Computer crimes reported by most of the organizations may be related to different types of security problems such as
Hacking , Viruses , Worm, Trojan Horses , Spyware
Malicious software (malware) is used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
'Malware' includes
- Computer Viruses - computer programs that can spread across computers and networks by making copies of itself without the user's knowledge.
- Worms - similar to viruses but do not need a carrier program or document. create exact copies of themselves and use a network to spread.
- Trojan Horses - programs that pretend to be legitimate software, but actually carry out hidden, harmful functions.
- Spyware - includes methods to collect information about the use of the computer on which the software is installed.
Spoofing and Sniffing
In simple words,
Sniffing means to illegally listen into another's conversation
Spoofing means to pretend to be someone else.
Sniffing and spoofing are security threats that target the lower layers of the networking infrastructure supporting
applications that use the Internet.
Sniffing is a passive security attack in which a machine separate from the intended destination reads data on a network.
Spoofing is an active security attack in which one machine on the network masquerades as a different machine.
This masquerade aims to fool other machines on the network into accepting the impostor as an original, either to lure
the other machines into sending it data or to allow it to alter data.
Identity theft is a form of stealing someone's identity.
Someone pretends to be someone else in identity theft, by assuming that person's identity, usually as
a method to gain access to resources or obtain credit and other benefits in that person's name.
Phishing
is the act of attempting to acquire information such as usernames, passwords, and credit card details by
masquerading as a trustworthy entity in an electronic communication.
E.g.s
an e-mail can be sent to the victim
luring the victim to enter a site and when entered, information
such as
usernames, passwords and credit card information may be collected by the
criminal posing as the victim’s bank site.
Technologies and Tools Used for Security and control
These tools and techniques address how to:
In addition to cryptography, information assets can be protected by using tools such as
Virus scanners, firewalls and Intrusion Detection Systems (IDS) .
These techniques and tools cannot alone provide information security. Limiting physical access to servers, routers and other systems is required. By physically reorganizing or consolidating information assets, we can simplify the management of those assets while increasing their security. These servers and the other computer infrastructures should be physically protected as well.
Security Audits
In principle, security audits/reviews should be:
- defined in scope, and documented
-
performed by qualified individuals who have sufficient technical skills and knowledge of information security
-
conducted sufficiently
frequently and thoroughly (in terms of scope, extent) to provide
assurance that security controls function as required
-
focused on ensuring that controls are effective enough to reduce risks to acceptable levels
-
checked by competent staff
-
complemented by reviews conducted by independent third parties.
|
|
|
References Used :- BIT UCSC Notes
What-is-the-difference-between-spoofing-and-sniffing