Computer Security
Computer Security
Presented by:
First and last name
Teacher:
Name of the Teacher
University
Faculty
Subject
City
Date
Table of contents
Introduction.....................................................................................................................................2
Objectives..........................................................................................................................................3
General Objective..........................................................................................................................3
Specific Objectives...................................................................................................................3
Glossary of Terms......................................................................................................................4
Computer security
Confidentiality......................................................................................................................8
Integrity
Availability
Risk Factors.....................................................9
Security mechanisms..............................................................................................................10
Passwords....................................................................................................................................12
Firewalls
Types of Firewall
Personal Firewalls...............................................................................................................15
Packet filtering................................................................................................................15
Graphically:.............................................................................................................................16
Dual-Homed Host...................................................................................................................16
Screened Host.........................................................................................................................17
Screened Subnet.....................................................................................................................18
Firewall Restrictions.......................................................................................................18
Benefits of a Firewall..........................................................................................................19
Limitations of a Firewall..........................................................19
Encryption...................................................................................................................................21
Uses of Encryption.........................................................21
Encryption Methods...........................................................................................................21
HASH Algorithm
Digital Signature..........................................................................................................................22
File Encryption............................................................................................................23
Types of Ciphers.......................................................................................................................24
Authentication.............................................................................................................................24
Antivirus
Backups....................................................................................................28
Conclusions
Bibliographic References.............................................................................................................31
Introduction
Every day, more and more malicious individuals try to access our data.
equipment. In most cases, unauthorized access to a computer network or equipment
what it contains can cause serious problems. One of the possible consequences of unauthorized access
authorized is the loss of data.
This is a common situation and can cause a lot of confusion, especially if not
we keep our backups updated. Although we are updated, we do not
all data can always be recovered. Another more devastating problem is theft of
sensitive and confidential information. The disclosure of information about your customers by
from a company could result in a multimillion-dollar lawsuit against you or, more
specifically, your example, the passwords of the email accounts with which
we share information.
General Objective
Specific Objectives
Raise awareness about the risks that organizations and computer users face.
they face in terms of information security
Adware. A program that automatically displays advertisements to the user during their
installation or use and thereby generates benefits for its creators. It becomes malware in the
moment when it starts to collect information about the computer it is on
(HACKER, 2018).
Backup. A copy of security that is made of the information, with the purpose of
recover the data in case the systems suffer damage or accidental loss of
stored data (HACKER, 2018).
DNS. From English Domain Name Service. It refers to both the Name Service
Domain, like the server that provides that service. Its most important function is to translate.
intelligible names for people in IP addresses (Internet Protocol) to locate and
directing the systems in a much simpler way (HACKER, 2018)...
Malware. From the English malicious software. It is a program aimed at causing damage.
or infiltrate without the consent of its owner into an information system. Virus,
worms, trojans, backdoors, and spyware (HACKER, 2018).
Phishing. The scam committed through remote means where the scammer tries
to obtain confidential and sensitive information such as passwords or data from legitimate users
banking or internet service (HACKER, 2018).
Ransomware. The cybercriminal takes control of the infected device and kidnaps the
encrypting information. In this way, he extorts the user with a monetary ransom in exchange.
to recover your data (HACKER, 2018).
Trojan. Malicious software that, when executed, does not show signs of harm.
operation in the systems. However, while the user performs routine tasks in their
computer, has the ability to open various communication channels with a team
remote malicious that will allow the attacker to control our system absolutely
(HACKER, 2018).
Virus. Malicious code that spreads or infects by inserting a copy of itself into
another program to become part of it. A virus cannot execute itself,
it requires that the hosting program be executed in order to perform its operations
(HACKER, 2018).
Computer security is the "discipline that is responsible for designing the rules, methods,
the form she chose and the access to the information contained therein, as well as its modification,
only be viable for individuals who are accredited and within the parameters of their
Computer stability instruments must defend the system against invasions and access.
stored and processed in a computer system", Based on this beginning, the instruments
stored and processed information in a computer system," Based on this beginning, the
in ideal activity conditions for users to access the data with the frequency and
commitment to the customer is to provide persistent service (Ramos & Hurtado, 2011).
Risk Factors
various and different mechanisms of computer stability. Their selection depends on the type
of the system, of its functionality and of the hazard components that threaten it (Postigo,
2020).
• Preventive: They act before an event occurs (to stop unwanted agents).
