Page 78 - DCAP516_COMPUTER_SECURITY
P. 78

Computer Security




                    Notes          7.1 Security Concerns

                                   The fact that an operating system is computer software makes it prone to error just as any human
                                   creation. Programmers make mistakes, and inefficient code is often implemented into programs
                                   even after testing. Some developers perform more thorough testing and generally produce
                                   more efficient software. Therefore, some operating systems and more error prone while others
                                   are more secure.
                                   Here are some common security issues that pose a threat to all operating systems:

                                   Instabilities and Crashes: Both of these instances may be the result of software bugs in the
                                   operating system. Bugs in software applications on the computer may also cause problems, such
                                   as preventing the system from communicating with hardware devices. They can even cause the
                                   system to become unstable or crash. A system crash consists of freezing and becoming
                                   unresponsive to point where the machine needs to be rebooted. These issues vary depending on
                                   the type of operating system.
                                   Flaws: Software bugs will not only make a system unstable, but also leave it wide open to
                                   unauthorized users. Once these vulnerabilities are discovered, attackers can exploit them and
                                   gain access to your system. From there, they can install malware, launch attacks on other machines
                                   or even take complete control of your system.




                                     Notes  Software developers usually distribute security patches rather quickly to update
                                     the operating system and fix the vulnerabilities.

                                   7.2 What is a Trusted System?


                                   In the security engineering subspecialty of computer science, a trusted system is a system that is
                                   relied upon to a specified extent to enforce a specified security policy. As such, a trusted system
                                   is one whose failure may break a specified security policy.

                                   A trusted system connotes one that meets the intended security requirements, is of high enough
                                   quality, and justifies the user’s confidence in that quality. That is trust is perceived by the
                                   system’s receiver or user, not by its developer, designer, or manufacturer. It is important to
                                   realize that there can be degrees of trust; unlike security, trust is not a dichotomy.

                                   7.3 Security Policies


                                   There are a number of topics that should be addressed. Identification and authentication are two
                                   major topics – how are the users of the system identified and authenticated. User ID’s and
                                   passwords are the most common mechanisms, but others are possible.
                                   The audit policy should specify what events are to be logged for later analysis. One of the more
                                   commonly logged classes of events covers failed logins, which can identify attempts to penetrate
                                   the system. One should remember, however, that event logs can be useful only if there is a
                                   method for scanning them systematically for significant events.

                                       !

                                     Caution  Manual log reading is feasible only when an event has been identified by other
                                     means – people are not good at reading long lists of events.






          72                                LOVELY PROFESSIONAL UNIVERSITY
   73   74   75   76   77   78   79   80   81   82   83