on the network and information attacks must have a real IP address to be a hacker to obtain the user's Padres mainly through the use of network technology to detect host information view, some of the traditional hackers and virus attacks, Flop overflow attacks and so must obtain address as preconditions. Therefore, the user should use a computer system when hiding your IP address, using a proxy server is the most common way to hide IP address; a hacker can only detect the proxy server IP address, but cannot get the user's real IP address You cannot find the real IP address will not be able to attack, effective maintenance of computer information and network security. Authentication technology. Authentication should include at least verification protocol and license agreement. A variety of network applications and computer systems are needed to confirm the legality through authentication, and then determine its personal data and specific permissions. For authentication system, the legitimate user's identity is easy to be someone else pretending to be its most important technical indicators. User being impersonated user may not only damage their own interests, but also may harm the interests of other users or the entire system. Therefore, authentication is the basis of authorization control. Only valid identity authentication, to ensure the effective implementation of access control, security audit, intrusion prevention and other security mechanisms. Timely installation of Vulnerability Patch. Vulnerability can be utilized during the attack weaknesses can be software, hardware, procedural shortcomings, functional design or improper configuration. University of Wisconsin Miller gives a research report on today's popular operating systems and applications, noting that the software cannot be without flaws and loopholes. Nowadays more and more viruses and hackers exploit software vulnerabilities to attack Internet users, such as the famous wave of virus attacks is to use the Microsoft RPC vulnerability to spread, the Sesser virus is the use of a Windows LSASS buffer overflow 7 COMPUTER SECURITY vulnerability exists in the attack. When our system there is loopholes in the program, it will cause great security risk. To correct these vulnerabilities, software vendors release patches. We should be installed vulnerability patch, effective solution to the security problems posed by vulnerable program. Vulnerability scanning can use specialized vulnerability scanners, such as COPS, tripwire, tiger and other software. File encryption and digital signature technology. File encryption and digital signature technology is to improve the security and confidentiality of information systems and data, one of the secrets to prevent external data theft, interception or destruction primary technologies Depending on the role, file encryption and digital signature technology is mainly divided into data transmission, data storage, data integrity of the three kinds of discrimination. MD means Encryption key Data integrity identification technology is mainly involved in the transmission of information, Access, processing of data related to the identity and to verify the contents, to confidentiality Requirements‟, including general identification passwords, keys, identity, data items of the system by Comparative validation object input feature value meets the preset parameters, to achieve data security. Send message of information Hash function The sender private key encryption Internet Abstract formed expressly MD Comparison. A digital signature is an effective method of network communications-specific safety issues, it enables the identification and validation of electronic documents, to ensure data integrity, privacy, non-repudiation has a very important role. Realization of digital signatures: 1) Usually a digital signature. A sender sends a message to give the recipient B M, the first one-way hash function is formed message digest MD, and then signed. This can confirm the source of the information and ensure the integrity of information, 2) Using asymmetric encryption algorithm and one-way hash function for digital signatures. This method uses two keys (public key and private key), respectively, the data encryption and decryption. If the public key to encrypt data, only with the corresponding private key can decrypt; if the private key used to encrypt the data, only the corresponding public key can decrypt. This approach allows anyone with the sender's public key can verify the digital signature is correct. Because the sender's private key confidentiality, so that the recipient can 8 COMPUTER SECURITY verify the results to either reject the message, but also makes it impossible to forge signatures and message packets to be modified One of the major areas of information security weakness discussed in the literature is on database vulnerabilities. Here again, the vulnerabilities are software and hardware related. The human factor has been glossed over. For instance, Shulman (2006) outlines ten vulnerabilities associated with database infrastructures but none of them talked about the activities end users do that make information systems vulnerable to attacks. In today's businesses, database technologies are needed more than before and with the increasing usage of the internet for business; threats or risks to these databases are growing. Lamar (2012) opines that database attacks are prevalent these days because of the following vulnerabilities which are summarized below: 9  Vulnerabilities in Operating Systems like Windows, UNIX and Linux and their services associated with the databases could create a loophole for illegal access which may lead to a Denial of Service (DoS) attack.  