Top Banner
1 THE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES
94

€¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

Aug 09, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

1

THE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES

Page 2: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

2

CHAPTER ONE

1.1 INTRODUCTION

Computer security is a branch of computer technology known as

information security that is applied to computers and networks. The

objective of computer security includes protection of information and

property from theft, corruption, or natural disaster, while allowing the

information and property to remain accessible and productive to its

intended users. The term computer system security means the

collective processes and mechanisms by which sensitive and valuable

information and services are protected from publication, tampering or

collapse by unauthorized activities or untrustworthy individuals and

unplanned events respectively. The strategies and methodologies of

computer security often differ from most other computer technologies

because of its somewhat elusive objective of preventing unwanted

computer instead of enabling wanted computer behavior. These are

four(4) approaches to security in computing, sometimes a combination

of approaches is valid:

Trust all the software to abide by a security policy but the

software is not trustworthy (this is computer insecurity).

Page 3: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

3

Trust all the software to abide by a security policy and the

software is validated as trustworthy (by tedious branch and path

analysis for example).

Trust no software but enforce a security policy with

mechanisms that are not trustworthy (again this is computer

insecurity).

Trust no software but enforce a security policy with trustworthy

hardware mechanism.

1.2 OBJECTIVE OF THE STUDY

The aim of this investigate work is to fetch to light underlying concept of computer security and unrestricted conviction.

The Objectives Of This Study Are:

To focus on the security of the computer components.

To analyze the various computer crimes and frauds that is

common to the computer technology.

To further expatiate about the computer hacker and crackers.

To evaluate the effect of computer security and unrestricted

trust.

1.4 SCOPE AND DATA LIMITATION

This project is limited to the determination of the Computer Security

and Unrestricted Trust. It however shows that there are certain

additions that are beyond the scope of this project. It is intended to

Page 4: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

4

give a better insight to the topic under consideration. One of the

constraints is to rely on the information supplied by computer security

and unrestricted trust, which is the focus of the studies. This is

because it may contain a lot of lapses. It is equally observed that a lot

of information considered by computer secret keys are vital and

confidential to manage computer security to be withheld. This may

affect the accuracy of result.

1.5 PROBLEM ENCOUNTERED

During the process of carrying out the project work ,the

following problems were encountered:

1. Time dynamic

2. Financial quandary

3. Insufficient resources

TIME DYNAMIC: Much time and energy were required in

carrying out the project

FINANCIAL PROBLEM: Money was also spent at cybercafé

in getting more information from the internet and also

transportation, there were inadequate information and lost of

data and information through piracy.

INADEQUATE MATERIALS: This is a great challenge to

me during the carrying out of the research work.

Page 5: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

5

1.5.1 DEFINITION OF THE FOLLOWING TERM:

1. COMPUTER

2. TECHNOLOGY

3. INTERNET

4. NETWORKING

5. SECURITY

6. DATA

7. ENCRYPTION

COMPUTER

A computer is a general purpose device which can be programmed to

carry out a finite set of arithmetic or logical operations. Since a

sequence of operations can be readily changed, the computer can solve

more than one kind of problem. The essential point of a computer is to

implement an idea, the terms of which are satisfied by Alan Turing’s

Universal Turing Machine.

TECHNOLOGY

Technology is the making, modification, usage, applied activity or

behavior, and knowledge of tools, machines, techniques, crafts,

systems, methods of organization or environmental rearrangements in

order to solve a problem, improve a preexisting solution to a problem,

achieve a goal or perform a specific function. It can also refer to the

collection of such tools, machinery, modifications, arrangements and

procedures.

Examples of Technology are:

Page 6: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

6

Astronomy, airplanes, telephones, electric lights, and motorized

vehicles are all examples of technology, which is the application of

scientific discoveries to physical use.

Computers, the internet and cellular phones are examples in the field

of electronics, which is the most widely recognized technological

field. Other examples include Microwave ovens, DVD players,

ipods, and remote controls for video and audio devices.

INTERNET

The Internet is a global system of interconnected computer networks

that use the standard Internet protocol suite (often called TCP/IP,

although not all applications use TCP) to serve billions of users

worldwide. It is a network of networks that consists of millions of

private, public, academic, business, and government networks, of local

to global scope, that are linked by a broad array of electronic, wireless

and optical networking technologies. The Internet carries an extensive

range of information resources and services, such as the inter-linked

hypertext documents of the World Wide Web (WWW) and the

infrastructure to support email. Examples of Internet are:

Email:- is an example of internet services. It is used as a medium to

transfer information and data

NETWORKING

A networking is a series of points of nodes interconnected by

communication paths. Networks can interconnect with other networks

and contain sub-networks.

Page 7: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

7

The most common topology or general configurations of networks

includes the bus, star, token ring, and mesh topologies. Networks can

also be characterized in terms of spatial distance as local area

networks (LANs), Metropolitan Area Networks (MANs), and Wide

Area Networks (WANs)..

SECURITY

Is an information technology, security is the protection of information

assets through the use of technology, processes, and training.

In the computer industry, the term security or the phrase computer

security refers to techniques for ensuring that data stored in a

computer cannot be read or compromised by any individuals without

authorization.

DATA

In computing, data is information that has been translated into a form

that is more convenient to move or process. Relative to today’s

computers and transmission media, data is information converted into

binary digital form.

In telecommunication, data sometimes means digital-encoded

information to distinguish it from analog-encoded information such as

conventional telephone voice calls. In general, “analog” or voice

transmission required a dedicated continual connection for the

duration of a related series of transmissions. Data transmission can

often be sent with intermittent connections in packets that arrive in

piecemeal fashion.

Page 8: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

8

“Generally and in science, data is a gathered body of facts”

ENCRYPTION

Is the process of transforming information (referred to as plaintext)

using an algorithm (called a cipher) to make it unreadable to anyone

except those possessing special knowledge, usually referred to as a

key.

Encryption is a way to enhance the security of a message or file by

scrambling the contents so that it can be read only by someone who

has the right encryption key to unscramble it. For example, if you

purchase something from a website, the information for the

transaction (such as your address, phone number, and credit card

number) is usually encrypted to help keep it safe. Use encryption

when you want to strong level of protection for your information.

The Two Most Common Types Of Encryption Are:

1. Software Based Encryption

2. Hardware Based Encryption

Software Based Encryption:

This type of encryption will typically consist of a standard storage

device (Hard Drive, Flash Drive, Digital Media Card, etc.) and a

software program to facilitate the encryptions. For example, the

standard DiskGO Secure drive comes with a program called

CryptArchiver. This software allows the user to create an encrypted

“Vault” on the drive, with all files stored in the Vault area to be

encrypted in either 236-bit AES or 448-bit Blowfish algorithms. The

drawback to this type is encryption is that your system hardware

Page 9: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

9

(CPU, RAM) is responsible for all the encryption tasks done during a

file transfer. This is compounded by the fact that USB itself relies on

your system hardware (CPU, RAM, and hard drive speeds) to

maintain reliable speeds. Because of this, you trade security for

performance. Data transfers made using this encryption method can

cause dramatically reduced speeds for files transfers. For example,

let’s say a flash drive can be copied to at an average minimum

of4MB/s. if you added software encryption to the mix, your transfer

speeds could drop to as low as 1MB/s for certain types of files.

