=)
My name is Saufidatul ailin Binti Rusli
just call me ailin..
I am very excited to have this blog because I can share some information with all of you about IT security..
sounds interesting,right?
but I hope all my readers will get some knowledges from this blog..
Thank You!
--------------------------------------------------------------------------
Why We Study Computer Security?
------------------------------------------
Dear friend..
Do you know why we should study computer security?
For your information, being an IT security specialist is not only to protect the system from hackers but they also need to understand about cryptography and firewall which these tools used by them to protect information systems.
Moreover, as the IT technology is growing fast from time to time, IT security is very important to protect the system.
Besides, this industry will offer new career opportunities to people who interest in IT security.
What is Security?
----------------------
Security is the quality or state of being secure or to be free from danger and to be protected from adversaries and from those who would do harm intentionally.
What is Information Security?
------------------------------------
Information Security is the protection of information and the systems and hardware that use, store, and transmit that information.
( by Mr.Zaki )
How does it differ from IT security?
------------------------------------------
IT Security is a term which is more concerned with the protection of hardware, software and a network of an organization and external attacks.
It is more to do with the electronic data and is covered in the IT policy of an organization, whereas Information security policy goes beyond the network and applies to the organization as a whole.
There are three security area:
1) Detection - scanner such as virus scanner, internet scanner and Web server scanner.
2) Prevention - proxy or firewall.
3) Recovery - cryptography techniques and proper planning.
Security Architecture
---------------------------
Security Architecture is defined by ITU-T Recommendation X.800 that called OSI Security Architecture.
For your information, Recommendation X.800 was prepared by Study Group VII and was approved under the Resolution No. 2 procedure on the 22nd of March 1991.
It is useful for a managers as a way of organizing the task of providing security.
It is more focuses on security attacks, security mechanisms and security services.
Security Principle
-----------------------
There are three principles involved that is confidentality, integrity and availability.
Confidentality is prevention of unauthorized disclosure of information, Integrity is
prevention of unauthorized modification of information whereas Availability is
prevention of unauthorized with holding of information or resources.
Security Policy
-------------------
Policy is a set of rules to apply to security relevant activities in a security domain,
Level of security policy involves objectives, organizational and system whereas
Key aspects of security policy includes authorization, access control policy, accountability.
Security Attack
--------------------
There are two types of security attack that is passive and active attack.
What is Passive attack?
Passive attack is eavesdropping or monitoring the transmissions. Its goal to obtain information that is being transmitted and its type is to release of message contents & traffic analysis.
What is active attack?
Active attack is involve some modification of the data stream or the creation of a false stream
and its goal is to obtain authorization which divided to some categories that is masquerade, replay, modification of messages & denial of service.
Let's learn first about Passive Attack!
---------------------------------------------
There are 3 persons who involve in this situation: Alex, Halim and Anita.
Release of Message Content
Situation 1: Alex send message to Anita through Internet and in this situation, Halim will read content of message that has been sent by Alex to Anita without permission by Anita and Alex.
Traffic Analysis
Situation 1: Alex send message to Anita through Internet and in this situation, Halim will observe pattern of message that has been sent by Alex to Anita without permission by Anita and Alex.
Let's Learn about Active Attack then!
Masquerade
Situation 1:Halim send a message to Anita which the message will show that Alex sent it.Message from Halim that appears to be from Alex.
Replay
Situation 1: Alex wants to send a message to Anita, than Halim capture the message from Alex which later Halim will replay the message to Anita.
Modification of Message
Situation1: Alex wants to send a message to Anita then Halim will capture and modifies the message from Alex then send it to Anita.
Denial of Services
Situation 1: Halim will disrupt services provided by server and Alex can''t send message anymore!
Different Between Passive And Active Attack ---------------------------------------------------
Passive Attack
◦Very difficult to detect.
◦Feasible to prevent the success of these attacks.
◦Emphasis in dealing with passive attacks is on prevention rather than detection.
Active Attack
◦Quite difficult to prevent active attacks.
◦Instead, the goal is to detect active attacks and to recover from any disruption or delays caused by them.
◦If the detection has a deterrent effect, it may also contribute to prevention.
Method of Defense -----------------------
We can deal with harm that occurs when a threat is realized against a vulnerability in several ways:
◦Prevent it, by blocking the attack or closing the vulnerability.
◦Deter it, by making the attack harder, but not impossible.
◦Deflect it, by making another target more attractive.
◦Detect it, either as it happens or some time after the fact.
◦Recover from its effects.
There some methods involved:
-Encryption
-Software Controls - access limitations in a data base, in operating system protect each user from other users
-Hardware Controls –smartcard
-Policies - frequent changes of passwords
-Physical Controls
-------------------------------------------------------------------------------------------------
Okay, I pen off first..
Hope you get some knowledges from this blog.
Thank You!
=)
More Informations: C.P. Pfleeger, S. L. Pfleeger (2003). Security in computing 3rd Ed., Prentice Hall International.
My lecturer: Encik Zaki
No comments:
Post a Comment