Professional Documents
Culture Documents
Protection of Information
The level of security practices required for various information types depends on who has created the information, who
is maintaining the information, the nature of the information itself, and whether there are specific laws or requirements
or guidelines associated with the use and distribution of the information.
Organization Information
An Organization has many types of official information including staff records, financial records, personnel records, and
other business records.
Individual Information
Individual information includes academic, research, personal and business correspondence, and other records created
and managed by individual staff. As creators and managers of this information, individuals are responsible for securing
and protecting their information.
Password Security
Users are responsible for the security of computer systems passwords, personal account passwords (e.g. Net-ID
passwords) and personal identification numbers (PINs) and will be held accountable for any activities linked to their
accounts. Users must follow established university standards for maintaining and managing passwords.
Route cipher
In a route cipher, the plaintext is first written out in a grid of given dimensions, then
read off in a pattern given in the key. For example, using the same plaintext that we
used for rail fence:
W R I O R F E O E
E E S V E L A N J
A D C E D E T C X
The key might specify "spiral inwards, clockwise, starting from the top right". That would give a cipher text of:
EJXCTEDECDAEWRIORFEONALEVSE
Route ciphers have many more keys than a rail fence. In fact, for messages of reasonable length, the number of possible
keys is potentially too great to be enumerated even by modern machinery. However, not all keys are equally good. Badly
chosen routes will leave excessive chunks of plaintext, or text simply reversed, and this will give cryptanalysts a clue as
to the routes.
An interesting variation of the route cipher was the Union Route Cipher, used by Union forces during the American Civil
War. This worked much like an ordinary route cipher, but transposed whole words instead of individual letters. Because
this would leave certain highly sensitive words exposed, such words would first be concealed by code. The cipher clerk
may also add entire null words, which were often chosen to make the cipher text humorous
Virus
A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving
infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying
effects while others can damage your hardware, software or files.
Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually
cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be
spread without a human action, (such as running an infected program) to keep it going.
People continue the spread of a computer virus, mostly unknowingly, by sharing infecting files or sending e-mails with
viruses as attachments in the e-mail.
Worm
A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to
computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or
information transport features on your system, which is what allows it to travel unaided.
The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending
out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One
example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm
replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on
down the line.
Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the
worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and
individual computers to stop responding. In recent worm attacks such as the much-talked-about Blaster Worm, the
worm has been designed to tunnel into your system and allow malicious users to control your computer remotely.
Trojan horse
A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first
glance will appear to be useful software but will actually do damage once installed or run on your computer. Those on
the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate
software or files from a legitimate source. When a Trojan is activated on your computer, the results can vary. Some
Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons)
or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to
create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or
personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files
nor do they self-replicate
Trojan horse-It is a program, using this program it will make the victim system to make listen on particular port, so that
attacker can do anything on your system, i.e. he can tamper the data, theft the data, destroy the data etc...., trojan
horse wont spread in to the system like a virus so it will not affect the system performance.
Virus - It is a malicious program, using this program it will damage your system, by injecting the virus in to another
programs are files, so that it will degrade your system performance. Virus will come to the system with user interaction
only.
worm-It is also one type of virus, using this program it will damage your system like virus, not only system it will spread's
throughout the network and checks for honey pot of your os, and entering to the os, it will degrade your system
performance and also it will eat your network bandwidth also.
Virus - Technically, a virus infects another file (attaches or inserts itself into it). They usually infect program files or MS
Office documents. From there, it can replicate, do damage, etc. Unlike a worm, these do not function as a standalone
(except possibly to infect a given file).
Worm - This is almost identical to a "true virus", except that it lives on its own and generally doesn't infect other files
(although it can replace them). Usually, these copy themselves using e-mail, networks, disks, etc. Again, these are very
close to a true virus, and can do the same kind of damage.
Trojan Horse - This type of program doesn't copy itself but does do damage to your computer. These types of programs
rely on people to pass them around and to run them. They do not e-mail themselves. The idea is to make the program
look like it's something harmless, like a screen saver or joke, so it gets sent around.
The most common blunder people make when the topic of a computer virus arises is to refer to a worm or Trojan horse
as a virus. While the words Trojan, worm and virus are often used interchangeably, they are not the same. Viruses,
worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences
among the three, and knowing those differences can help you to better protect your computer from their often
damaging effects.
A computer virus attaches itself to a program or file so it can spread from one computer to another, leaving infections as
it travels. Much like human viruses, computer viruses can range in severity: Some viruses cause only mildly annoying
effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file,
which means the virus may exist on your computer but it cannot infect your computer unless you run or open the
malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an
infected program) to keep it going. People continue the spread of a computer virus, mostly unknowingly, by sharing
infecting files or sending e-mails with viruses as attachments in the e-mail.
