Chapter 7
Chapter 7
Chapter 7
College of Computing
Department of computer Science
Administering security
Chapter 7
Computer Security
Binyam Tekalign
[email protected]
Outline
• Security planning
• Risk analysis
• Security policies
• Cyber security
• Ethics
1. Security planning
• Involves developing comprehensive strategies and actions to protect an
organization’s information assets against threats
• Key Elements:
• Asset Identification: Cataloging all information assets that need protection, including data,
hardware, and software.
• Threat Assessment: Identifying potential threats to these assets, from cyber threats like
hacking and malware to physical threats such as theft or natural disasters.
• Vulnerability Analysis: Determining weaknesses in the organization's infrastructure that
could be exploited by threats.
1. Security planning
• Security Strategy Development:
• Creating a security strategy that addresses identified risks and aligns with
organizational objectives and compliance requirements.
• Implementation Plan:
• Outlining steps, timelines, and responsibilities for deploying security measures and
technologies.
• Regularly reviewing and updating the security plan to adapt to new threats and
changes in the organization.
2. Risk Analysis
• Risk analysis is the process of identifying, assessing, and evaluating potential risks to an
organization’s assets to determine the appropriate ways to mitigate them.
• Outcome:
• Produce a risk assessment report that ranks risks based on their severity and likelihood.
prohibited,
• Help to ensure that all personnel understand their roles and responsibilities in
• Outlines the legal and regulatory standards the organization must comply with.
3. Security Policies
• Development and Implementation:
• Involvement of Stakeholders: Engaging various stakeholders in the policy creation process to
ensure coverage of all critical areas and buy-in from the start.
• Clarity and Simplicity: Writing policies in clear, understandable language.
• Regular Reviews and Updates: Policies should be reviewed and updated regularly to adapt to new
security challenges and regulatory changes.
• Training helps to reinforce the importance of compliance and the implications of security breaches.
4. Cyber Security
• Refers to the practice of protecting systems, networks, and programs from digital attacks.
• As our dependency on digital systems grows, the potential risks and impacts of cyber
attacks increase.
• Effective cyber security measures are crucial for protecting data integrity, securing
information and assets, and ensuring continuity of operations.
4. Cyber Security
• Key Cyber Security Challenges:
• Cyber threats are constantly changing, requiring adaptive and dynamic security
strategies.
• Importance of Ethics:
• Ethical behavior is crucial in maintaining trust between organizations and the public,
• It protect privacy, and ensure the reliability and integrity of systems and data.
5. Ethics in Security
• Ethics helps to:
• Building Trust: Ethical practices in security help build and maintain trust between
used responsibly, respecting individuals' privacy rights, and complying with laws
• Accountability: Hold individuals and organizations accountable for their actions that
frameworks internationally.
• Monitor and Audit: Regularly audit and assess how ethical policies are being
• Preservation: Isolating, securing, and preserving the data to ensure that it is not altered,
deleted, or damaged.
• Analysis: Examining the collected data to draw conclusions based on the evidence found.
• Documentation: Keeping detailed and accurate records of all investigative processes and
findings to ensure the integrity and reproducibility of the investigation.
• EnCase, FTK, and Autopsy, are used to perform comprehensive searches of hard
drives, recover deleted emails and files, and create timelines of computer usage.
• Cellebrite and Oxygen Forensic Suite are used to retrieve data from mobile devices,
including call histories, text messages, emails, and photos.
• Wireshark and Network Miner that analyze network traffic and logs to identify
unauthorized access or anomalies.
7. Hackers
• A hacker is an individual who uses their technical knowledge and skills to
gain unauthorized access to systems, networks, or data.
• Hackers can exploit weakness for various purposes, ranging from kind to
malicious.
Types of Hackers
• White Hat Hackers:
• Definition: Ethical hackers who use their skills to improve security by finding and
fixing weakness in the system.
• Motivation: Typically work with organizations to strengthen defenses and prevent
breaches.
• Tools: Penetration testing tools like Nmap, Wireshark, Metasploit.
Types of Hackers
• Black Hat Hackers:
• Definition: Malicious hackers who exploit weakness of the system for personal gain,
• such as stealing data or causing disruptions.