Hardware Based Encryption:

The only significant difference with Hardware Based Encryption is

that all data intensive encryption tasks are done onboard the storage

device, rather than relying on system resources to do the work. With

this method of encryption, file transfer speeds will remain more stable

during the encryption process. Also, most hardware encrypted drives

are built with more robust materials and are typically highly resistant

to physical damage and are likely to be water resistant. The drawback

to this type of encryption is higher consumers. Hardware based

encryption of flash drives can sometimes be 2-3 times as expensive as

software based options.

Page 10: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

10

CHAPTER TWO

2.1 LITERATURE REVIEW

A computer is a general purpose device which can be programmed to

carry out a finite set of arithmetic or logical operations. Since a

sequence of operations can be readily changed, the computer can solve

more than one kind of problem. The essential point of a computer is to

implement an idea, the terms of which are satisfied by Alan Turing’s

Universal Turing Machine.

Conventionally, a computer consists of at least one processing element

and some form of memory. The processing element carries out

arithmetic and logic operations, and a sequencing and control unit that

can change the order of operations based on stored information.

Peripheral devices allow information to be retrieved from an external

source, and the result of operations saved.

A computer’s processing unit executes a series of instructions that

make it read, manipulate and then store date. Conditional instructions

change the sequence of instructions as a function of the current state

of the machine or its environment.

In order to interact with such a machine, programmers and engineers

developed the concept of a user interface in order to accept input from

humans and return results for human consumption.

Page 11: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

11

The first electronic digital computers were developed between 1940

and 1945 in the United Kingdom and United States. Originally, they

were the size of a large room, consuming as much power as several

hundred modern personal computers (PCs).

1. In this era mechanical analog computers were used for military

applications.

Modern computers based on integrated circuits are millions to

billions of times more capable than early machines, and occupy

a fraction of the space.

2. Simple computers are small enough to fit into mobile devices,

and mobile computers can be powered by small batteries.

Personal computers in their various forms are icons of the

Information Age and are what most people think as

“computers”. However, the embedded computers found in many

devices from Mp3 players to fighter aircraft and form toys to

industrial robots are the most numerous.

The Jacquard Loom was one of the first programmable devices.

Page 12: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

12

2.1.1 History of Computing Hardware

The first use of the word “computer” was recorded in 1613, referring

to a person who carried out calculations, or computations, and the

word continued with the same meaning until the middle of the 20 th

century. From the end of the 19th century the word began to take on its

more familiar meaning, a machine that carries out computations.

2.1.2 Limited-function early computers

The history of the modern computer begins with two separate

technologies, automated calculation and programmability, but no

single device can be identified as the earliest computer, partly because

of the inconsistent application of that term. A few devices are worth

mentioning through, like some mechanical aids to computing, which

were very successful and survived for centuries until the advent of the

electronic calculator, like the Sumerian Abacus, designed around

2500BC of which a descendant won a speed competition against a

modern desk calculating machine in Japan in 1946, the slide rules,

invented in the 1620s, which were carried on five Apollo space

missions, including to the moon and arguably the astrolabe and the

Antikythera mechanism, an ancient astronomical computer built by

the Greeks around 80BC. The Greek mathematician Hero of

Alexandria (c. 10-70 AD) built a mechanical theater which performed

a play lasting 10 minutes and was operated by a complex system of

ropes and drums that might be considered to be a means of deciding

which parts of the mechanism performed which actions and when.

This is the essence of programmability. Around the end of the 10 th

Page 13: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

13

century, the French monk Gerbert d’Aurillac brought back from

Spain the drawings of a machine invented by the moors that answered

either Yes or No to the questions it was asked. Again in the 13th

century, the monks Albertus Magnus and Roger Bacon built talking

androids without any further development (Albertus Magnus

complained that he had wasted forty years of his life when Thomas

Aquinas, terrified by the machine, destroyed it).

In 1642, the Renaissance saw the invention of the mechanical

calculator, a device that could perform all four arithmetic operations

without relying on human intelligence. The mechanical calculator was

at the root of the development of computer in two separate ways.

Initially, it was in trying to develop more powerful and more flexible

calculators that the computer was first theorized by Charles Babbage

and then developed. Secondly, development of a low cost electronic

calculator, successor to the mechanical calculator, resulted in the

development by Intel of the first commercially available

Microprocessor integrated circuit.

2.1.3 First General-Purpose Computers

In 1801, Joseph Marie Jacquard made an improvement to the

Textile Loom by introducing a series of Punched Paper Cards as a

template which allowed his loom to weave intricate patterns

automatically. The resulting Jacquard patterns automatically. The

resulting Jacquard loom was an important step in the development of

Page 14: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

14

computers because the use of punched cards to define woven patterns

can be viewed as an early, albeit limited, form of programmability.

2.1.4 The Zuse Z3 COMPUTER, 1941,

considered the world’s first working programmable, fully

automatic computing machine.

It was the fusion of automatic calculation with programmability that

produced the first recognizable computers. In 1837, Charles Babbage

was the first to conceptualize and design a fully programmable

mechanical computer, his analytical engine limited finances and

Babbage’s inability to resist tinkering eith the design meant that the

device was never completed-nevertheless his son, Henry Babbage,

completed a simplified version of the analytical engine’s computing

unit (the mill) in 1888. he gave a successful demonstration of its use in

computing tables in 1906. this machine was given to the Science

museum in South Kensington in 1910.

In the late 1880s, Herman Hollerith invented the recording of data on

a machine-readable medium. Earlier uses of machine-readable media

had been for control, not data. “After some initial trials with paper

tape, he settled on punched cards. To process these punched cards he

invented the tabulator, and the Keypunch machines. These three

inventions were the foundation of the modern information processing

of punched cards was performed for the 1890 United States Census by

Page 15: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

15

Hollerith’s company, which later became the core of IBM. By the end

of the 19th century a number of ideas and technologies, that would

later prove useful in the realization of practical computers, had begun

to appear: Boolean Algebra, the vacuum tube (Thermionic valve),

punched cards and tape, and the teleprinter.

During the first half of the 20th century, many scientific computing

needs were met be increasing sophisticated analog computers, which

used a direct mechanical or electrical model of the problem as a basis

for computation. However, these were not programmable and

generally lacked the versatility and accuracy of modern digital

computers.

Alan Turing is widely regarding as the father of modern computer

science. In 1936 Turing provided an influential formalization of the

concept of the algorithm and computation with the Turing Machine,

providing a blueprint for the electronic digital computer of his role in

the creation of the modern computer, Time magazine in naming

Turing one of the 100 most influential people of the 20th century,

states: “The fact remains that everyone who taps at a keyboard,

opening a spreadsheet or a word-processing program, is working on an

incarnation of a Turing machine.

2.1.5 The ENIAC COMPUTER

which became operational in 1946, is

considered to be the first general-purpose

electronic computer.

Page 16: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

16

2.1.6 EDSAC COMPUTER

EDSAC COMPUTER was one of the first

computers to implement the stored-program

(Von Neumann) architecture.

