Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Computer and Internet Security: Types and Principles, Lecture notes of Information Security and Markup Languages

An overview of information security, focusing on Internet Security. It discusses the importance of security in the context of increasing business transactions online, the challenges of security, and the need for protection against unauthorized access, use, disclosure, disruption, modification, or destruction of information. The document also covers various types of security attacks and security services, as well as security mechanisms and a model for network security.

What you will learn

  • What are the different types of security attacks?
  • What are the different types of security services?
  • What are the challenges of ensuring information security in the digital age?
  • What are the key principles of information security?
  • What are the most common security mechanisms used to protect information?

Typology: Lecture notes

2019/2020

Uploaded on 04/14/2020

nitisha-aggarwal-1
nitisha-aggarwal-1 🇮🇳

5 documents

1 / 16

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
INFORMATION SECURITY
Attacks on Computers and Computer
Security
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff

Partial preview of the text

Download Computer and Internet Security: Types and Principles and more Lecture notes Information Security and Markup Languages in PDF only on Docsity!

INFORMATION SECURITY

Attacks on Computers and Computer Security

Attacks on Computers and Computer

Security:

  • (^) Introduction,
  • (^) The need for security,
  • (^) Security approaches,
  • (^) Principles of security,
  • (^) Types of Security attacks,
  • (^) Security services,
  • (^) Security Mechanisms,
  • (^) A model for Network Security

Why We Need Information Security?

  • (^) our focus is on Internet Security which consists of measures to deter, prevent, detect, and correct security violations that involve the transmission & storage of information
  • (^) Challenges in Security? 1.Use of computer with internet
  1. Software tools are available freely
  2. Importance of information 4.Lack of awareness/ignorance/hesitation
  • (^) PROTECTION 1.Unahorized Access by intentionally or unintentionally.

1.1 SECURITY

Introduction

  • (^) Information:- Computers, Networks, Internet, Mobile.
  • (^) Security:-trying to understand how to protect.
  • (^) The various dangers & pitfalls when we use technology.
  • (^) The consequences of not setting up the rightSecurity PoliciesSecurity FrameworkSecurity Technology

Why is Security Required?

  • (^) Business & different types of transactions r being conducted to a large extent over Internet.
  • (^) Inadequate or improper security mechanism can bring whole business down or play havoc with people’s lives!
  • (^) Since Electronic Documents & Messages r now becoming equivalent to proper documents in terms of their legal validity & binding.

Information Security

  • (^) Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.

• Background

  • (^) Throughout history, confidentiality of information has always played a key role in military conflict.
  • (^) In Past No or little security.

The Need for Security(Current Scenario)

  • (^) Now a days Importance of data was truly realized.  Financial & Personal data
  • (^) Therefore various areas in security began to gain prominence.
  • (^) Typical Examples of Basic Security Mechanism: Authenticate a User->id, pw Encode->DB->Not Visible to user who do not have the right permission.
  • (^) Organization employed their own mechanism.

Information traveling from a client to a server

over the internet.

Some real time attacks

  • (^) Russian Attacker Maxim actually manage to intruder into a merchant Internet site & obtained 300, credit card numbers from its DB.
  • (^) He then attempted extortion by demanding protection money($100,000) from the merchant.
  • (^) The merchant refused to oblige.
  • (^) Following this, the attacker published about 25, of the credit card numbers on the internet!
  • (^) Some banks reissued all the credit cards at a cost of $20 per card & others forewarned their customers about unusual entries in their statements.

Modern Nature Of Attack

1. Automating Attacks :- Traditional Attack: Produce Coins using machinery & Bring them into circulation. Modern Attack: Steal half a dollar from million accounts in a few minutes time digitally.

  1. Privacy Concern :-Every Company are collecting & processing lots of information about us. Without we realizing when & how it is going to be used.
  2. Distance does not matter :- Attack Can be launched from the distance. E.g:- In 1995, a Russian hacker broke into Citibank’s computer remotely, stealing $12M. Although the attacker was traced, it was very difficult to get extradited him for the court case.