Database rootkits: A database rootkit is a program or a procedure that is hidden inside the database and that gives the administrator special privileges to be able to access data in the database. Sometimes the rootkits turn off alerts prompted by Intrusion Prevention Systems (IPS) which could be disastrous..  Weak authentication: Weak authentication models permit attackers to use tactics like social engineering and brute force to get hold of database login details of users.  Weak audit trails: A weak audit logging method in a database server is risky to an institution particularly in retail, financial, healthcare, and other businesses with strict regulatory observance. PCI, SOX, and HIPAA are rules that require extensive logging of actions and also generate events when something goes wrong. In order to resolve issues when something goes wrong, logging to critical transactions in a database must be done in an automated way. Audit trails work as the last line of database defense and can sense any violation. Audit trails can help trace back the violation to a particular period and a particular use. Majority of the known vulnerabilities are linked to an improper way of handling the inputs supplied by a user of the system, if these inputs are not properly processed before using them inside the application they can generate unforeseen behavior of the system. For instance, some identified and common vulnerabilities as described by Willy, Amel and Ana (2007) are:  Buffer overflow: this typically arises with permanent length buffers on occasions when a quantity of 9 COMPUTER SECURITY data is going to be written outside the boundaries of the existing defined capacity. The new data can corrupt the data of other buffers or processes and could create anomaly in the system. Again, the overflow of the buffer can be utilized to infuse malicious code, and then the execution sequence of the program could be changed in order to execute the malicious code and take control of the system.  XSS or cross site scripting: typically related to web applications and involves the injection of code in the pages accessed by end users. An attacker can exploit this and use it to bypass access controls, steal identity and perform phishing.  SQL injection: this is the injection of code to exploit the content of a database. It occurs when user inputs are not efficiently handled which gives the attacker access to sensitive information from the database.  Format string bugs: this typically occurs when external data is passed to an output function as an argument to format string. The printf output function in C language, for instance, creates an output based on the condition of the format string, some directives can write to memory locations, thus the printf can be exploited by an attacker to inject malicious code and alter the control flow to execute it.  Integer overflows: which are of two kinds, sign conversion bugs and arithmetic overflows. The former occurs when a signed integer is converted to an unsigned integer. 12 In the latter, the result of an arithmetic operation is an integer larger than the maximum integer and it is stored in an integer variable. Security focuses on a variety of threats and hinders them from penetrating or spreading into the network The most common threats include:  Trojan horses and spyware (spy programs)  DOS (Denial of service attacks)  Data interception and theft a. FLOODING In 1998, an American elite group, “The Digital Disturbance Theater” came up with Flood net, an application set to halt the Mexican president‟s webpage (for political reasons). Flood net is a java applet that automates the “refresh” button to click repeatedly. Sufficient users online would run the application and hence cause the site‟s server to continuously refresh until saturation and thus halt and disable the webpage. An attacker has used similar applications to take into hostage commercial websites in exchange for ransom. It is advisable for an organization to have for 10 COMPUTER SECURITY emergency, a savvy security expert (White-hat hacker); seeing that web technology is dynamic, with the ever changing trends in web scripting languages and browser configurations b. KEYLOGERS These are simple software codes that exploit what we call „hooks‟ on a computer‟s kernel. Hooks capture vital hardware traffic like Keystrokes and mouse movements. Software based Key loggers are programmed to capture any button stroke you type on the keyboard and save words as a text file. That includes all private information you type like Passwords, Google searches, Credit card number, emails, to name but a few. Regularly updating of the Antivirus is a sure way to