2.1.7 The Atanasoff-Berry Computer (ABC)

was the world’s first electronic digital computer, albert not

programmable. Atanasoff is considered to be one of the fathers of the

computer. Conceived in 1937 by Lowa State College Physics

Professor John Atanasoff, and built with the assistance of graduate

student Clifford Berry, the machine was not programmable, being

designed only to solve systems of linear equations. The computer did

employ parallel computation. A 1973 court ruling in a patent dispute

found that the patent for the 1946 ENIAC computer derived from the

Atanasoff-Berry Computer.

The first program-controlled computer was invented by Konrad Zuse,

who built the Z3, an electromechanical computing machine, in 1941.

the first programmable electronic computer was the Colossus, built in

1943 by Tommy Flowers.

George Stibitz is internationally recognized as a father of the modern

digital computer. While working at Bell Labs in November 1937,

Page 17: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

17

Stibitz invented and built a relay-based calculator he dubbed the

“Model K” (for “kitchen table”, on which he had assembled it), which

was the first to use binary circuits to perform an arithmetic operation.

Later models added greater sophistication including complex

arithmetic and programmability.

A series of steadily more powerful and flexible computing devices

was constructed in the 1930s and 1940s, gradually adding the key

features that are seen in modern computers. The use of digital

electronics (largely invented by Claude Shannon in 1937) and more

flexible programmability were vitally important steps, but defining

one point along this road as “the first digital electronic computer” is

difficult. Shannon 1940 Notable achievements include:

Konrad Zuse’s Electromechanical “Z machines”. The Z3

(1941) was the first working machine featuring binary

arithmetic, including floating point arithmetic and a measure of

programmability. In 1998 the Z3 was proved to be Turing

complete, therefore being the world’s first operational

computer.

The Non-Programmable Atanasoff-Berry computer

(commenced in 1937, completed in 1941) which used vacuum

tube based computation, binary numbers, and regenerative

capacitor memory. The use of regenerative memory allowed it

to be much more compact that its pears (being approximately

the size of a large desk or workbench), since intermediate

Page 18: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

18

results could be stored and then feed back into the same set of

computation elements.

The Secret British Colossus Computer (1943), which had

limited programmability but demonstrated that a device using

thousands of tubes, could be reasonably reliable and

electronically reprogrammable. It was used for breaking

German wartime codes.

The Harvard Mark I (1944), a large-scale electromechanical

computer with limited programmability.

The U.S. Army’s Ballistic Research Laboratory ENIAC (1946),

which used decimal arithmetic and is sometimes called the first

general purpose electronic computer (since Konrad Zuse’s Z3

of 1941 used electromagnets instead of electronics). Initially,

however, ENIAC had an inflexible architecture which

essentially required rewiring to change its programming.

2.1.8 STORED-PROGRAM ARCHITECTURE

Several developers of ENIAC, recognizing its flaws, came up with a

fare more flexible and elegant design, which came to be known as the

“stored-program architecture” or Von Neumann Architecture. This

design was first formally described by John Von Neumann in the

paper First Draft of a Report on the EDVAC, distributed in 1945. A

number of projects to develop computers based on the stored-program

architecture commence around this time, the first of which was

Page 19: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

19

completed 1948 at the University of Manchester in England, the

Manchester Small-Scale Experimental machine (SSEM or “Baby”).

The Electronic Delay Storage Automatic Calculator (EDSAC),

completed a year after the SSEM at Cambridge University, was the

first practical, non-experimental implementation of the stored-program

design and was put to use immediately for research work at the

university. Shortly thereafter, the machine original described by Von

Neumann’s paper-EDVAC-was completed but did not see full-time

use for an additional two years.

Nearly all modern computers implement some form of the stored-

program architecture, making it the single trait by which the word

“computer” is now defined. While the technologies used in computers

have change dramatically since the first electronic, general-purpose

computers of the 1940s, most still use the Von Neumann architecture.

2.1.9 Die of an Intel 80486DX2 Microprocessor

Beginning in the 1950s, Soviet scientists Sergei Sobolev and Kikolay

Brusentsove conducted research in ternary computers, device that

operated on a base three numbering system of -1,0 and 1 rather than

the conventional binary numbering system upon which most

computers are based. They designed the Setun, a functional ternary

computer, at Moscow State University. The device was put into

Page 20: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

20

limited production in the Soviet Union, but supplanted by the more

common binary architecture.

Semiconductors and Microprocessors

Computers using vacuum tubes as their electronic elements were in

use throughout the 1950s, but by the 1960s had been largely replaced

by semiconductor transistor-based machines, which were smaller,

faster, and cheaper to produce, required less power, and were more

reliable. The first transistorized computer was demonstrated at the

University of Manchester in 1953. in the 1970s, integrated circuit

technology and the subsequent creation of microprocessors, such as

the Intel 4004, further decreased size and cost and further increased

speed and reliability of computers. By the late 1970s, many products

such as Video Recorders contained dedicated computers called

microcontrollers, and they started to appear as a replacement to

mechanical controls in domestic appliances such as washing

machines. The 1980s witnessed home computers and the now

ubiquitous personal computer. With the evolution of the Internet,

personal computers are becoming as common as the television and the

telephone in the household (citation needed).

Modern smart-phones are fully programmable computers in their own

right, and as of 2009 may well be the most common form of such

computers in existence (citation needed).

2.1.10SOCIAL ENGINEERING

In the context of security, is into performing actions or divulging

confidential information. While it is similar to a confidence trick or

Page 21: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

21

simple fraud, it is typically trickery or deception for the purpose of

information gathering, fraud, or computer system access; in most

cases the attacker never comes face-to-face with the victims.

“Social engineering” as an act of psychological manipulation had

previously been associated with the social science, but its usage has

caught on among computer professionals.

2.2 TECHNIQUE OF SOCIAL SECURITY OF

ENGINEERING

All social engineering techniques are based on specific attributes of

human decision-making as cognitive biases, these biases sometimes

called “bugs in the human hardware,” are exploited in various

combinations to create attack techniques, some of which are listed and

explain here:

1. PRETEXTING also known (in the UK) as blagging,

2. DIVERSION THEFT

3. PHISHING

4. IVR OR PHONE PHISHING

5. BAITING

6. QUID PRO QUO (Quid Pro Quo Means Something For

Something)

7. TALIGATING Main Article: Piggybacking (Security)

8. COUNTER-MEASURES

9. OTHER TYPES

Page 22: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

22

2.2.1 PRETEXTING also known (in the UK) as blagging,

Pretexting is the act of creating and using an invented scenario

(the pretext) to engage a targeted victim in a manner that increases the

chance the victim will divulge information or perform actions that

would be unlikely in ordinary circumstances. An elaborate lie, it most

often involve some prior research or setup and the use of this

information for impersonation (e.g., Date of Birth, Social Security

Number, Last Bill Amount) to establish legitimacy in the mind of the

target.

This technique can be used to trick a business into disclosing

customer information as well as by private investigators to obtain

telephone records, utility records, banking records and other

information directly from company service representatives. The

information can be used to establish even greater legitimacy under

tougher questioning with a manager, e.g., to make account changes,

get specific balances, etc.

