computer security

23
 Computer security Computer security is security applied to computing de- vices such as  computers  and  smartphones, as well as computer networks such as private and public networks, including the whole  Internet. The eld cov ers al l the processes and mechanisms by which digital equipment, information and services are protected from unintended or unautho rized acce ss, change or des truc tion , and is of growing importance due to the increasing reliance of comp uter systems in mostsocieties. [1] It includes physical security  to prevent theft of equipment and  information security to protect the data on that equip ment. It is some- times referred to as “cyber security” or “IT security”. Those terms generally do not refer to physical security, but a common belief among computer security experts is that a physical security breach is one of the worst kinds security breaches as it generally allows full access to both data and equipme nt. Cybersecurity  is the process of applying security mea- sures to ensure condentiality, integrity, and availability of data . Cybe rsec urit y assures prot ect ion of asse ts, whi ch includes data, desktops, servers, buildings, and most im- porta ntl y, huma ns. Th e goal of cy bers ecur ity is to prot ect data both in transit and at rest. Countermeasures can be put in place in order to ensure security of data. Some of these me as ure s incl ude , but are not limit ed to, ac cess con- trol, awareness training, audit and accounta bility, risk as- sessment, penetration testing, vulnerability management, and security assessmen t and authoriza tion. [2] 1 Vulne rab ili ti es Main article:  Vulnerability (computing) A vulnerability is a weakne ss which allows an attack er to reduce a system’s information assurance. Vulnerability is the intersection of three elements: a system susceptibility or aw, attacker acc ess to the aw, and att ack er capa bil ity to exploit the aw. To exploit a vulnerabili ty, an attack er must have at least one applicable tool or technique that can connect to a system weakness. In this frame, vulner- ability is also known as the attack surface. Vul nera bili ty mana gement is the cy cli cal prac tice of ide n- tifyi ng, classif ying, remedi ating, and mitig ating vulnera- bilities. This practice generally refers to software vulner- abilities in computing systems. A security risk may be classied as a vulnerability. The use of vulnerability with the same meaning of risk can lea d to conf usi on. The risk is tied to the poten tia l of a signicant loss. There can also be vulnerabili ties with- out risk, like when the asset has no value. A vulnerabili ty with one or more known (publicly or privately) instances of working and fully implemented attacks is classied as an exploitable vulnerability- a vulnerability for which an explo it exists. To exploi t those  vulnerabilities, perpetra- tors (individual hacker, criminal organization, or a nation state) most commonly use malware (malicious software), worms,  viruses, and targeted attacks. Dier ent sca le s ex is t to assess the ris k of an at tac k. In the United States, authorities use the Information Operations Condition  (INF OCON) syste m. This sys tem is scaled from 5 to 1 (INFOCON 5 being an harmless situation and INFOCON 1 representing the most critical threats). To understand the techniques for securing a computer sys tem, it is impo rtant to rs t unde rsta nd the vario us type s of “attacks” that can be made against it. Thes e threats  can typically be classied into one of the cate- gories in the section below. 1. 1 Back door s A backdoor in a computer system, a  cryptosystem or an algorithm, is a method of bypassing normal authentica- tion, securing remote access to a computer, obtaining ac- cess to plaintext, and so on, while attempting to remain undetec ted. A special form of asymmetric encryption at- tacks, known as kleptographic attack, resists to be useful to the reverse engineer even after it is detected and ana- lyzed. The backdoor may take the form of an installed program (e.g., Bac k Orice), or could be a modi c ation to an exist- ing pro gra m or har dw are de vice. A specic f orm of bac k- door is a  rootkit, which replaces system binaries and/or hooks into the function calls of an operating system to hide the presence of other programs, users, services and open ports. It may also fake information about disk and memory usage. 1.2 Deni al-of -serv ic e atta ck Main article :  Denial-of-service attack Unlike other exploits, denial of service attacks are not used to gain unauthorized access or control of a system. They are instead designed to render it unusable. Attack- 1

Upload: jyoti-bhamar

Post on 07-Oct-2015

17 views

Category:

Documents


1 download

DESCRIPTION

Computer security for computer science engineering

TRANSCRIPT

  • 5/19/2018 | 502: Bad gateway

    1/1

    Error 502 Ray ID: 41d1f3e373640ed9 2018-05-18 23:02:40

    UTC

    Bad gateway

    You

    Browser

    Working

    Newark

    Cloudflare

    Working

    Host

    Error

    What happened?

    The web server reported a bad gateway error.

    What can I do?

    Please try again in a few minutes.

    Cloudflare Ray ID: 41d1f3e373640ed9 Your IP: 54.39.18.118 Performance & security by Cloudflare

    https://www.cloudflare.com/5xx-error-landing?utm_source=error_footer