Cyber Presentation

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Contents

Introduction ................................................................................................................................ 2
Operating System & security ..................................................................................................... 2
Explain what is security design system of Operating System ................................................... 2
Explain the following terms: ...................................................................................................... 3
Some of the biggest threats to email security include: .............................................................. 4
Conclusion ................................................................................................................................. 4
Reference ................................................................................................................................... 5

1
Introduction

Protecting software is becoming more important for the future and, therefore, efficient
protection schemes are required. Ideally, these schemes should provide a strong protection
while keeping to a minimum the number of required modifications at the software layer (both
operating system and user applications), and in the hardware layer as well.

Operating System & security


Operating systems play a really important role in computer systems. When we talk about
computers, we often refer to the operating system when naming a device; for example, a
Windows machine or an iOS device.
Operating systems play a critical role when it comes to protecting and securing resources
present in our computer systems.
When we are looking at the arrangement of a computer system, we first start at the level of
hardware. At this layer, we have the CPU, physical memory, and other I/O devices.
At a high conceptual level, they have defined three big security-related goals that are
common to many systems, including operating systems. They are:
• Confidentiality – If some piece of information is supposed to be hidden from others, don’t
allow them to find it out. For example, you don’t want someone to learn what your credit
card number is you want that number kept confidential.
• Integrity – If some piece of information or component of a system is supposed to be in a
particular state, don’t allow an adversary to change it.

• Availability – If some information or service is supposed to be avail-able for your own or


others’ use, make sure an attacker cannot pre-vent its use.

Explain what is security design system of Operating System


Security by design is an approach to software and hardware development that seeks to make
systems as free of vulnerabilities and impervious to attack as possible through such measures
as continuous testing, authentication safeguards and adherence to best programming
practices.

2
An emphasis on building security into products counters the all-too-common tendency for
security to be an afterthought in development. Addressing existing vulnerabilities and
patching security holes as they are found can be a hit-and-miss process and will never be as
effective as designing systems to be as secure as possible from the start.

Explain the following terms:


A) Network security: Network security is a broad term that covers a multitude of
technologies, devices and processes. In its simplest term, it is a set of rules and
configurations designed to protect the integrity, confidentiality and accessibility of
computer networks and data using both software and hardware technologies. Every
organization, regardless of size, industry or infrastructure, requires a degree of
network security solutions in place to protect it from the ever-growing landscape of
cyber threats in the wild today.
B) Firewall: Firewalls are services or devices that act as guards responsible for deciding
which web page, pop up, and other services enter and exit a network. These firewalls
use a predefined set of rules that assist in blocking or allowing traffic, depending on
the requirements. Firewalls can be for software, hardware, or both, depending on the
needs of the system.
C) Cryptography in network security: Cryptography is an automated mathematical
tool that plays a vital role in network security. It assures the confidentiality and
integrity of data as well as provides authentication and non-repudiation to the users.
D) Network management: Network management refers to the processes, tools, and
applications used to administer, operate, and maintain network infrastructure.
Performance management and fault analysis are also included in network
management. To put it simply, network management is the process of keeping your
network healthy, which keeps your business healthy.
E) Email security: refers to the steps where we protect the email messages and the
information that they contain from unauthorized access, and damage. It involves
ensuring the confidentiality, integrity, and availability of email messages, as well as
safeguarding against phishing attacks, spam, viruses, and another form of malware.
It can be achieved through a combination of technical and non-technical measures.

3
Some of the biggest threats to email security include:

Phishing

Phishing attacks are the most well-known and common threats to email security. Phishing
attacks began with attacks like the Nigerian Prince scams, which were known for their poor
grammar and unbelievable pretexts. Over time, these attacks have become more sophisticated
with attackers sending much more polished emails with more plausible pretexts.

The modern phishing attack can be general or targeted. These targeted attacks, also called spear
phishing attacks, are highly researched and designed to trick a particular person or group.

Malware

Email is an ideal delivery mechanism for malware. Malware can be attached directly to an
email or embedded in documents that are shared as attachments or via cloud-based storage.
And once installed on a computer, malware may steal sensitive information or encrypt a user’s
files.

Data Loss

Email accounts have access to a great deal of sensitive information. In addition to the data sent
directly over email, these accounts are also used to access cloud-based infrastructure and other
online services.

An attacker with access to these email accounts can gain access to all of this sensitive
information, making email account credentials a common target of attack. Additionally, this
information can be leaked unintentionally by employees who accidentally include an
unauthorized party on an email chain or fall for a phishing attack.

Conclusion
In conclusion Operating systems play a critical role when it comes to protecting and securing
resources present in our computer systems. Email accounts have access to a great deal of
sensitive information. In addition to the data sent directly over email, these accounts are also
used to access cloud-based infrastructure and other online services.

4
Reference

Bruce S. l. (2000). A good high-level perspective of the challenges of computer security,


developed at book length. Intended for an audience of moderately technically sophisticated
readers, and well regarded in the security community
Mark Dowd, J. (2007). A long, comprehensive treatment of how to determine if your
software system meets its security goals. It also contains useful advice on avoiding security
problems in coding.

Smith, J. L. (2002). Design of Lucifer, a Cryptographic Device for Data Communications.


IBM Thomas J. Watson Research Canter.

You might also like