Pretexting has been an observed law enforcement technique, under

the auspices of which, a law officer may leverage the threat of an

alleged infraction to detain a suspect for questioning and conduct

close inspection of a vehicle or premises.

Pretexting can also be used to impersonate co-workers, police, bank,

tax authorities, or insurance investigators-or any other individual who

could have perceived authority or right-to-know in the mind of the

targeted victim. The pretexter must simply prepare answers to

questions that might be asked by the victim. In some cases all that is

Page 23: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

23

needed is a voice that sounds authoritative, an earnest tone, and an

ability to think on one’s feet.

2.2.2 DIVERSION THEFT

Diversion theft, also known as the “Corner Game” or “Round

the Corner Game”, Originated in the East End of London.

In summary, pastime theft in a “Con” exercised by professional

thieves, normally against a transport or courier company. The

objective is to persuade the person responsible for a legitimate

delivery that the consignment is requested elsewhere-hence, “round

the corner”.

With a load/consignment redirected, the thieves persuade the

driver to unload the consignment near to, or away from, the

consignee’s address, in the pretense that it is “going straight out” or

“urgently required somewhere else”.

The “Con” or deception has many distinct facets, which include

social engineering techniques to persuade legitimate administrative or

traffic personnel of a transport or courier company to issue

instructions to the driver to redirect the consignment or load.

Another variation of diversion theft is stationing a security van outside

a bank on Friday evening. Smartly dressed guards use the line “Night

safe’s out of order, Sir”. By this method shopkeepers etc. are gulled

Page 24: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

24

into depositing their takings into the van. They do of course obtain a

receipt but later this turn out to be worthless. A similar technique was

many years ago to steal a Steinway grand piano from a radio studio in

London. “Come to overhaul the piano, guv” was the chat line.

2.2.3 PHISHING

Phishing is a technique of fraudulently obtaining private

information. Typically, the phished send an e-mail that appears to

come from a legitimate business-a bank, or credit card company-

requesting “verification” of information and warning of some dire

consequence if it is not provided. The e-mail usually contains a link to

a fraudulent web page that seems legitimate-with company logos and

content-and has a form requesting everything from a home address to

an ATM card’s PIN.

For example, 2003 saw the proliferation of a phishing scam in which

users receive e-mails supposedly from eBay claiming that the user’s

account was about to be suspended unless a link provided was clicked

to update a credit card (information that the genuine eBay already

had). Because it is relatively simple to make a Web-site resemble a

legitimate organization’s site by mimicking the HTML code, the scam

counted on people being contacted by eBay and subsequently, were

going to eBay’s site to update their account information. By

spamming large groups of people, the “Phisher” counted on the e-mail

being ready by a percentage of people who already had listed credit

card numbers with eBay legitimately, who might respond.

Page 25: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

25

2.24 IVR OR PHONE PHISHING Main article: Vishing

This technique uses a rogue Interactive voice response (IVR)

system to recreate a legitimate-sounding copy of a bank or other

institution’ IVR system. The victim is prompted (typically via a

phishing e-mail) to call in the “bank” via (ideally toll free) number

provided in order to “verify” information. A typical system will reject

log-ins continually, ensuring the victim enters PINs or passwords

multiple time, often disclosing several distinct passwords. More

advanced systems transfer passwords. More advanced systems transfer

the victim to the attacker posing as a customer service agent for

further questioning.

One could even record the typical commands (“Press one to change

your password, press two to speak to customer service”…) and play

back the direction manually in real time, giving the appearance of

being an IVR without the expense.

Phone phishing is also called vishing.

2.25 BAITING

Baiting is like the real-world ‘Trojan Horse’ that uses physical media

and relies on the curiosity or greed of the victim.

In this attack, the attacker leaves a malware infected floppy disk, CD

ROM, or USB flash drive in a location sure to be found (bathroom,

Page 26: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

26

elevator, sidewark, parking lot), gives it a legitimate looking and

curiosity-piquing label, and simply waits for the victim to use the

device.

For example, an attacker might create a disk featuring a corporate

logo, readily available from the target’s web site, and write “Execute

Salary Summary Q2 2012” on the front. The attacker would then leave

the disk on the floor of an elevator or somewhere in the lobby of the

targeted company. An unknowing employee might find it and

subsequently insert the disk into a computer to satisfy their curiosity,

or a good Samaritan might find it and turn it in to the company.

In either case as a consequence of merely inserting the disk into a

computer to see the contents, the user would unknowingly install

malware on it, likely giving an attacker unfettered access to the

victim’s PC and perhaps, the targeted company’s internal computer

network.

Unless computer controls block the infection, PCs set to “auto-run”

inserted media may be compromised as soon as a rogue disk in

inserted.

More attractive than memory, hostile devices can also be used. For

instance, a “lucky winner” is sent a free digital audio player that

actually compromises any computer it is plugged to. Technology

security company HBGray has sold such devices to the US

government.

Page 27: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

27

2.26 QUID PRO QUO (Quid Pro Quo Means Something For

Something)

An attacker calls random numbers at a company claiming to be

calling back from technical support. Eventually they will hit

someone with a legitimate problem, grateful that someone is

calling back to help them. The attacker will “help: solve the

problem and in the process have the user type commands that

give the attacker access or launch malware.

In a 2003 information security survey, 90% of office workers

gave researches what they claimed was their password in

answer to a survey question in exchange for a cheap pen.

Similar surveys in later years obtained similar results using

chocolates and other cheap lures, although they made no

attempt to validate the passwords.

2.2.7 TALIGATING Main Article: Piggybacking (Security)

An attacker, seeking entry to a restricted area where access is by

unattended, electronic access control, e.g. by RFID card, simply walks

in behind a person who has legitimate access. Following common

courtesy, the legitimated person will usually hold the door open for

the attacker. The legitimate person may fail to ask for identification

for any several reasons, or may accept an assertion that the attacker

has forgotten or lost the appropriate identity token. The attacker many

also fake the action of presenting an identity token.

Page 28: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

28

2.2.8 OTHER TYPES

Common confidence tricksters or fraudsters also could be considered

“social engineers” in the wider sense, in that they deliberately deceive

and manipulate people, exploiting human weaknesses to obtain

personal benefit. They may, for example, use social engineering

techniques as part of an IT fraud.

A very recent type of social engineering techniques include spoofing

or cracking IDs of people having popular e-mail IDs such as Yahoo!,

Gmail, Hotmail, etc. Among the many motivations for deception are:

Phishing credit-card account numbers and their passwords.

Cracking private e-mails and chat histories, and manipulating

them by using common editing techniques before using them to

extort money and creating distrust among individuals.

Cracking websites of companies or organizations and

destroying their reputation.

Computer virus hoaxes.

2.2.9 COUNTER-MEASURES

Organizations must, on an employee/personnel level, establish

frameworks of trust. (i.e. When/Where/Why/How should

sensitive information be handled?)

Page 29: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

29

Organizations must identify which information is sensitive and

question its integrity in all forms (i.e., Social Engineering,

Building Security, Computer Security, etc.)

Organizations must establish security protocols for the people

who handle sensitive information. (i.e., Paper-Trails for

information disclosure and/or forensic crumbs).

