SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834, p- ISSN: 2278-8735. Volume 5, Issue 1 (Jan. - Feb. 2013), PP 60-64
www.iosrjournals.org

   Using Mono-Alphabetic Substitution to Secure Against
       Threats and Risk in Information Technology
                         G. I. Ighalo1, T. E. Ighalo2 and B. S. Ighalo3
                             Ambrose Alli University, P. M. B. 14 Ekpoma- Nigeria

Abstract: The awareness the world over on information technology (IT) is a welcome development but calls
for great care and concern. This is so as there are out there, many people with evil minds who see nothing good
that they would not capitalize on. There are persons who would want to create problems to make systems not
workable while there are others who would want to steal or destroy such systems.
This write-up therefore tries to analyse information technology systems, looking at all possible threats and risks
and how to combat or make such systems secure. In doing this, very simple yet difficult to guess systems
software are designed to check evil practices such that would-be risk or threat persons would find it difficult to
use. Encryption methods that use either the substitution or transposition principles are designed to protect such
threats or risk. The written program will encipher and decipher information such that the integrity of the
information is protected. This method chooses this enciphering and deciphering such that any user can easily
learn and design his/her own keys which are not stored in the system. Other measures that will check threats and
risks are proposed and counter measures that are involved with access control are provided. A better risk
management and training are proposed.
Keywords: cipher, integrity, risk, substitution, threats, transposition

                                            I.       Introduction
           Problems associated with computer systems and applications are privacy and security. Any network or
even individual computer system without provision for privacy and security paves way for possible threats.
Computer systems contain personal data and are accessible from distant terminals. When this situation arises,
worms and viruses could be transmitted to such free systems with ease. Software obtained from such external
sources provides a means of security risk [1].
           A threat to a computer system is any potential occurrence malicious or otherwise that can have an
individual effect on the assets and resources associated with the system. Threats can be reduced in any system
by identifying and removing vulnerabilities. Vulnerabilities make systems more prone to attacks or they make
attacks more likely to have success or impact. However there are countermeasures for vulnerabilities. These
could be classified into four main types:
  - Deterrent controls: These types tend to reduce the likelihood of a deliberate attack.
  - Preventive controls: These types protect vulnerabilities and make any attack unsuccessful or reduce its
       impact.
  - Corrective controls: they reduce the effect of an attack
  - Detective controls: these types discover attack, and alerts or triggers preventive or corrective controls [2].
Threats to computer systems can be described in three forms:
(a) Disclosure threat – When information is passed onto a person that it was not meant then it becomes a
      disclosure threat. This can be referred to as a leak. This situation arises when some secret stored in a
      computer system is disclosed to someone to whom it was not meant ( e.g. instructions for building a nuclear
      bomb)
(b) Integrity threat – This involves any unauthorized change to information stored in a computer or in transit
      between computer systems. Also entry of false information or data to computer systems can be seen as
      involving life or loss of information.
(c) Denial of service: - When access to some system resources is blocked intentionally then it implies denial of
      service. This blocking may become permanent
           Many other threats to information technology can be described in the form of computer crimes, cyber
crimes, fraud etc. These types of threats have led to loss of billions of dollars. Most of these threats lead to
breakdown, taking wrong decisions due to alterations [3]. To understand the issue of risk in information
technology, it is of the view that various institutions using information technology systems must study their
various organizations properly. They need to undergo various management problems especially as it relates to
its technology. For any good security measures to be effective on the risk and Threats in IT, it would require a


                                            www.iosrjournals.org                                        60 | Page
Using Mono-Alphabetic Substitution to Secure Against Threats and Risk In Information Technology

proper study on all such systems. Such study would include access control, network security, data integrity,
asset management and software acquisition and development [4].
          It is common knowledge that most of the breaches in IT originated from inside of the various
organizations. In the US, it is documented that 45 percent of US organizations polled reported unauthorized
access by insiders. In addition, financial fraud and theft of proprietary information – “opportunity crimes” that
securities experts say require access to company systems and insiders knowledge – ranked as the most costly
types of computer crime. To help mitigate the risk of both deliberate and unintentional damage, organizations
need to establish effective access control measures. Also policies and procedures that clearly define individual
responsibilities for supporting or changing the computing environment need be established.