• Corrective actions: They take place after the event has occurred (to correct the consequences).
authorized individuals have the ability to access a certain machine. Companies use
a wide variety of technical tools to detect your authorized personnel. "The PCS
security guards have the possibility to carry out certain stability checks,
among others" (Postigo, 2020). In the functionality of the implemented security system, it will
Something that has: Key, smart card (encoded digital identification) through
a memory chip.
2. Something I know: Password, Identification number, Alphanumeric combination, or
personal history.
The advantages of biometric technology have the potential to remove the need
to have a card to enter. Although cost reductions have decreased the price
initial of the cards in recent years, the real benefit of eliminating them is based on the
reduction of the work related to its management. Using a biometric device the prices of
management is smaller, the maintenance of the reader is done, and one person takes care of
Digital Fingerprint Based on the premise that no two fingerprints are alike, this
The system has been 'used since the last century with excellent results' (Postigo, 2020).
Each fingerprint has small arches, angles, loops, swirls, etc. (Called
minutiae) properties and the relative position of all of them is what is examined to implant the
identification of a person. It is accepted that 2 people do not have more than 8 minutiae.
equivalents and each one has more than 30, which makes the procedure very reliable.
Passwords
Passwords are the most commonly used instruments to restrict access to systems.
computer scientists." However, they are only effective if chosen carefully, most of the
PC users choose passwords that are easy to guess: The name of their partner, the name of
a child or a pet, words related to jobs or hobbies or letters and numbers
followed by the keyboard (Senra, 2022).
An analysis found that the preferred passwords in the United Kingdom are Fred-God.
what was in America, Love-sexy. Hackers know and exploit such clichés, which is why
a cautious customer should not use them. Several security systems "do not allow that the
users use real words or names as passwords, thus avoiding that the
hackers manage to use dictionaries to guess them. Even the best password should
change periodically (Senra, 2022).
Many login passwords are easily obtained because they involve the name or
another familiar piece of information about the client and, moreover, this is never (or rarely) changed. In this situation the
"and it simplifies and involves any time of trial and error." Other times attacks are made
systematic (even with some PCs at the same time) through special programs and 'dictionaries'
that test millions of likely keys, in quite short times, until discovering the
adequate password (Senra, 2022).
Dictionaries are files with millions of words, which have the possibility of
are likely user passwords. This document is used to find that password
in brute force tests.
Do not use passwords that are words (even if they are foreign), or names (that of the...
client, fictional characters, family members, pets, brands,
metropolis, sites, or another related one.
Do not use entirely numeric passwords with any meaning (phone number, ID number, date
of origin, car registration, etc.
Do not use popular technical terminology.
Choose a password that mixes letters and alphanumeric numbers (uppercase and
lowercase) and numerical.
They must be long, 8 letters and numbers or more.
Having different passwords on different machines and different systems is feasible.
use a base password and certain logical variations of it for various
machines.
This allows that if a password from one system is compromised, all the other systems do not get compromised.
Perhaps one of the most advertised elements when it comes to establishing security is
these elements. Although they should be one of the systems that requires the most attention,
are far from being the final solution to security problems. Indeed, 'a firewall is a
Gateway with a blockage, these devices are only used by large corporations" (Sain, 2018).
Certain firewalls take advantage of this ability that all incoming information and
outgoing should go through them to provide extra stability services such as the
encryption of the network traffic. It is understood that if 2 Firewalls remain connected, both
they have to "dialogue" the same encryption-decryption process to establish the
communication (Sain, 2018).
Types of Firewall
Packet Filtering
Application Proxy-Gateways
Dual-Homed Host
Screened Host
Screened Subnet
Package Inspection
Personal Firewalls. These Firewalls are applications accessible to end users.
they yearn to connect to an insecure external network and keep their PC safe from attacks that
They can cause anything from a simple 'hang' or virus infection to the loss of all your
stored information (Sain, 2018).
They have the advantage of being economical, have a high level of performance and are
transparent for users connected to the network. However, it has weaknesses such as:
The Proxy, installed on the Bastion Node, acts as an intermediary between the buyer and the
real application server, being transparent to the two parts.
Once a customer wants a service, they do it through the Proxy. This one performs the
request to the real server returns the results to the buyer. Its functionality has been that of
examine the network traffic for content that violates its stability.
Graphically:
Dual-Homed Host. They are devices that "remain connected to both perimeters"
Packages), which is why it is proposed that they work with "IP Forwarding disabled" (Sain, 2018).
