Computer Security: Threats, Standards, and Protection

What is Security?

Achieving a completely secure computer system is challenging. Reliability is key, focusing on building reliable rather than simply secure systems. A secure system hinges on three core aspects:

  • Confidentiality: Preventing unauthorized access to system objects and ensuring authorized entities do not leak information.
  • Integrity: Allowing only authorized modifications to objects in a controlled manner.
  • Availability: Maintaining accessibility of system objects for authorized users.

Logical Threats

Logical threats include programs designed to harm systems (malware) or unintentional errors (bugs).

  • Faulty Software: Programming errors (bugs) are common. Exploits are programs designed to leverage these vulnerabilities.
  • Security Tools: These tools can be used to identify and fix bugs, but can also be exploited by attackers.
  • Backdoors: Shortcuts inserted by programmers during development to expedite debugging. These can be exploited by attackers.
  • Logic Bombs: Dormant code activated to perform malicious actions.
  • Viruses: Code inserted into executable files (hosts) that replicates itself by infecting other programs. Examples include worms, Trojan horses, and rabbit programs (bacteria).

Cobit Standards

Cobit standards offer key objectives:

  • Guidance for management in risk and control decisions.
  • Support for technology users in ensuring security and control over purchased products and services.
  • A tool for evaluating internal controls, management controls, and minimum control requirements for cost-benefit balance.
  • Ensuring secure and proper information use through standardized application.

Physical Security

Physical security measures include:

  • Secure server location, air conditioning, electrical systems, and trained IT staff.
  • Restricted access through gates or magnetic badge entry systems.
  • Portable CO2 extinguishers for electrical equipment, readily accessible to staff.
  • Battery-powered emergency lights for evacuation.
  • Independent air conditioning for server rooms.
  • Proper magnetic media storage (10-32°C, 10-80% relative humidity, dust-free).
  • Uninterruptible Power Supply (UPS) to prevent power fluctuations.
  • Modern building design with designated computer zones, offices, and common areas.
  • Dust-free flooring materials (terrazzo, marble, PVC).
  • Outward-opening doors (1.40-1.60m wide, minimum 2.15m high).
  • Optimal temperature between 20-24°C.

Protection Systems

Uninterruptible Power Supply (UPS) systems maintain power during outages, filter signals, stabilize voltage, and eliminate interference. A UPS consists of:

  • Converter/Inverter (AC to DC and back)
  • Battery (stores energy)
  • Status Indicators (LEDs)
  • Control and Monitoring Software

Common UPS types include offline, line-interactive, and online.

Data Security: Hard Drives

RAID (Redundant Array of Independent Disks) interconnects multiple hard drives for data recovery.

Hardware RAID using a RAID controller and SCSI adapter is the fastest implementation.

RAID Levels

  • RAID 0: Large partitions, high I/O, data loss if one drive fails.
  • RAID 1: Two disks mirroring data (simultaneous storage).
  • RAID 2: Similar to RAID 0 with redundant bits and byte-level segmentation.
  • RAID 3: Minimum three drives (two data, one parity).
  • RAID 4: Similar to RAID 3 with error correction, suitable for data servers.
  • RAID 5: Rotating parity, best for multi-user systems.

Additional RAID Levels

  • RAID 10: Combination of RAID 0 and 1.
  • RAID 30: Two RAID 3 arrays.
  • RAID 50: High data transfer and reliability.