Computer Systems Security: Risks, Cryptography, and Analysis

Verified

Added on  2020/11/12

|26
|6627
|321
Report
AI Summary
This report provides a comprehensive overview of computer systems security, delving into various aspects such as common risks, including data leakage, unsecured Wi-Fi, network spoofing, spyware, and broken cryptography. It explores the impact of these risks on everyday users and the importance of risk management analysis. The report further discusses cryptography and encryption techniques, including private and public key cryptography, with practical applications. A significant portion of the report is dedicated to creating a risk chart, complete with a probability assessment and a detailed mitigation plan based on primary data. The report concludes with a summary of findings and a reference section for further study. The analysis aims to provide a clear understanding of the security landscape and offer actionable insights for individuals and organizations to protect their data and systems from potential threats.
Document Page
Computer Systems Security
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
INTRODUCTION...........................................................................................................................1
Literature review..............................................................................................................................1
Common risks..................................................................................................................................3
Impact on normal man.....................................................................................................................4
Importance of Risk Management Analysis......................................................................................5
Cryptography and encryption..........................................................................................................5
Different app of cryptography and encryption.................................................................................6
An App for Normal Man /Screenshot of Applications................................................................8
Create Risk chart with probability and mitigation plan with the help of primary data.............10
CONCLUSION..............................................................................................................................20
REFERENCE.................................................................................................................................21
Appendix .......................................................................................................................................23
Document Page
INTRODUCTION
Today in the emerging world of innovation, everything is done with help of technology.
Every person regardless of age are come in influence of technical device in terms of products
they purchase. With the emergence of online services, people can easily sell or purchase products
of national and international companies. Similarly, in the field of communication, technology has
developed so far. It makes life of people more easy by which they can make transform
information and convey messages in faster manner.
Computer system is a device that can be instructed to carry out operations automatically
through computer programming (Hsiao, Kerr and Madnick, 2014). Modern computers have at
least one processing element. It allows users to store large amount of data for longer period more
safely. Such type of technology is flexible also because it can process any task by loading a
programme more accessibly. With development of technology, computer systems are becoming
more innovative. It includes a wide range of "smart" devices, such as televisions, smart phones
and tiny devices. Mobile phones not only include Internet and or private data networks, but also
other wireless too. It involves Hot-Spot, Blue-tooth, Wi-Fi and so on. But all these internet and
wireless network impact on security of data. It creates various security issues like data leakage,
broken cryptography, hacking and more.
Literature review
Today digital technology has become a necessary part of everyone's life. It makes work
of people more easy and even faster too. In addition to this, technologies like information
security is generally need in terms of- Confidentiality; Integrity and Availability. Here
confidentiality can be defined as process to control who will get access to read a particular
information. While integrity reflects assurance that any data will change only in authorised and
specified manner. Similarly, availability makes sure that authorised users can get continued
access for reading and using information. According to opinion of Kim and Solomon (2016) it
has examined that for national defence system, government concern on ensuring to get
confidentiality of private information. While common people are concerned more on funds
transfer system which require strong integrity controls. Therefore, requirement for security
system will vary with different-different purposes. Some major issues related to information
technology are mentioned as below:-
1
Document Page
ï‚· Technical Issues of IT Security: IT system has become a backbone of every
organisation without which they cannot operate their business in desired manner. It
serves various benefits for stabilizing the working environment. Therefore, this kind of
technology also known as vulnerable systems which pose various risk to companies,
individuals as well as all types of modern infrastructure. From a technical point of view,
there are various types of risks includes within computer or IT systems that are- protocol
proxy systems, risks to firewalls, micro fraud schemes, weaknesses of intrusion detection
systems, botnet-developments and more.
ï‚· Individual Victimization and Damages: With development of technologies and rapid
use of internet services for personal and professional purpose, cybercrime issues have
occurred at fast rate. To overcome from this issue organizations and knowledgeable
people install various crime alert system within their device (Liao and et. al., 2013). But
in context with ordinary people, they are not much aware that they can become victims of
computer crime. Even if when individual are victimized then they do not make reports to
regulatory bodies too. Due to an-awareness about whom to report or get fear of the same.
Therefore, this section involves risk like extent of victimization by cyber crime,
fraudulent activities etc.
ï‚· Future Developments: Botnets and phishing scams which are considered as fraudulent
attempts to get sensitive information like usernames, passwords, details of credit card etc.
are some well-known threats which affect cyber security for future development as well.
Along with this, other threats or security issues for the same are dangers to supply chains
and critical infrastructure, cyber terrorism, online transfer and more.
ï‚· Cultural, Sociological, Political Implications and Control Issues: This phenomena of
cybercrime reflects some major aspects of security implications. It includes usage of
Internet in disguise manner like malware, hacking of security measures and so on. When
internet and social media are used inappropriate manner then it leads to cause
possibilities of various illegal and criminal activities (Levy, 2014). Therefore, societies
are must aware of such fraudulent activities which may cause various issues.
Furthermore, for a successful fight against such cyber crime and their repercussions, it is
necessary for people to aware about phenomena, extent as well as possible future threats.
