Basic Computer Concepts Education Children are outpacing adults on the technology track. Education plays a major role in guiding the children to make use of the best of the computer technology. Current education systems must undergo significant reform to serve the needs of the younger generations. Computers and the Internet can help in making lessons customized and student-centered. Trends and Issues Basic Computer Concepts Careers and Professional Outlook Change that involves new and complex technologies are stressful to older and less educated workers. Computer literacy is an advantage on most jobs nowadays. Management supports the use of technology to improve productivity which in many instances mean the elimination of jobs. Trends and Issues Basic Computer Concepts Security Computer Crimes v v could reasonably include a wide variety of criminal offenses, activities, or issues can be separated into two (2) categories: • crimes facilitated by a computer • crimes where the computer is the target Computer Security Issues Bugs or misconfiguration problems that allow unauthorized remote users to: v v v v steal confidential documents execute commands on the host machine, allowing them to modify the system gain information about the host machine, allowing them to break into the system launch denial-of-service attacks rendering the machine temporarily unusable Trends and Issues Basic Computer Concepts Security Computer Security Issues Browser-side risks including: v v v active content that crashes the browser, damages the user’s system, breaches the user’s privacy, or merely creates an annoyance the misuse of personal information knowingly or unknowingly provided by the end-user Interception of network data sent from browser to server or vice versa via network eavesdropping Trends and Issues Basic Computer Concepts Security Aspects of Computer Security v Physical Security v Viruses v Malicious Logic v Hacking v Internal Misuse v Spoofing Trends and Issues Basic Computer Concepts Security Ethics v the rules and standards governing the conduct of an individual with others • copyright - a form of protection provided by law to authors of original works, otherwise known as their intellectual property • a copyright owner has the sole right to: – reproduce the material – prepare derivative works based on the material – distribute the copies of the material to the public – perform the work publicly (if applicable) – display the work publicly • privacy • censorship Trends and Issues Basic Computer Concepts Security Incidents There are many different ways to attack computers and networks to take advantage of what has made shopping, banking, investment, and leisure pursuits a simple matter of “dragging and clicking” for many people. Different types of electronic crime fall into two main categories: v Crimes in which the computer was the target of the attack v Incidents in which the computer was a means of perpetrating a criminal act Trends and Issues Basic Computer Concepts Security Incidents The Morris Worm (November, 1988) Citibank and Vladimir Levin (June-October, 1994) Kevin Mitnick (February, 1995) Omega Engineering and Timothy Lloyd (July, 1996) Jester and the Worcester Airport (March, 1997) Solar Sunrise (February, 1998) The Melissa Virus (March, 1999) The Love Letter Worm (May, 2000) The Code-Red Worm (2001) Adil Yahya Zakaria Shakour (August, 2001-May, 2002) The Slammer Worm (2003) Trends and Issues Basic Computer Concepts Threats to Security Viruses and Worms Intruders Insiders Criminal Organizations Terrorists and Information Warfare Trends and Issues Basic Computer Concepts Security Basics In some sense, security is concerned with preventing undesired behavior. v An enemy/opponent/hacker/adversary may be actively and maliciously trying to circumvent any protective measures you put in place. Computer vs. Network Security v v Computer security focuses on security aspects of systems in isolation. (e.g. viruses, secure data storage, OS security) Network security focuses on security of data as it is transmitted between networked systems. (e.g. authentication protocols, encryption of transmitted data, firewalls) Trends and Issues Basic Computer Concepts The CIA of Security Confidentiality — ensure that only those individuals who have the authority to view a piece of information may do so. Integrity — related to concept but deals with the generation and modification of data. Availability — ensure that the data, or the system itself, is available for use when the authorized user wants it. v v Authentication — deals with the desire to ensure that an individual is who they claim to be. Nonrepudiation — deals with the ability to verify that a message has been sent and received and that the sender can be identified and verified. Trends and Issues Basic Computer Concepts Security Principles Three ways an organization can choose to address the protection of its networks: v Ignore security issues v Provide host security v Approach security at a network level Host Security v takes a granular view of security by focusing on protecting each computer and device individually instead of addressing protection of the network as a whole Network Security v emphasis is placed on controlling access to internal computers from external entities Trends and Issues Basic Computer Concepts Least Privilege Least privilege means that a subject (which may be a user, application, or process) should have only the necessary rights and privileges to perform its task with no additional permissions. The concept of least privilege applies to more network security issues than just providing users with specific rights and permissions. Another issue in least privilege concept is the security context in which an application runs. All applications, scripts, and batch files run in the security context of a specific user on an operating system. Trends and Issues Basic Computer Concepts Layered Security Network security Network security Host security Host security Audit logs (Detection) Access controls Intrusion detection systems (Detection) Firewall (Prevention) Figure 1. Various Layers of Security Trends and Issues Basic Computer Concepts Diversity of Defense Diversity of defense is a concept that complements the idea of various layers of security. It involves making different layers of security dissimilar so that even if attackers know how to get through a system making up one layer, they may not know how to get through a different type of layer that employs a different system for security. Trends and Issues Basic Computer Concepts Access Control Discretionary Access Control v Mandatory Access Control v an access control mechanism in which the owner of an object (such as a file) can decide which other subjects (such as other users) may have access to the object, and what access (read, write, execute) these subjects may have an access control mechanism in which the security mechanism controls access to all objects (files), and individual subjects (processes or users) cannot change that access Role-Based Access Control v an access control mechanism in which, instead of the users being assigned specific access permissions for the objects associated with the computer system or network, a set of roles that the user may perform will be assigned to each user Trends and Issues