Friday 21 June 2019

Computer Systems Vulnerability


COMPUTER SYSTEMS VULNERABILITY 

Information Systems are made up of many components that may be in several locations.  Each information system is vulnerable to many potential hazards.  Vulnerability is increasing as many information systems become networked thus increasing the threats.  Threats to information system can be categorized into:

8.1 UNINTENTIONAL THREATS

Unintentional threats can be caused by human errors, environmental hazards or can be accidental computer failures.  Human errors can be caused by the design of the hardware in programming, testing, during data collection, data entry, authorization and instructions. Environmental hazards include earthquakes, hurricanes, storms, power failures, fire, defective air conditioning explosions, radioactive fail outs, smoke, heat, flood, etc.  Computer failures can be a result of poor manufacturing or defective materials.

8.2 INTENTIONAL THREATS

Intentional threats occur as a result of intentional actions.  Examples include: theft of data, inappropriate use of data e.g. manipulating inputs, theft of computer time, theft of equipment or programs, deliberate manipulation in handling, entering, processing or transferring or programming data, labour strikes, riots or sabotage, malicious damage to computer resources, destruction from viruses, computer abuses and crimes.

8.3 COMPUTER CRIMES
Computer crimes in many ways resemble conventional crimes.  They can occur in four ways:
·         Can target a computer e.g. a computer may be stolen, destroyed or a virus may destroy data in a computer
·         The computer can be the media of the attack by creating an environment in which a crime or fraud can occur.
·         False data are entered into a computer system to mislead individuals examining a system support
·         Computer can be the tool by which the crime is perpetrating a computer is used to plan the crime but the crime does not involve a computer.

The computer can be used to intimidate or deceive e.g. computer statistics or show forecasts that are deceiving in order to confuse or convince people who have to depend on the statistics or forecasts to make decisions.  Computer crimes can be performed by outsiders to an organization to penetrate a computer system or by an insider who is authorized to use the computer system but misuses the authorization.  Such a person is known as a hacker.  If the intention of the hacker is to cause malicious damage he is known as a cracker.  Computer criminals are various and frequently innovative in their attack method.  The two basic approaches that they use are data tampering where false data, fabricated data or fraudulent data is entered into the system or the existing data is changed or deleted.

·         Data tampering can also be done through programming techniques where skilled criminals can modify a computer program with the intention of committing fraud. 

·         Through viruses which is the introduction of undesired program in a system that can cause files, databases, other programs or even parts of the computer hardware to malfunction.  When a virus is attached to a legitimate program, that program becomes infected without the owner becoming aware and the infection may spread causing damage to the program and other programs of files in the system. 

Information systems must be secured from all types of attacks by providing security and controls that aim to protect the system and its components.  To protect information system is not a simple or inexpensive task due to the fact that there are very many threats.  Information systems components are always widely distributed, many users, technological changes are very fast thus requiring frequent upgrades to the control and security measures as well.  Also many crimes are undetected or may even go for a long period of time.  People tend to violate security procedures because procedures and inconvenient, it may require a lot of knowledge for someone to commit a computer crime and the cost of preventing hazards can be very high and many organizations may not afford.

However, information systems can be protected by inserting controls i.e. defense mechanisms which can be intended to prevent accident hazards, to deter intended acts, to detect problems as early as possible, to enhance damage and recovery and correct problems. The selection of specific strategy depends on the objective of the defense and the perceived cost benefit. The following defense strategies can be implemented:

·         Controls for prevention and difference – This is aimed at preventing errors from occurring, to deter criminals from attacking and to deny access to unauthorized people.  This is important where potential damage to the information system is very high.
·         Detection – It may not be possible to prevent all hazards therefore deterring measures may not work therefore unprotected systems are vulnerable to attach hence if the attack can be detected as early as possible it will be possible to combat it before it causes damage e.g. one may not protect or prevent fire from occurring or a virus from attacking but if either of this is detected early enough the damage can be minimal
·         Imitation – This means minimizing losses once a malfunction has occurred.  It can be accomplished by including a fault tolerant system that permits operation in a degraded mode until full recovery is made
·         Recovery – This defense strategy explains how to fix a damaged information system as quickly as possible.  It involves replacing of components that have been affected in order to recover as fast as possible.
·         Correction – This strategy focuses on the repairing of the damaged components and also preventing the problem for occurring again.

8.4 GENERAL COMPUTER CONTROLS

The Defense Strategies can be implemented either as application controls or general controls.  Some are intended to protect against human errors or others protect against natural causes.  General controls are established to protect the system regardless of the specific application e.g. protecting hardware and controlling access to a computer centre.  Application controls as safeguards that are intended to protect specific applications, major categories of general controls include physical controls, access controls, data security controls, network controls and administrative controls.

