Monday, March 25, 2019

Basic Security Threats , Technologies and Tools Used for Security and control

   Computer crimes reported by most of the organizations may be related to different types of security problems such as
   Hacking   ,  Viruses , Worm, Trojan Horses , Spyware

      Malicious software (malware) is used to disrupt computer operation, gather sensitive information, or gain access to private   computer systems.
     'Malware' includes

    •    Computer Viruses - computer programs that can spread across computers and networks by making copies of itself without the user's knowledge.
    •    Worms  - similar to viruses but do not need a carrier program or document. create exact copies of themselves  and use a network to spread.
    •    Trojan Horses -  programs that pretend to be legitimate software, but actually carry out hidden, harmful functions.
    •    Spyware -  includes methods to collect information about the use of the computer on which the software is installed.
    Spoofing and Sniffing
     
        In simple words,
       
        Sniffing   means to illegally listen into another's conversation
        Spoofing means to pretend to be someone else.

        Sniffing and spoofing are security threats that target the lower layers of the networking infrastructure supporting
        applications that use the Internet.

        Sniffing is a  passive security attack in which a machine separate from the intended destination reads data on a network.
        Spoofing is an active  security attack in which one machine on the network masquerades as a different machine.

        This masquerade aims to fool other machines on the network into accepting the impostor as an original, either to lure
        the other machines into sending it data or to allow it to alter data.



    Identity theft is a form of stealing someone's identity.

        Someone pretends to be someone else in identity theft, by assuming that person's identity, usually as

        a method  to    gain  access to  resources or obtain credit and other benefits in that person's name.


    Phishing 
       is the act of attempting to acquire information such as usernames, passwords, and credit card details by 
       masquerading as a trustworthy entity in an electronic communication.

      E.g.s

      an e-mail can be sent to the victim luring the victim to enter a site and when entered, information
      such as usernames, passwords and credit card information may be collected by the criminal posing as the victim’s bank site.



      Technologies and Tools Used for Security and control

    These tools and techniques address how to:
    In addition to cryptography, information assets can be protected by using tools such as
    Virus scanners, firewalls and Intrusion Detection   Systems (IDS
    ) .
    These techniques and tools cannot alone provide information  security. Limiting physical access to servers, routers and other systems is required.
    By physically reorganizing or consolidating information assets, we can simplify the management of those assets while increasing their security.
    These servers and the other computer infrastructures should be physically protected as well.


    Security Audits
     
     The information security status of critical IT environments should be subject to thorough, independent and regular security audits/reviews.
    In principle, security audits/reviews should be:
    • defined in scope, and documented
    • performed by qualified individuals who have sufficient technical skills and knowledge of information security
    • conducted sufficiently frequently and thoroughly (in terms of scope, extent) to provide assurance that security controls function as required
    • focused on ensuring that controls are effective enough to reduce risks to acceptable levels
    • checked by competent staff
    • complemented by reviews conducted by independent third parties.


    References Used :-  BIT  UCSC Notes 
                                    What-is-the-difference-between-spoofing-and-sniffing

    The AI Driven Software Developer, Optimize Innovate Transform

      The AI-Driven Software Developer: Optimize, Innovate, Transform": AI Transformation in Software Development : Understand how AI is re...