In this regard, with support of IT department, people can take necessary actions against
2
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
computer or cyber crime. It includes technical instruments, national and international
legal techniques and more, which helps in fight against such criminal activities.
Common risks
With development of technology, mobile phones have become more advance. It includes
a wide application of internet services, high-digital pixels, sharp features and more. But as far as
internet services developed in mobile phones, threats agents also rise. A threat in this regard, can
be defined as a newly discovered incident which has potential to create harm to mobile system.
In general, intentional threats in computer system and smart phones include malware, adware
and spyware. Along with this, viruses and worms are also considered as threats as also they have
potential to harm system and functions (Computer Networking Issues, 2018). All these agents
create various issues as mentioned below:-
(a) Data Leakage
It refers to unintentional data leakage in which an application takes your personal data
from your mobile when you sign in. The main reason for data leakage is all risk ware
applications that takes sweeping permissions from users. To prevent yourself from these
technical hazards don't give access of your personal data to applications until they insist you to
do that. It is illegal and unlawful transfer of information from computer to outside world. There
are many types of data leakage and this problem can be attack through externally and internally.
There is a need to implement protective regulatory measures in all areas to prevent data leakage.
(b) Unsecured Wi-Fi
All free wireless networks are mostly unsecured because technology experts can easily
hack you to get your personal data. To be safe from this security issue don't give access to your
personal information like bank account information while using wireless networks.
(c) Network Spoofing
It is a type of threat in which hackers establish fake Wi-Fi access points in public
locations like airports, coffee shops and shopping malls and force users to make accounts to take
their secure information. So to prevent public from this threat, they have provided with unique
passwords which helps in reading messages by authorisers only.
(d) Spyware
3
Document Page
Spyware is generally installed by spouses, employers, team members to keep detailed
record of whereabouts and use patterns. To be safe from this threat use an appropriate antivirus
to prohibits these programmes in accessing personal data.
(e) Broken Cryptography
This threat occurs when a developer uses weak algorithms or strong algorithms in its
encryption process without proper implementation (Mendenhall, Sincich and Boudreau, 2016).
Through this any hacker can crack and get passwords of user to gain access.
So these possible threats are considered as technical hazards for mobile users which can
easily harm mobile performance of a user and can get access to their personal information.
Impact on normal man
With rapid development of technology, innovation in products and services are done in
regular manner. It gives various opportunities to human beings in doing their daily routine works
more easily. It includes computers, mobile phones, vehicles, internet applications and more.
Among these smart phones, tablets, internet applications and other communication devices are
considered as best technologies which connects whole world. A person whether belongs to
metropolitan or a remote area cannot imagine their life without such device. It enables them to
make interaction with rest of the world, get knowledge about news, access to internet services
via 3G/4G or Wi-Fi and conduct various activities of every aspect of their lives. Some other
benefits are e-mail, web browsing, maps and navigation, net-surfing, net-banking for managing
our bank accounts and making payments, etc. Phones are also give opportunity to address books
and contact lists, take photographs, videos, make diaries, notes and so on. Further, usage of
mobile or smart phones is classified as per ordinary and business purpose. For example: A
normal person use such devices to make phone or video calls, internet surfing, playing games
online shopping, making order for pizza etc. While people belong to organisation use smart
phones for business purpose i.e. online meetings, paying tax bill, and more. Thus, to do business
operations, companies use specific code and software which help in preventing data and
information from criminal or illegal activities. But in case of ordinary people using net banking,
e-payment, internet access, involve their personal data which may be of use to those with
criminal intent. It has observed that mostly users or common people do not aware about criminal
activities and how to protect their personal data from illegal access.
4
Document Page
Importance of Risk Management Analysis
One of the most crucial security challenges that people and organisations are facing today
is the carrier networks which leak data and personal information. This would give advantage to
terrorist organizations, hackers and other criminals to exploit them in large manner. To overcome
from security issue like cyber crimes activities, data leakage, piracy hacking and so on it is
important to provide privacy and legal securities to society. With help of this they can protect
their privacy. Various laws have been made for unreasonable search engines. Government are
balancing need for safety of public against need to maintain American values of justice and
freedom. There has to be a climate where proper security concern leads to increase in cost of
performing business (Kizza, 2013).
Constitutional rights those are related to individuals and companies government agencies
have to examine and expanding their powers in protecting societies. Establishment of well
developed security environment is very important and proper steps are required to quantify and
identified. Similarly, development of legal or ethical policies has to be made. There has to be
effective examination of policies or procedures so that organisation can protect their valuable
property by not violating laws of civil rights. There has to be a sense of security safety in order to
hamper terrorist events. To secure and prevent cybercrimes people need to be careful and use
well measure securities. Governments must have to implement proper safety measure to avoid
any kind of unethical activities. On large organisations and enterprises where business is
connected on their computers, one problem affects everyone on network. Despite having profit
of using networks there are many securities issues which includes loss of data, security breaches
and malicious attacks and hacking or viruses issues. It is important to take measures and
implement suitable measures to decrease network vulnerability to unauthorized damage.