beat this. Let it also be known that Hardware key loggers exist, masquerading as flash disks. USB password applications should deter such. c. TROJANS An experienced programmer is capable of creating a Trojan, a concealed application that runs in the background. A Trojan allows a hacker to become a ghost user on your PC/Workstation. They monitor when your computer is online to deliver captured keystroke log files to their preferred address. Hackers can always come back and upload a malicious code via the Trojan. Such a code maybe the one that kills your antivirus program after which, it takes your snap via webcam or taps into your office conversations from your laptop microphone. Trojans come tucked away neatly on pirated software and the so-called cracks we all like to use. As the adage goes, it is difficult to cheat an honest person. The converse is true for those who would escape this pitfall. Let them invest in genuine software. d. BLUETOOTH Bluetooth is emerging as a versatile networking technology connecting workstations to printers, smart phones etc. I see potential for mischief; where data could be wirelessly intercepted for malicious use. Such technology is currently non-existent, to the best of my knowledge, but nonetheless, a practical possibility. e. PHISING This is when emails appearing to come from well-known organizations pop up on your browser, sending you link and requesting for private information like credit card numbers, account passwords or congratulating you for winning. Watch out for that nice email from a website you 11 COMPUTER SECURITY do not even have an account with. Look-alike websites are also not uncommon. They will have you login and „refill‟ your personal details; after which they can make online purchases under your name or if they be diabolical enough, they will lock you out of your own account. (I lost my yahoo account that way). Numerous cyber security forums and workshops exist where one can always learn ways to have an edge over scammers and keep your business team informed f. RADIO JAMMING This can be a rare DOS (Denial of Service) technique to disrupt information flow in a wireless router network, accomplished by use of noise-generating radio devices. However, special Equipment exists, that can be used to track anonymous radio-noise sources, should interference be detected. g. WIRE SNIFFERS Attackers can always insert wire sniffing hardware at cable junctions. It should always be ensured that cable terminals and switch boards are always locked & access be granted only to authorized personnel. h. COMPROMISED SERVERS An exploited server is a server that is not entirely under your power. Someone else will have gained control of your server, using it for their own motives. Use of a Weak password is often one way a hacker will gain access to your server by guessing your password. People tend to use simple passwords to keep them memorable. Such include dates, lover/pet names, office surrounding etc. Caution must therefore be exercised by combining letters with numerals to create a simple yet strong password. i. SERVER SECURITY HOLES Server Security can be compromised via security holes in a web application like addons/plugins such as joomla / word press. It is advisable to use only secure connections whenever possible. This includes the use of SSL connections for email, and SFTP (Secure File transfer Protocol) instead of the more common but unsecure FTP protocol. j. ZERO DAY/HOUR ATTACK Take this for example. The „sticky keys‟ feature (sethc.exe) on your XP or Windows7 OS. It is a good accessibility feature that allows one to press special keys only once at a time. This 12 COMPUTER SECURITY application runs on the logon window when you press shift key five times even before you‟ve entered your password. One only needs to rename the command prompt shell (cmd.exe) to sethc.exe on a logged-in computer. By this, they will have gained full control of your laptop or workspace computer anytime later without passing through any known account. How? By simply pressing the shit key five times and voila, the command prompt! Try this for yourself (Hope they got that patched on Windows 8). Zero hour/day attacks take advantage software vulnerabilities that are yet to catch the eye of a software manufacture 13 COMPUTER SECURITY Summary Computer network security has become an important issue of network development at this stage, to ensure the network information security. We must depart from security threats through the use of advanced security technology and software technology to effectively monitor potential threats, and timely warning, response, to prevent malicious behavior. And should raise awareness of network security, improve the morality of the whole society, reduce network violations, efforts to establish a secure network environment. Vulnerability studies dwell on software or hardware aspects of the information assets ignoring the human aspect. The human factors vis-à-vis Information Technology (IT) have raised interest from the IT fraternity. Lesia and McCauleyBell (2007) concur that new solutions due to information insecurity have focused on technology alone while the human factor has been limited. 14