The Physical Controls refer to protection of computer facilities and resources which include computers, data centers, software manuals and networks.  Physical controls protect against most natural hazards and subhuman hazards and are commonly referred to as the first line in defense.
They include the following:

·                     Appropriate design of a computer centre so that it is fireproof and waterproof
·                     Shielding against electromagnetic fields
·                     Good fire prevention, detection and extinguishing system
·                     Emergency power shut off and backup batteries
·                     Properly designed  maintained and operated air conditioning system
·                     Motion detector alarms that detect physical intrusion

8.4.1 ACCESS CONTROL

This refers to the restriction of unauthorized access to a portion of computer system or the entire system.  To gain access the user must be authenticated and this can be done in three steps:

·         To allow physical access to the terminal
·         To access the system
·         To access specific commands transactions privileges programs and data within the system.

Access control can be accomplished by the user using something the user has e.g. token or smartcard or using the user e.g. signature, voice, fingerprint or retinal scan which are all implemented through biometric controls.

A biometric control is defined as an automated method of verifying the identity of a person based on psychological or behavioral characteristics.  Common biometrics includes a photographs, fingerprint, voice, signature, hand geometry, keystroke dynamics and blood vessel patterns in the retina of a person’s eye.

8.5 DATA SECURITY CONTROLS

This is concerned with protecting data from accidental or intentional disclosure to unauthorized persons or from unauthorized modification or destruction.  These controls are implemented through operating systems, security access control programs, data communication products, and backup and recovery procedure and application programs.  There controls address the following issues:
  • Confidentiality of data
  • Access control
  • Critical nature of data
  • Integrity of data


They must reflect the following two basic principles:

  • Minimal privilege i.e. only the information the user needs to carry out an assigned task should be made available to him or her
  • Minimal exposure i.e. once a user gains access to sensitive information he or she has the responsibility of protecting it by making sure only people whose duty require it obtain knowledge of this information while it is processed, stored or in transit.
Data integrity is the condition that exists as long as accidental or intentional destruction, alteration or loss of data does not occur.  It is the preservation of data or for its intended use.

8.5.1 COMMUNICATION CONTROLS

These controls are essential in protected data that is in transit through the Internet or intranets.  The most common measures of protecting information in a network include: access control that includes authentication and passwords, encryption, cable testing and firewalls. Access controls safeguards against dial-in attempt.  It authenticates the personal identification number assigned to every user and also user passwords.  It can also include biometrics.  Encryption encodes regular digitized text into unreadable scrabbled text or numbers to be decoded upon receipt.  It accomplishes three purposes:

·         Identifying legitimate senders and receivers
·         Preventing changing any transaction or message
·         Accomplishes privacy

Cable testing is popular in LANS and is used to find faults that can occur with LAN cabling.  It can also include protocol analysis which allows users to inspect the contents of information packets as they travel through networks.  Firewalls are groups of systems that enforce an access control policy between two networks.  They are commonly used as a barrier between secure cooperate network or any other internal network and the Internet which is always assumed to be insecure.  The firewall follows state guidelines that either permit or block traffic.  It is designed with clear and specific rules about what can pass through.

8.5.2 ADMINISTRATION CONTROLS

These controls deal with issuing guidelines and monitoring with the guidelines.  They can include:
·         Appropriately selecting training and supervising employees especially in accounting and information systems.
·         Fostering company loyalty
·         Immediately relocking access privileges of dismissed, transferred or resigned employees
·         Periodically modifying access control with such passwords
·         Developing programming documentation standards to make auditing easier
·         Holding periodic random audits of the system
·         Insisting on security bonds for key employees
·         Instituting separation of duties by dividing sensitive computer duties among as many employees as economically feasible in order to decrease chances of intentional or unintentional damage

8.5.3 APPLICATION CONTROLS

They are intended to protect the content of each specific application.  They are therefore built into the application and usually written as validation rules. They can also be classified into three:
·         Input controls
·         Processing controls
·         Output controls

Input controls are designed to prevent data alteration or loss.  Data are checked for accuracy completeness and consistency.  Also the range and format of data are validated to prevent GIGO situation. Processing controls ensure that data are complete, valid and accurate when being processed and that program have been properly executed.  Output controls ensure that the results of computer processing are accurate, valid complete and consistent and they are also used to evaluate common output errors and their possible courses in order to determine what can be done.  These controls ensure that output have set only the authorized personnel.

8.5.4 NATURAL AND ENVIRONMENTAL THREATS
Computers are also threatened by natural or environmental disaster. Be it at home, stores, offices and also automobiles. Examples of natural and environmental disasters: flood, fire, earthquakes, storms and tornados, excessive heat, and inadequate power supply

8.6 SECURITY MEASURES
·              Today, people rely on computer to create, store and manage critical information. It is important that the computer and the data they store are accessible and available when needed. It is also important that user take measures to protect their computers and data from lost, damage and misuse. How do we protect our computer from breaches of security and our security risk?
·              Security measures mean the precautionary measures taken to ward off possible danger or damage. There are 6 types of security measures which are data backup, cryptography, Antivirus, Anti-Spyware, Firewall and human aspects.