Cryptography and encryption
It is a process of transforming a normal text into a dense text and vice-versa. It is a
technology that is used to eradicate theft or alteration of a particular text which is readable to a
particular person for whom it is intended. It is introduced to solve all social security related
issues which are growing rapidly in technological environment (Ahmed and Hossain, 2014). It is
important for IT firm to use cryptography approaches to solve breaches and attacks arises in
technology.
Types of Cryptography
5
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
(a) Private key Cryptography
It is also known as same key cryptography in which a same key is applied to encrypt a
cryptography text from both receiver and the sender. In this receiver and sender knows a secret
key for encrypting a plain text that's why it is known as private key cryptography.
(b) Public key Cryptography
It is also known as different key cryptography in which receiver and a sender uses a
different key to encrypt a plain text and vice versa. In this a sender has a key for encryption and
receiver has a key for decrypting a received text.
(c) Hash Cryptography
In hash cryptography key is not play a crucial role but the text is incorporated by both
parties through hash. In this sender uses a hash function on a plain text to encrypt and receiver
also do the same to decrypt a text.
Various Approaches of Cryptography
(a) Trusted Third Party Cryptography
It is also known as trusted cryptography approach. In this an administrator hires third
party for security issues related to the network. In this third party can send or receive messages
freely without thinking of security issues (Comer, 2018). All communications in this approach is
undertaken by a third party and it is also responsible for authenticity related issues.
(b) Peer to Peer cryptography
In this an administrator never uses third party to undertake security related issues unless
their main focus is on cryptography algorithms. There are two stages in this approach, in first
stage stations exchange keys and in second stage sending and receiving of encrypted messages
take place. This approach helps in securing communication happens between two work stations.
Different app of cryptography and encryption
(a) Secure Connection
Cryptography helps in building secure connection between sender and a receiver while
encrypting and decrypting a plain into crypto text. It is mainly used when an administrator is
communicating with a client program and a server. In order to make mobile system and internet
more secure, now, all communication protocols have included an application of encryption. In
this regard, best example is web encryption, because here users can select an encrypted version
of a website (Sun and et. al., 2014). For this purpose, they can switch latest versions like HTTP
6
Document Page
or HTTPS in URL. Mostly communication or mobile manufacturing companies use the
encrypted form as per default where they see any type of visit to Google, Microsoft Office 365,
Facebook and other websites. Now, installing HTTPS versions in recent browsers, users can get
extra information like a padlock. For this purpose, for net surfing or before entering a password,
users are required to ensure about HTTPS version in their mobile phones.
(b) End to end encryption
It is an application of cryptography that is used to secure email conversation between
encrypting and decrypting parties. It also helps in building truly secure systems between a sender
and a receiver. In general, e-mail is considered as single area where any kind of encryption is not
used in wide manner. The reason behind this is that when information by email application
moves from one server to another then it is encrypted automatically. But on mail server,
authorised administrators can read it. Therefore, there are other options available for
implementing end-to-end encryption. For secure messaging systems, now many applications are
launched where only sender and receiver have access to read messages of each other. It includes
Whatspp, Skype and more, where encryption has already been built.
(c) Storing Data
Today every person stores personal data in a mobile phone for storage and keeps in
memory. So, this application of cryptography helps people to secure their personal information
in their mobile phones more securely (Savulescu, 2014). It will help an administrator to eradicate
breaches arises in storing personal data. Furthermore, one of the most important beneficial parts
of cryptography is storing passwords more securely. Sometimes, it seems to very risky for users
to store passwords in device in an accessible or confidential manner. If they stored password in
text-form in their system than under security issues it seems to be legitimate or malicious.
Hackers can read password intentionally. In this regard, encryption helps in storing passwords
more securely. They will allow to store encrypted password as well as can decrypt also.
(d) Confidentiality
It is an application of cryptography that ensures that a data should not be disclosed to
unauthorised people. The confidential data can only be readable by authorised person who have a
permission to read the data.
7
Document Page
An App for Normal Man /Screenshot of Applications
8
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
9
Document Page
Create Risk chart with probability and mitigation plan with the help of primary data
Every technology provides various benefits to individuals in making their functions more
effectively. But covers various risks also which create insecurity and hack personal data of an
individual. In context with mobile applications and smart phones, it is essential for people to use
it in proper manner. Users are needed to manage personal information in confidential manner
because any kind of irresponsibility give chance to attackers to hack data.
Types of risks Risk probability How to remove Percentage of risk
Maximum- 5
Minimum- 2
Data leakage It is considered as real
time problem which
arise when unauthorised
or various applications
are installed in Smart
phones. When any
application is installed
then it asks permission
to use data but users
generally ignore it. Thus,
it leads to create
malware in system
which leaks personal
information. Along with
this, to run applications,
it requires to install by
personal id which
creates threats to user
data like banking
information, business
information etc. to
hackers who can use it
Antivirus is a
computer program
which is also
known as anti-
malware system.
It is used to
detect, prevent
and remove
malware or
viruses from smart
phones or
computer system.
Thus, in order to
protect personal
data and
information from
theft, it is essential
for users to install
anti-virus system
in mobile phones
and computer
5
10
chevron_up_icon
1 out of 26
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]