Page 11 - DCAP516_COMPUTER_SECURITY
P. 11
Unit 1: Introduction to Computer Security
the World Trade Center and the Chicago tunnel flood, as well as more common events, such as Notes
broken water pipes.
1.3.4 Malicious Hackers
The term malicious hackers, sometimes called crackers, refers to those who break into computers
without authorization. They can include both outsiders and insiders. Much of the rise of hacker
activity is often attributed to increases in connectivity in both government and industry. One
1992 study of a particular Internet site (i.e., one computer system) found that hackers attempted
to break in at least once every other day.
1.3.5 Malicious Code
Malicious code refers to viruses, worms, Trojan horses, logic bombs, and other “uninvited”
software. Sometimes mistakenly associated only with personal computers, malicious code can
attack other platforms. Malicious software’s consist of viruses, worms, Trojan horses, etc.
1.4 Goals of Security
Given below are the major goals of computer security:
1. Prevention: Prevention is ideal, because then there are no successful attacks.
2. Detection: Detection occurs after someone violates the policy. The mechanism determines
that a violation of the policy has occurred (or is underway), and reports it. The system (or
system security officer) must then respond appropriately.
3. Recovery: Recovery means that the system continues to function correctly, possibly after
a period during which it fails to function correctly. If the system functions correctly always,
but possibly with degraded services, it is said to be intrusion tolerant. This is very difficult
to do correctly; usually, recovery means that the attack is stopped, the system fixed (which
may involve shutting down the system for some time, or making it unavailable to all
users except the system security officers), and then the system resumes correct operations.
Self Assessment
Fill in the blanks:
1. …………………… refers to viruses, worms, Trojan horses, logic bombs, and other
“uninvited” software.
2. The term malicious hackers, sometimes called …………….., refers to those who break into
computers without authorization.
3. ……………………… can occur during all phases of the systems life cycle.
4. A sound awareness and training program can help an organization reduce the number
and severity of errors and …………………………..
5. The costs and benefits of …………………. should be carefully examined in both monetary
and nonmonetary terms.
6. The purpose of computer security is to protect an organization’s valuable resources, such
as information, hardware, and ……………………..
LOVELY PROFESSIONAL UNIVERSITY 5