8.6.1 DATA BACKUP
·              Data backup is a program of file duplication.
·              Backups of data applications are necessary so that they can be recovered in case of an emergency.
·              Depending on the importance of the information, daily, weekly or biweekly backups from a hard disk can be performed.

8.6.2 CRYPTOGRAPHY
·              Cryptography is a process of hiding information by altering the actual information into different representation, for example APA can be written as I?X.
·              Almost all cryptosystem depend on a key such as a password like the numbers or a phase that can be used to encrypt or decrypt a message.
·              The traditional type of cryptosystem used on a computer network is called a symmetric secret key system.
·              With this approach, the sender and the recipient use the same key, and they have to keep the share key a secret from anyone else.
8.6.3 ANTIVIRUS
·              User should install an Antivirus program and update it frequently.
·              An Antivirus program protects a computer against viruses by identifying and removing any computer viruses found in the computer memory, on storage media or incoming e-mail files

Identifying virus: Two techniques are use to identify the virus:
·              Virus signature – also called a virus definition. It is a specific pattern of the virus code.
·              Inoculating a program file – the Antivirus program records information such as the file size and file creation date in a separate inculcation file. The Antivirus program then uses this information to detect if a virus tampers with the data describing the inoculated program file.
·              If an Antivirus program identifies an infected file, it attempts to remove its virus, worm or Trojan horse.
·              If the Antivirus program cannot remove the infection, it often quarantines the infected file. Quarantine is a separate area of a hard disk that holds the infected file until the infection can be removed. This step ensures other files will not become infected.
·              An Antivirus program scans for programs that attempt to modify the boot program, the operating system and other programs that normally are read from but not modified.
·              Many Antivirus program automatically scan files downloaded from the web, e-mail attachments and all types of removable media inserted into the computer.

8.6.4 ANTI - SPYWARE
·              Spyware is a program placed on a computer without the user’s knowledge. It secretly collects information about the user.
·              The Spyware program communicates information to the outside source.
·              An Anti-Spyware application program sometimes called tracking for threat or a Spybot is used to remove Spyware.
Among the popular Anti-Spyware programs are: Spybot Search and destroy Ad-aware and Spyware Blaster

8.6.5 FIREWALL
·              Firewall is a piece of hardware or software which functions in a networked environment to prevent some communications forbidden by the security policy.
·              The purpose of a firewall is to keep bad thing outside a protected firewall implement a security policy. It might permit limited access from in or outside the network perimeters or from certain users or for certain activity.

There are three types of firewall
·              Screening routers - Simplest and sees only addresses and service protocol type and uses screen based on connection rules
·              Proxy gateway - Complex and sees full text of communication and is screen based on behaviour proxies
·              Guard - Most complex and sees full text of communication and uses screens based on interpretation of message content.
8.7 NATURAL DISASTER VS DATA BACKUP
·              The natural and environmental disaster may include flood, fire, earthquakes, storms and tornados.
·              Natural disaster may threaten a computer’s hardware and software easily. Computers are also sensitive to their operating environment such as excessive heat or the inadequacy of power supply.
·              The backup system is needed to backup all data and applications in the computer. With the backup system, data can be recovered in case of an emergency.

8.8 HUMAN ASPECTS
·              Human aspects refer to the user and also the intruder of a computer system.
·              It is one of the hardest aspects to give protection to.
·              The most common problem is the lack of achieving a good information security procedure.

There are three ways to protect computer from human aspect threat:
·              Organization Self Awareness - Organizations need to be aware of the people they work with. Some threat also comes from within the organization and not just from the outside.
·              Organizational User Self Awareness - Provide employee with adequate training and the importance of security and control.  Even a very high-tech protection system could not protect the system against incompetent users.
·              Individual User Self Awareness - Threat often comes in beautiful offers and packages. Do not download or install software from unreliable sources. Do not expose important information to strangers.


8.8.1 THEFT VERSUS HUMAN ASPECTS
Computer theft can be of 2 kinds:
·              Can be used to steal money, goods, and information and computer resources.
·              The actual stealing of computers, especially notebooks and PDAs
·              These threats can be handled based on the human aspects.

Approaches that can be taken by individuals or organizations to prevent theft which are
·              Prevent access by using locks, smart card or password
·              Prevent portability by restricting the hardware from being moved
·              Detect and guard all exits and record any hardware transported.

Be suspicious of all results
·              There are many instances where non-programmers develop applications which are not built with proper understanding of software engineering practices.
·              Data produced by such applications may not be correct and may risk corrupting data received from other sources that are not compatible with the application.





No comments:

Post a Comment