Employees must be trained in security protocols relevant to

their position. (e.g., employees must identify people who steer

towards sensitive information.) (Also: in situations such as

taligaing, if a person’s identity cannot be verified, then

employees must be trained to politely refuse.)

An Organization’s framework must be tested periodically, and

these tests must be unannounced.

Insert a critical eye into any of the above steps: there is no

perfect solution for information integrity.

Dumpster Security by using a waste management service that

has dumpsters with locks on them, with keys to them limited

only to the waste management company and the cleaning staff.

Also making sure the dumpster is located in a place where it is

not out of view, and trying to access it will carry a risk to being

seen or caught or behind a locked gate or fence where the

person trespass before they can attempt to access the dumpster.

Page 30: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

30

CHAPTER THREE

3.1 EFFECT OF COMPUTER SECURITY ON UNRESTRICTED TRUST

Social trust is necessary to the full enjoyment of the benefits of

computers. Security influences that are trust.

Many failures are public; they diminish trust globally, not just

locally. My security is related to your security; if your system falls to

hackers, it may give them a path to me and resources to be used

against me. The damage that is done to necessary public trust and

confidence by the publicity of our failures may be out of all proportion

to the direct damage that either of us suffers.

The security measures that are indicated to preserved public

trust my exceed those that are indicated by your use or mine. The

security achieved as a result of each of us making our own local

decisions based upon our own local situation may not be sufficient to

preserve public trust and confidence. If we are to enjoy the potential

benefits of this new technology, then we must ensure that its use is

sufficiently orderly and well-behaved to sustain that trust.

That we do trust computers is obvious. Some minimum level of

trust has been necessary to their acceptance and use. If you cannot

Page 31: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

31

trust what the computer tells you, at least most of the time, then it has

no value. Some of that trust is possibly misplaced; it presumes a level

of perfection that is difficult to achieve and maintain in complex

systems.

That there is a fundamental undercurrent of mistrust is equally

obvious. The RISKS forum, moderated by Peter Neumann, gives loud

and, often, eloquent testimony to this mistrust.

Much of both the trust and mistrust of computers is independent

of their security. However, trust is influenced by security. Security

contributes to the necessary trust; but its absence and its failures lead

to the mistrust. This computer security, whether we like it or not, is a

social issue. It is global, not local. It is bigger than our systems. It is

related to those fundamental human values of cooperation and

collaboration.

3.2 THE COST OF SECURITY ON THE COMPUTER AND THE UNRESTRICTED TRUST.

Page 32: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

32

We write, speak, and behave as though security were free, as

though it were an independent property that could be achieved without

diminishing any other desiderata. We speak as though its absence or

inadequacy were always a mistake; we want to know who is to blame

on the security of computer.

In the sense that good security is good design, this is true.

However, in another sense security is usually achieved at the expense

of some other desirable property of the system of the system. I learned

this that the user and designer is to see that the security of the system

are well guarantee and the cost of the design must be bore on the

designer for the flexibility of a system to all users and still say that it is

controlled or secure. Designers, implementors, and managers are

confronted with hard choice. Their decisions will never be risk free

and they will never please everyone without taking the control of the

security into an account.

3.3 SECURITY OF COMPUTER ON THE POPULATION SAMPLING.

We also speak as though the issue were the security of

individual system. I would like to suggest that public trust is more

Page 33: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

33

influenced by the security of collections or the populations of a

system.

To date, most work in computer security has been done at the

atomic level. That is, it has been about making statements about

individual systems. We now have metrics with which to compare the

trust of two systems. We are starting to do work at the sub-atomic

level. That is, we can make statements about how components affect

the security of a system. We have not even begun to make statements

about the security of a population or network of systems.

A reader of “Computer at Risk” might be lead to conclude that

the problem can be readily dealt with simply by improving the

security of component systems. However, security is not a perfectly

compatible property. That is, it is not possible to bind two systems

closely enough to preserve their security. The level of security will

always be something less than that of the lesser of the two. In view of

this, the population of computer user will determine the level of

security it will take in order not to be allow to vulnerable such as

hacker, firewall, theft, eave, drops and so on.

3.4 SIMILARITY LEVEL OF COMPUTER SECURITY

When I connect two systems as peers, either dominating or

controlling the other, I assume that the level of security of the two is

approximately the same as that of the least secure of the two. Yet,

intuitively I suspect that the security of a large population of systems

is higher than that of the least trusted system, and lower than the most.

Page 34: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

34

How do we make statements about populations? What is the

effect of increasing the security of members of the population? We

have no science, art, or mechanism for addressing such questions.

Neither do we have information to tell us whether the managers of one

system or network consider the security of a nearby system before

deciding to connect to it. Yet at the level of society, at the level of

values, at the level of social trust and social order, these are the

questions of interest. The security of single systems has little

relevance on itself rather than on multiple systems.

3.5 COMPUTER SECURITY TECHNOLOGY AND ITS COMMERCIAL EFFECTS.

There is a natural, or at least historical, contention between

freedom and order. Nowhere does it manifest itself more than in

computing. The authorities are frightened by the individual freedom

afforded by the computer, and all too ready to jump in and impose

order. Any disorder is taken as justification.

On the other hand, they are equally frightened by the idea of

good security in private hands. The National Security Agency is

resisting any use of cryptography by commerce because of the

potential impact on the cost of intelligence gathering. Likewise, the

FBI has recently tried to outlaw the use of the same technology

because of the potential for its exploitation by criminals.

In the short run, the level of security in the population of

computer is a given. That is, the population is so large that it is not

possible to change the security except at the margin. However, the

National Academy of Science report, “Computer at Risk,” would have

us believe otherwise. They would have us believe that the problem is

Page 35: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

35

one of the products offered by vendors, rather than the systems

operated by users. Therefore it believes that the solution is to

influence vendors, rather than users. If vendors will simply offer better

systems with safer defaults, then the problem will be solved. The

report is either not aware of or ignores the evidence that users

systematically compromise away the security properties with which

systems are shipped.

The security of the computer in commercial activities,

especially in banking are of the greatest important that need to be

address. There are two type of security key and the first one is public

security key and the second one is private security key the public

security key are the one that can be made know to other parties. As the

name implies, it is the key that is publicized. The public key of a party

is used to encrypt (open) the data sent to that party. While the private

security key kept secret from the public eyes and is only know by the

owner. It is used to decrypting (closed) data that have been encrypted

(open) by the corresponding public key.

3.6. CONCLUSION OF COMMERCIAL EFFECTS ON

SECURITY

The full enjoyment of the benefit of computers requires a

certain level of confidence in how they behave. The security of the

systems contributes to that trust. The issue is more one of trust in the

population of computer, rather than in any one. While most computer-

related behavior is orderly, there is sufficient deviant behavior for it to

be a threat to the necessary level of trust.

Page 36: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

36

Security of system is necessary but not sufficient for the security of

the population. It appears to be important to be able to answer

questions about the level of trust in the population.

The values to be conserved include trust, confidence, cooperation,

collaboration, coordination, competition, contention, order, freedom,

and enjoyment of the use and benefits of computing. These values

conflict and contend. What is good for one may not be good for all of

the others. However, it is clear that security will impact them all. The

choices that confront us are hard choices.

