Page 11 - DCAP516_COMPUTER_SECURITY
P. 11

Unit 1: Introduction to Computer Security




          the World Trade Center and the Chicago tunnel flood, as well as more common events, such as  Notes
          broken water pipes.

          1.3.4 Malicious Hackers

          The term malicious hackers, sometimes called crackers, refers to those who break into computers
          without authorization. They can include both outsiders and insiders. Much of the rise of hacker
          activity is often attributed to increases in connectivity in both government and industry. One
          1992 study of a particular Internet site (i.e., one computer system) found that hackers attempted
          to break in at least once every other day.

          1.3.5 Malicious Code


          Malicious code refers to viruses, worms, Trojan horses, logic bombs, and other “uninvited”
          software. Sometimes mistakenly associated only with personal computers, malicious code can
          attack other platforms. Malicious software’s consist of viruses, worms, Trojan horses, etc.

          1.4 Goals of Security


          Given below are the major goals of computer security:
          1.   Prevention: Prevention is ideal, because then there are no successful attacks.
          2.   Detection: Detection occurs after someone violates the policy. The mechanism determines
               that a violation of the policy has occurred (or is underway), and reports it. The system (or
               system security officer) must then respond appropriately.
          3.   Recovery: Recovery means that the system continues to function correctly, possibly after
               a period during which it fails to function correctly. If the system functions correctly always,
               but possibly with degraded services, it is said to be intrusion tolerant. This is very difficult
               to do correctly; usually, recovery means that the attack is stopped, the system fixed (which
               may involve shutting down the system for some time, or making it unavailable to all
               users except the system security officers), and then the system resumes correct operations.

          Self Assessment

          Fill in the blanks:
          1.   ……………………  refers to viruses, worms, Trojan horses, logic bombs, and other
               “uninvited” software.
          2.   The term malicious hackers, sometimes called …………….., refers to those who break into
               computers without authorization.
          3.   ……………………… can occur during all phases of the systems life cycle.
          4.   A sound awareness and training program can help an organization reduce the number
               and severity of errors and …………………………..
          5.   The costs and benefits of …………………. should be carefully examined in both monetary
               and nonmonetary terms.

          6.   The purpose of computer security is to protect an organization’s valuable resources, such
               as information, hardware, and ……………………..







                                           LOVELY PROFESSIONAL UNIVERSITY                                    5
   6   7   8   9   10   11   12   13   14   15   16