A worm is similar to a virus by its design, and is considered to be a sub-class of a virus. Worms spread from computer to
computer, but unlike a virus, it has the capability to travel without any help from a person. A worm takes advantage of
file or information transport features on your system, which allows it to travel unaided. The biggest danger with a worm
is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send
out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to
send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to
everyone listed in each of the receiver's address book, and the manifest continues on down the line. Due to the copying
nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too
much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop
responding. In more recent worm attacks such as the much-talked-about .Blaster Worm., the worm has been designed
to tunnel into your system and allow malicious users to control your computer remotely.
A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first
glance will appear to be useful software but will actually do damage once installed or run on your computer. Those on
the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate
software or files from a legitimate source. When a Trojan is activated on your computer, the results can vary. Some
Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons)
or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to
create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or
personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files
nor do they self-replicate.
Protocol Failures:
It means that “Changing the Set of Rules/Functionality of Layers”. Going to the lower level programming & changing the
Set of Rules/Functionality of Layers so it might leak the Information or Corrupt the data.
* All members of management must agree to the policies and understand the need to properly prove their identities
when making requests for passwords, etc.
* The policies must be disseminated to all users of the network, with education and training provided as to why
compliance is essential.
* There should be explicitly defined consequences for violating the policies.
Your security policies should be specific and should address such issues as:
* Strong password policies: minimum length, complexity requirements, requirements to change passwords at
specified intervals, prohibition on dictionary words, easily guessed numbers such as birthdates and social security
numbers, etc., prohibitions on writing down passwords.
* Prohibitions against disclosing passwords, to whom (if anyone) passwords can be disclosed and under what
circumstances, procedure to follow if someone requests disclosure of passwords.
* Requirement that users log off or use password protected screensavers when away from the computer, cautionary
instructions on ensuring that no one is watching when you type in logon information, etc.
* Physical security measures to prevent visitors and outside contractors from accessing systems to place key loggers,
etc.
* Procedure for verifying identity of users to IT department and IT personnel to users (secret PINs, callback
procedures, etc.).
* Policies governing destruction (shredding, incineration, etc.) of paperwork, disks and other media that hold
information a hacker could use to breach security.
To prevent social engineers from succeeding in gaining the information they need to do their dirty work on your
network, and to help detect when a possible social engineering attempt is occurring, the following steps should be
taken:
Sniffing is the use of a network interface to receive data not intended for the machine in which the interface resides. A
variety of types of machines need to have this capability. A token-ring bridge, for example, typically has two network
interfaces that normally receive all packets traveling on the media on one interface and retransmit some, but not all, of
these packets on the other interface. Another example of a device that incorporates sniffing is one typically marketed as
a “network analyzer.” A network analyzer helps network administrators diagnose a variety of obscure problems that
may not be visible on any one particular host. These problems can involve unusual interactions between more than just
one or two machines and sometimes involve a variety of protocols interacting in strange ways.
Sniffing Passwords
Perhaps the most common loss of computer privacy is the loss of passwords. Typical users type a password at least once
a day. Data is often thought of as secure because access to it requires a password. Users usually are very careful about
guarding their password by not sharing it with anyone and not writing it down anywhere.
Passwords are used not only to authenticate users for access to the files they keep in their private accounts but other
passwords are often employed within multilevel secure database systems. When the user types any of these passwords,
the system does not echo them to the computer screen to ensure that no one will see them. After jealously guarding
these passwords and having the computer system reinforce the notion that they are private, a setup that sends each
character in a password across the network is extremely easy for any Ethernet sniffer to see. End users do not realize
just how easily these passwords can be found by someone using a simple and common piece of software.
When you share a copy of an infected file with other computer users, running the file may also infect their computers;
and files from those computers may spread the infection to yet more computers.
If your computer is infected with a boot sector virus, the virus tries to write copies of itself to the system areas of floppy
disks and hard disks. Then the infected floppy disks may infect other computers that boot from them, and the virus copy
on the hard disk will try to infect still more floppies.
Some viruses, known as 'multipartite' viruses, can spread both by infecting files and by infecting the boot areas of floppy
disks.
Computer worms which spread through vulnerabilities in network services can best be protected against by keeping up-
to-date in installing patches provided by operating system and application vendors. This includes worms like SQL
Slammer and Blaster.
Computer worms which spread like trojan horses can best be defended against by not opening attachments in your e-
mail. These infected attachments are not limited to .EXE files. Microsoft Word and Excel files can contain macros which
spread infection.
Computer viruses are often spread by attachments in e-mail messages or instant messaging messages. That is why it is
essential that you never open e-mail attachments unless you know who it's from and you are expecting it.
Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files.
Computer viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or
programs you might download.
Worms can replicate in great volume. For example, a worm can send out copies of itself to every contact in your e-mail
address book, and then it can send itself to all of the contacts your contact's e-mail address books.