An internal user who wishes to make use of an external service must connect.
first to the Firewall, where the Proxy will handle your request, and based on the configuration
imposed on that Firewall, it will connect to the requested external service and will act as a bridge between
this and the internal user. That is, two connections are used.
One from the internal machine to the Firewall and the other from there to the machine that
Screened Host. In this case, the router is combined with the bastion host and the level
the security principle comes from the Bastion packet filtering, the only accessible system
from the outside, it makes application proxies, filters the considered blocking packets
vulnerable in the firewall, bastion nodes." To achieve this, the demilitarized zone (DMZ) is created.
so that without the access of an intruder to the equipment, one cannot fully access the subnet
protected. Multiple DMZ levels can be defined by adding multiple routers, but
emphasize that the rules for each level must be different, otherwise the level will be reduced to
Firewall restrictions
The most important part of the firewall's job is to allow or deny certain services.
specify a list of networks and addresses that are called trusted (approved). When
These users entering from the inside will be able to access some of the external services.
that have been defined (Sain, 2018).
•External users admitted from abroad: This is the most sensitive situation in
consulting services on the internal network for one reason or another." Generally, access
third parties are used to provide internal services to the network (Sain, 2018).
Benefits of a Firewall
Firewalls manage access between two networks, and if they did not exist, all computers
the network would be exposed to attacks from the outside. The Firewall is the ideal point to
monitor the security of the network and generate alarms for attack attempts, the administrator will be
Firewalls are also important from the perspective of carrying the statistics.
of the bandwidth (consumed) by the network traffic, and which processes have had the most influence on that
traffic, in this way the network administrator can restrict the use of these processes and
Limitations of a Firewall
The biggest limitation of a firewall is simply the holes it doesn't cover, which, already
Whether accidentally or not, they will be discovered by an intruder. Firewalls are not 'systems
he will simply let it pass. Even more dangerous is an intruder who crosses through the back door,
opening another hole and erasing evidence or signs of the original attack (Sain, 2018).
Another limitation is that firewalls are "non-human", which means that if an intruder
spread that information, the firewall will not notice. Firewalls "also do not provide
tools to prevent the filtering of software or files infected with viruses, although the
The machine hosting the firewall may be equipped with the appropriate antivirus software.
Finally, the firewall is vulnerable, it cannot protect people on the internal network.
Firewalls work better when they complement internal defenses (Sain, 2018).
Encryption
Encryption is a process of information or text that is encoded and not decrypted in some.
Formats. Unless the necessary data is explained, the result is difficult to determine.
Information can be interpreted back to its original state." Although there are methods of
irreversible encryption. The term encryption is a literal translation into English and does not exist in
Spanish, the most correct way to use the term is encryption (Tominaga, 2022).
Uses of Encryption
Some of the most common uses of encryption are storage and transmission of
Encryption Methods
they compose the document and create a unique number called MAC. The same document always
Secret or Symmetric Key Cryptography. They use 'document encryption and ignore
the keys of the document”. The entire document with a key must be disturbed during the process
inverse and use the same key. It is important to emphasize that the key must be transferred to the
Asymmetric Algorithms (RSA). They require two keys, a private one (unique and personal,
known only by its owner) and another public, both connected by a mathematical formula
complex that cannot be reproduced. The concept of public key cryptography was
introduced by Whitfield Diffie and Martin Hellman to solve the problem of the systems
traditional ones that distribute keys through insecure channels. The user generates the keys
public and private ones as necessary by entering your PIN code. (Tominaga, 2022).
what is important when working with documents in digital format, such as identity or
Information integrity: The integrity of the document is the protection against the
add a checksum value, and the receiver must perform the same
calculation in the received document and compare the calculated value with the sent value
by the sender.
Authenticity of the message origin: this security aspect protects the recipient.
from the document and ensures that the message is generated by an identified party
as the same sender in the document and cannot impersonate the system user
(Tominaga, 2022).
Encrypting data on a PDA. The importance of protecting our data from prying eyes.
PDAs are often used as small portable offices to store valuable data, and
protecting that data is very important. Many PDA users do not use protection with
password to initiate access, thinking that they can leave this confidential data in the hands
File Encryption
Windows XP Professional offers an alternative to protect this data and prevent it from
loss. The Encrypted File System (EFS) is responsible for encrypting files. These
files can only be read when the user who created them is 'logged in' to their
gain access to our machine will never be able to access our encrypted files, even if
Cipher assigned to a process with a different name. The aim of the cipher is to take
unencrypted data, called plaintext, and generate an encrypted version of it. There is
two types of encryption: stream cipher and block cipher (Tominaga, 2022).