Things that society concludes are valuable, it takes steps to conserve,

and there is some evidence to suggest that society will conclude that

computers are valuable. Yet to date, we have taken few such steps for

computers. To the extent that we fail, to the extent that the results are

unsatisfactory or even merely unsatisfying, we invite intervention by

authority with a corresponding loss of freedom

3.7 CRYPTOGRAPHIC TECHNIQUES

Cryptographic (art of keeping message secure) is a branch of

mathematics that is based on the transformation of data. It provides an

important tool for protecting information and is used in many aspect

of computer security. It is define as a tool for satisfying a wide

spectrum of computer security needs and requirements. In Alese

(2000), cryptography was said to mean the art science of encrypting

message such as that it is unintelligible to whoever is not authorized to

have access to it. Cryptography relies on two basis components: an

algorithm (a complex mathematical formula) and a key string of bits.

Cipher text

Page 37: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

37

3.8 MODEL OF CRYPTOGRAPHIC SYSTEM

There are three type basis type of cryptographic:

1. Secret Key Cryptography (SKC)

2. Public Key Cryptography (PKC)

3. Hash Functions

Secret Key Cryptography (SKC): Uses a single key for

both encryption and decryption also know as asymmetric

system.

Public Key Cryptography (PKC): Uses one key for

encryption and another for decryption know as the

asymmetric system.

Hash Functions: Uses a Mathematical transformation to

irreversibly “encrypt” information

(C) Hash Function (One-way cryptography). Hash functions have no key

Hash FunctionCiphertextPlaintext

(B) Public Key (Symmetric) cryptography. PKC uses two keys, one forEncryption and Decryption

PlaintextCiphertextPlaintext

(A) Secret Key (Symmetric) cryptography. SKC uses a single key for bothEncryption and Decryption

PlaintextCiphertextPlaintext

Page 38: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

38

3.9 SECRET KEY CRYPTOGRAPH SYSTEM

With secret key cryptography, a single key is used for both

encryption and decryption. As shown in Figure 1A, the sender uses the

key (or some set of rules) to encrypt the plaintext and send the

ciphertext to the receiver. The receiver applies and same key (or

ruleset) to decrypt the message and recover the plaintext. Because a

single key is used for both functions, secret key cryptography is also

called symmetric encryption.

With this form of cryptography, it is obvious that the key must be

known to both the sender and the receiver; that, in fact, is the secret.

The biggest difficulty with this approach, of course, is the distribution

of the key.

Secret key cryptography schemes are generally categorized as being

either stream ciphers or block ciphers. Stream ciphers operate on a

single bit (byte or computer word) at a time and implement some form

of feedback mechanism so that the key is constantly changing. A

block cipher is so-called because the scheme encrypts one block of

data at a time using the same key on each block. In general, the same

plaintext when using the same key in a block ciphers whereas the

same plaintext will encrypt to different ciphertext in a stream cipher.

(C) Hash Function (One-way cryptography). Hash functions have no key

Page 39: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

39

Stream ciphers come in several flavors but two are worth mentioning

here. Self-synchronizing stream ciphers calculate each bit in the

keystream as a function of the previous n bits in the keystream. It is

termed “self-synchronizing” because the decryption process can stay

synchronizing with the encryption process merely by knowing how far

into the n-bit keystream it is. One problem is error propagation; a

garbled bit in transmission will result in n garbled bit at the receiving

side. Synchronous stream ciphers generate the keystream in a fashion

independent of the message stream but by using the same keystream

generation function at sender and receiver. While stream ciphers do

not propagate transmission errors, they are, by their nature, periodic so

that the keystream will eventually repeat.

3.8.1 Example of Secret Key Cryptography algorithms that are in use today includes DES & FIPS etc:

Data Encryption Standard (DES): The most common SKC

scheme used today, DES was designed by IBM in the 1970s and

adopted by the National Bureau of Standards (NBS) now the

National Institution for Standard and Technology (NIST) in

1977 for commercial and unclassified government application.

DES is a block-cipher employing a 56-bit key that operates on

64-bit blocks. DES has a complex set of rules and

transformations that were designed specifically to yield fast

hardware implementations and slow software implementations,

although this latter point is becoming less significant today

since the speed of computer processors is several orders of

Page 40: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

40

magnitude faster today than twenty years ago, IBM also

proposed a 112-bit key for DES, which was rejected as the time

by the government; the use of 112-bit keys was considered in

the 1990s, however, conversion was never serious considered.

DES is defined in American National Standard X3.92 and three

Federal Information Processing Standards

3.8.3 Two Important Variants that Strengthen DES are:

Triple-DES (3DES): A variant of DES that employs up to three

56-bit keys and makes three encryption/decryption passes over

the block; 3DES is also described in FIPS 46-3 and is the

recommended replacement to DES.

DESX: A variant devised by Ron Rivest. By combining 64

additional key bits to the plaintext prior to encryption,

effectively increases the keylength to 120 bits.

3.9 PUBLIC KEY CRYPTOGRAPHY SYSTEM

Public-key cryptography has been said to be the most

significant new development in cryptography in the last 300-400

years. Modern PKC was first described publicly by Stanford

University Professor Martin Hellman and graduate student Whitfeld

Diffie in 1976. Their paper described a two key crpto system in which

two parties could engage in a secure communication over a non-secure

communications channel without having to share a secret key.

Page 41: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

41

Generic PKC employs two keys that are mathematically

related although knowledge of one key does not allow someone to

easily determine the other key. One key is used to encrypt the

plaintext and the other key is used to decrypt the ciphertext. The

important point here is that it does not matter which key is applied

first, but that both keys are required for the process to work (Figure

1B). Because a pair of keys are required, the approach is also called

asymmetric cryptography.

In PKC, one of the keys is designated the public key and may

be advertised as widely as the owner wants. The other key is

designated the private key and is never revealed to another party. It is

straight forward to send messages under this scheme. Suppose Tboy

Richest want to send Ejiro Richest a message. Tboy Richest encrypts

some information using Ejiro Richest public key; Ejiro Richest

decrypts the ciphertext using his private key. This method could be

also used to prove who sent a message; Tboy Richest, for example,

could encrypt some plaintext with here private key; when Ejiro

Richest decrypts using Tboy Richest public key, he knows that Tboy

Richest sent the message and Tboy Richest cannot deny having sent

the message (non-repudiation).

HASH FUNCTIONS

Hash functions, also called message digests and one way encryption,

are algorithms that, in some sense, use no key (Figure 1C). Instead, a

fixed-length hash value is computed based upon the plaintext that

Page 42: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

42

makes it impossible for either the contents or length of the plaintext to

be recovered. Hash algorithms are typically used to provide a digital

fingerprint of a file’s contents, often used to ensure that the file has

not been altered by an intruder or virus. Has functions are also

commonly employed by many operating systems to encrypt

passwords. Hash functions, then, provide a measure of the integrity of

a file.

Certain extensions of hash functions are used for a variety of

information security and digital forensics applications, such as:

Hash Libraries are sets of hash values corresponding to known

files. A hash library of known good files, for example, might be

a set of files known to be a part of an operating system, while a

hash library of known bad files might be of a set of known child

pornographic image.

Rolling hashes refer to a set of hash values that are computed

based upon a fixed-length “sliding window” through the input.

As an example, a hash value might be computed on bytes 1-10

of a file, then on bytes 2-11, 3-12, 4-13, etc.

Fuzzy hashes are an area of intense research and represent hash

values that represent two inputs that are similar. Fuzzy hashes

are used to detect documents, images, or other files that are

close to each other with respect to content. See “Fuzzy

Page 43: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

43

Hashing” (PDF/PPT) by Jesse Kornblum for a good treatment

of this topic.

WHY THREE ENCRYPTION TECHNIQUES

So, why are there so many distinct types of cryptographic schemes?

Why can’t we do everything we need with just one?

The answer is that each scheme is optimize for some specific

application(s). Hash functions, for example, are well-suited for

ensuring data integrity because any change made to the contents of a

message will result in the receiver calculating a distinct hash vales

than the one placed in the transmission by the sender. Since it is

highly unlikely that two distinct messages will yield the same hash

value, data integrity is ensured to a high degree of confidence.

Secret key cryptography, on the other hand, is ideally suited to

encrypting message, thus providing privacy and confidentiality. The

sender can generate a session key on a per-message basis to encrypt

the message; the receiver, of course, needs the same session key to

decrypt the message.

Key exchange, of course, is a key application of public-key

cryptography (no pun intended) . Asymmetric schemes can also be

used for non-repudiation and user authentication; if the receiver can

obtain the session key encrypted with the sender’s private key, then

only this sender could have sent the message. Public-key cryptography

could, theoretically, also be used to encrypt messages although this is

Page 44: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

44

rarely done because Secret-key cryptography operates about 1000

times faster than Public-key cryptography.

Sent To

Ejiro Richest

EncryptedSession Key

EncryptedMessage

Public Key Cryptograph

Ejiro Richest Public Key

RandomSession Key

Hash Function

Tboy RichestMessage

Public Key Cryptograph

Tboy RichestPrivate Key

Secret KeyCryptograph

Digital Envelope

Digital Signature

Figure 2: Sample Application of the threeCryptographic Techniques for Secure Communication

Page 45: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

45

Figure 2 put all of this together and shows how a hybrid cryptographic

scheme combines all of these functions to form a secure transmission

comprising digital signature and digital envelope. In this example, the

sender of the message is Tboy Richest and the Receiver is Ejiro

Richest.

A digital envelope comprises an encrypted message and an encrypted

session key. Tboy Richest secret key cryptography to encrypt her

message using the session key, which she generates at random with

each session. Alice then encrypts the session key using Ejiro Richest

public key. The encrypted message and encrypted session key together

form the digital envelope. Upon receipt, Ejiro Richest recovers the

session secret key using his private key and then decrypts the

encrypted message.

The digital signature is formed in two steps. First, Tboy Richest

computes hash value of his message; next, he encrypts the hash value

of her message; next she encrypts the hash value with his private key.

Upon receipt of the digital signature, Ejiro Richest recovers the hash

value calculated by Tboy Richest by decrypting the digital signature

with Tboy Richest public key. Ejiro can then apply the hash function

to Tboy Richest original message, which he has already decrypted (see

previous paragraph). If the resultant hash value is not the same as the

value supplied by Tboy Richest, the Ejiro Richest knows that the

message has been altered; if the hash values are the same, Ejiro

Richest should believe that the message he received is identical to the

one that Tboy Richest sent.

Page 46: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

46

This scheme also provides nonrepudiation since it proves that Tboy

Richest sent the message; if the hash value recovered by Ejiro Richest

using Tboy Richest public key proves that the message has not been

altered, then only Tboy Richest could have created the digital

signature. Ejiro Richest also has proof that he is the intended receiver;

if he can correctly decrypted the session key meaning that his is the

correct private key.

Page 47: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

47

CHAPTER FOUR

4.1 HACKERS AND CRACKERS

Hacking means finding out weaknesses in a computer or computer

network, though the term can also refer to someone with an advanced

understanding of computers and computer networking. Hackers may

be motivated by multitude of reasons, such as profit, protest, or

challenge. Some use their skills for business, developing penetration

tools to analyze a customer’s networks for security vulnerabilities.

The subculture that has evolved around hackers is often referred to as

the computer underground but it is now an open community.

A Crackers is the one who does “Cracking”.

Cracking is the act of breaking into a computer system, often on a

network; bypass passwords or licenses in computer programs; or in

other ways intentionally breaches computer security. And seek to

‘Crack’ or gain unauthorized access to computer to steal what have

been stored on our computers, Bank Account Details, Credit Card

Number, financial or business information.

A cracker can be doing this for profit, maliciously, for some altruistic

purpose or cause, or because the challenge is there. Some breaking-

and-entering has been done ostensibly to point out weaknesses in a

site’s security system.

Page 48: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

48

Because of the understanding amongst most people that people that

hackers are malicious, for the purposes of this article, I will use

‘hacker’ and ‘cracker’ interchangeably to mean intrudes with

malicious intent.

4.2 EFFECTS OF COMPUTER HACKING

For some, hacking may just be a hobby to see how many computers or

networks they can crack. For other, there is malicious intent behind

their escapade, like stealing…

1. It can expose sensitive user data and risk user privacy, hacking

activities expose confidential user information like personal

details, social security numbers, credit card numbers, bank

account data and personal photograph

2. User information, in the hands of computer hackers, makes it

vulnerable to illegitimate use and manipulation.

3. Deletion or manipulation of sensitive data with intent to

achieve personal gain is another effect, a user whose computer

has been hacked is at the risk of losing all data and stored on it

computer. Manipulation of sensitive user data is a grave

consequence of hacking.

4. Identity theft is another important consequence of computer

hacking .identity theft is a fraud that involves pretension to be

someone else, with intent to gain unauthorized access to

information or property.

Page 49: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

49

5. Hacking can be used to convert computers into zombies’ i.e.

internet-enabled computers that are computerized by hackers or

computer viruses. Zombie computers are used for fraudulent

activities like spamming and phishing.

4.3 TOOLS USED BY THE HACKER FOR HACKING THE COMPUTER SYSTEM

1. Nmap. (“Network Mapper”)

2. Nessus Remote Security Scanner

3. SuperScan

4. PuTTY

5. Password Cracking or Sniffing Programs

6. Vulnerability Scanners.

7. Malicious Programs

Nmap. (“Network Mapper”)

Nmap. (“Network Mapper”) is a free open source utility for

network exploration or security auditing. It was designed to

rapidly scan large networks, although it works fine against

single hosts. Nmap uses raw IP packets in novel ways to

determine what hosts are available on the network, what

services (application name and version) those host are offering,

what operating systems (an OS versions) they are running, what

type of packet filters/firewalls are in use, and dozens of other

characteristics. Nmap runs on most types of computers and both

Page 50: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

50

console and graphical versions are available. Nmap is free and

open source. Can be used by beginners (-sT) or by pros alike (-

packet_trace). A very versatile tool, once you fully understand

the results.)

Nessus Remote Security Scanner

Nessus is the world’s most popular vulnerability scanner used in

over 75,000 organizations world-wide. Many of the world’s

largest organizations are realizing significant cost savings by

using Nessus to audit business-critical enterprise device and

application.