Data stream encryption: when encrypting through data streams, encrypt simultaneously
a clear bit of text. The simplest example of a stream cipher is the combination of data
(one bit at a time) with another block of data, called padding. The transmission numbers are
perfect for real-time data such as voice and video (Tominaga, 2022).
Block ciphers: these operate on blocks somewhat larger than the plaintext.
they format and form an encrypted text block, generally the output block is of the same
Authentication
computers. Authentication is used to verify that the information comes from a source to
another. Basically, if the information is true, you know who created it and it has not been altered. The
the most common authentication. This information is entered when you turn on your
computer or open a program. Security file control to confirm
credit with tape with identity verification information. There are more
complexes, including the digital chips with this information (Tominaga, 2022).
the most well-known forms is DSS (Digital Signature Standard), which is based on encryption
of public key that uses DSA (Digital Signature Algorithm). The DSA algorithm
consists of a private key known only by the sender (signer) of the document
and a public key. If anything changes in the document after placing the signature
digital, changes the value with which the digital signature is compared, which invalidates the signature
(Tominaga, 2022).
Antivirus
"computer scientists." They were born in the eighties of the last century. A computer virus occupies a
user knowledge and functions to replicate itself, that is, it copies itself and infects
files, partitions or boot sectors on hard drives and floppy disks to expand as much as possible
Generally, the antivirus software has a component that loads into memory and stays there.
to verify all files that are opened, created, modified, and executed in real-time. For this
Basically, the antivirus software compares the code of each file with a database of
no new viruses are detected. Advanced features have also been added, such as searching the
computer science in search of viruses. There is a new AI-based technology called TruPrevent that
market.
scanning and monitoring speed, providing great possibilities to experts and simplicity to the
E - Quick in scanning/monitoring
A– Good update capability
D– Good ability to detect viruses
R– Good capacity for removal
S – Minimum resource consumption for the system
detect and eliminate hundreds of viruses and trojans. One of the most effective antivirus programs and
considered by many as the best virus detector. The program scans recursively
multiple formats of compressed files. It can even decrypt and search for EXE files
that protects against all types of viruses, Java applets, ActiveX controls, and all kinds of code
malicious open. Like most antivirus software, Norton AntiVirus protects you while
browse the Internet, recover information from floppy disks or CDs on your LAN and verify the files
a complete solution that will not only protect us from all known intruders, but also,
thanks to the new TruPrevent tool, it will protect us even from intruders (Díaz-Aparicio,
2020).
Backups
Even the most advanced security systems cannot guarantee protection against
complete data at 100%. A surge or drop in voltage can even erase the best data.
computers to prevent data loss during a power outage, the cheapest ones can be used
they protect the equipment from damage due to surges, which prevents costly repairs
can damage or destroy the data and hardware of the computer. Any security plan
Regular backups are the best and most used in mainframes and
data. With multiple backups, the loss of information is less significant. Therefore,
In general, backups are usually made on tape, but depending on the case, they can be
to be done on floppy disk, CD, DVD, Zip, Jaz or magneto-optical disk, USB flash drive, or it can be done on
part of the operating system. For this reason, backups are often used as the
last line of defense against data loss and, therefore, become the last
resource.
(Díaz-Aparicio, 2020). For companies, this capability can become very important.
including criticism. There are companies that disappear because they cannot return their systems to the country.
Despite the new and complex types of incidents that arise every day, still
There are security gaps that can be easily prevented with technology and in many
cases arise from a lack of awareness of the risks they represent. On the other hand, the
An effective action is needed to raise awareness, train, and disseminate best practices.
continuous process that requires knowledge of one's own experience. Organizations do not
You can see security as a process or product isolated from others. Security must be
part of the organization. The constant threats to systems, users, and companies must be
focus on the scope of vulnerabilities and the security tools they need to
face possible cyber attacks that can later cause large losses.
Attacks are more successful on the weakest and hardest to protect link, in this
case the people, which is one of the factors that contribute to the number of internal attacks.
improve-your-cybersecurity/100039
Information Security
Senra, J. M. V. (2022). Computer Security on the Internet and Social Networks (2nd edition).
Tominaga García, Y. (2022). The encryption systems of touching in the security of text files.