SuperScan

Powerful TCP port scanner, pinger, resolver. Super Scan 4 is an

update of the highly popular Windows port scanning tool,

SuperScan.

PuTTY

PuTTY is a free implementation of Telnet and SSH for Win32

and Unix platforms, along with an xterm terminal emulator. A

must have for any h4xor wanting to telnet or SSH from

windows without having to use the crappy default MS

command line clients.

Password Cracking or Sniffing Programs.

A password cracking program guesses users’ passwords,

whereas a sniffer program watches information passing through

Page 51: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

51

the Internet. The aim of using these computer hacking programs

is to obtain usernames and passwords for unauthorized access.

Vulnerability Scanners.

Computer hacking can use vulnerability scanners to check a

computer for security weaknesses, such as those common on

Windows Operating Systems. When vulnerability is found, the

hacker knows exactly what to target to hack the system. Take

for example, a hacker armed with a laptop loaded with

searching software and an Omni-directional antenna. He/she

can car-cruise down local neighborhoods and business parks to

detect the locations of wireless network access points, or

hotspots. The hacker will make note of the site, return at a later

time, and hack into the network to search for vulnerabilities.

This practice is known as “wardriving” or “drive-by hacking”.

Malicious Programs

Hackers use backdoors-such as Trojan horses and rootkits-

viruses, and worms to compromise our systems.

Trojan Horses: are designed to appear to do one thing, such as

a free game, but really do something malicious. They are often

downloaded in a piece of freeware. A Trojan can be used to

create a backdoor, allowing a hacker to gain access later.

A Root-kits: is a piece of software that can be installed in a

similar way to a Trojan and hidden on our computer without our

Page 52: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

52

knowledge. Root-kits are not necessarily malicious, but they

may hide malicious activities. Attackers may be able to access

information, monitor our actions, modify programs, or perform

other functions on our computer without being detected.

A Virus: is a self-replicating program that spreads copies of

itself to other programs on the computer it has infected.

A Worm: is also a self-replicating program, but it can spread

copies of itself to other computers. It may carry a malicious

program, such as a Trojan horse, which gives a hacker a

backdoor entrance to our PC.

4.4 HOW TO PREVENT COMPUTER HACKING

Security threats to information systems have increased 65

percent over the past two years, and the number of network intrusions

has quadrupled. Any small business with a broadband internet

connection needs to guard against becoming a cyber-crime victim.

Here are simple, effective steps that small business owners and

network administrators can take to protect/prevent computer hackings.

1. Implement a firewall

2. Develop a corporate security policy

3. Install anti-virus software

4. Keep operating system up to date

5. Don’t run unnecessary network services

6. Conduct a vulnerability test

7. Keep informed about network security

Page 53: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

53

Implement a firewall

A firewall is a barrier that keeps hackers and virus out of

computer networks. Firewalls intercept network traffic and

allow only authorized data to pass through.

Develop a corporate security policy

Establish a corporate security policy should direct employees to

choose unique passwords that are a combination of letters and

numbers. Passwords should be changed every 90 days to limit

hackers’ ability to gain possession of a functioning password.

When someone leaves company, immediately delte the user

name and password. The corporate policy should outline

consequences for networking tampering and unauthorized entry.

Install anti-virus software

All computers should run the most recent version of an anti-

virus protection subscription. Ideally a server should be

configured to push virus updates out periodically to all client

systems. Employees should be educated about viruses and

discouraged from opening e-mail attachments or e-mail from

unknown senders.

Keep operating system up to date

Upgrade operating systems frequently and regularly install the

latest patches or versions of software, which are often free over

Page 54: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

54

the Web. If you use Microsoft Windows, check

www.windowsupdate.com periodically for the latest patches.

Don’t run unnecessary network services

When installing systems, any non-essential features should be

disabled. If a features is installed but not actively used, it is less

likely to be updated regularly, presenting a larger security

threat. Also, allow only the software employees need to do their

job effectively.

Conduct a vulnerability test

Conducting a vulnerability test is a cost-effective way to

evaluate the current security program. This test highlights flaws

and limitations in the program, and experts can offer

suggestions for improvement. The best method for conducting

vulnerability test is to contact a computer consulting company

and provide access to your system for a day or two. This will

provide ample time for network appraisal and follow-up

discussion and planning.

Keep informed about network security

Numerous books, magazine and online resources offer

information about effective security tools and “lessons learned”.

Also, the Web provides ample and very current information

about security-type in the key words “network security.”

Page 55: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

55

CHAMPTER FIVE

5.1. SUMMARY

Through this research work, computer security and public trust

has been seen to an indispensable concept that is important in any

business organization especially, in this concept of computer security,

several finally have been out themselves to be largely disputable,

some of which are:

To focus on the security of the computer components.

To analysis the various computer crime and fraud that are

common to the computer technology.

To expatiate further about the computer hacker and crackers.

These facts are seen to be interrelated.

The work under review is creates on the security and computer crime

as it affects all the works of life and towards the attainment of the

security objective. The crackers and hackers attributes toward the

security of computer technology is also highlighted as well as their

positive and negative effect.

5.2. CONCLUSION

The full enjoyment of the benefit of computer requires a certain

level of confidence in how they behave. The security of the systems

Page 56: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

56

contributes to that trust. The issue is more of one of trust in the

population of computer-related behavior is orderly; there is sufficient

deviant behavior for it to be a threat to the necessary level of trust.

Security of system is necessary but not sufficient for the population. It

appears to be important in order to answer questions about the level of

trust in population.

The value to be conserved includes trust, confidence,

cooperation, collaboration, coordination, competition, contention,

freedom, and enjoyment of the use and benefit of computing. These

values conflict and contend what is good for one may not be good for

others. However, it is clear that security will impact them all.

In conclusion, the public trust and fraud prevention is very

important in the world of computer technology and should be

encouraged for optimum consideration.

5.3. RECOMMENDATION

In the course of this research work some facts finding have been

established about computer security and the roles it plays in the

research hereby recommend the following:

A. We write and speak, and behave as through security were

free as through it were on independent properly that

Page 57: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

57

could be achieved without diminishing any other

desiderate.

B. The good security is depending on its design, this is true

however, in another sense security is usually achieved at

the expense of some other desirable property of the

system, and we need to take security onto a proper

consideration.

C. It also recommended that costs of security on the

computer are far reaching within the users and designer.

The ability of any computer designer is to see that the

security of the system are as well guarantee and the cost

of the design must be bore on the designer for the

flexibility of a system. The proper handling of the

computer security is highly recommended.

D. All our computers should be running the most recent

version of an antivirus program.

E. Our operating system and other software should be

patched as soon as updates are released. Maintaining the

most recent version of software and operating system will

Page 58: €¦  · Web viewTHE STRATEGIES AND METHODOLOGIES OF COMPUTER SECURITY OFTEN DIFFER FROM MOST OTHER COMPUTER TECHNOLOGIES. CHAPTER ONE. 1.1. INTRODUCTION. Computer security is a

58

help in blocking hackers from getting through any

vulnerability into our system.

In view of the above, it’s highly recommended that the security of

any computer system is of important and utmost.