                                      II.       Materials And Methods
           One of the foremost measures in checking risk of threats against IT is the access rights granted to all
workers of any organization. Granting employees too many views enables them to extrapolate or conjecture
further on information and exploit confidential data. The degree of access control depends on the value of data
being protected. Many organizations use passwords for access control. For more sensitive information, it may
require more rigorous measures such as biometric scans, smart cards, or one time password devices. Auditors in
well established organizations are used to help determine the degree of control necessary by evaluating the risk
facing each system. It has been found that when passwords are used, the most common form of access control
is commonsense questions which have yielded very good results. Generally risks are defined and categorized.
This definition creates or allows cost effective security measures to be employed and hence a consequent
reduction in the risk gap. There are risks which need to be addressed by countermeasures, there are those that
can be accepted and there are those to be insured against. As the IT revolves around the computer application
then issues of security measures implies the security of computer systems. There are two types of computer
security measures to be considered-
- Physical security measures, and
- Logical security measures.
      Physical security measures – These types of measures are external to the hardware and software systems.
      They are intended to prevent or facilitate recovery from physical disaster such as fire, flood riots, sabotage
      and theft of physical resources. These include control of physical access to computing resources in order to
      make decisions about who can have access to each terminal or user accounts as well as to the computer
      room itself.
      Logical security measures – these types are internal to the computer system. In these types of measures,
      actions are taken before and after a threat have occurred. Countermeasures here prevent threats that have
      already occurred. Safeguards are placed to prevent having effects of known threats. Countermeasures and
      safeguards which when built in any system will perfectly keep good security is:-
i)         Auditing and intrusion detection
ii)        Identification and authentication
iii)       Encryption
iv)        Mandatory and discretional access control
v)         Privileges
vi)        Security kernels
vii)       Configuration management
viii)      Format specification and verification
ix)        Enhancing life circle activities
           Presently, there are a lot of developed security measures which can be applied to secure information‟s
in information technology. One of such developed packages is that by IBM (International Business Machine)
which introduced the electronic copyright management system that uses a secure packaging technology called
enable owner of copy righted material to distribute their information securely over the Internet and receive
payment use. Another such method is that using a combination of software encryption and unique laser
treatment to make copying of CD-ROMS immensely difficult. This system is embedded into each CD-ROM.
At the mastering stage, each CD-ROM has a unique locking code that provides protections at three levels. The
end result is that the products cannot be copied by any currently available CD recordable machine.
           The security implementation in this paper is based on the basic security of any information system
which is :- (a) identification authentication
 (b) Authorization (access control)
 (c ) Integrity, consistence integrity constraint and rules been applied.
Atypical encryption programme was carried out to execute the security process. The program is written using
mono-alphabetic substitution as a security measure. It does not require any key to encrypt or decrypt a message
and it is not complex. The presenter has been guided by the fact that many persons do not understand basic

                                             www.iosrjournals.org                                         61 | Page
Using Mono-Alphabetic Substitution to Secure Against Threats and Risk In Information Technology

mathematics and this approach has been chosen such that any individual can design his or her own mono-
alphabetic substitution security measure.
A typical security measure that can be used by owners of small scale enterprise is the format shown in the
program highlighted hereunder. As soon as the private entrepreneur opens his computer with his password, so
long as the programme has been installed, he needs to close his programme. This will enable him or her to
execute his normal work in the normal language, be it in English or any language. As soon as he finishes, he can
allow his programme to run and encrypt the work he has just typed or executed. He can then live his work in
the encrypted format or close the work. This process may be tedious but for security it is necessary. The
programme for the decryption mechanism is written in Pascal.

                                              III      Program
         This program can be used encipher a message of interchanging by cipher alphabet and real alphabet
PROGRAM DECIPHER MESSAGE (INPUT, OUTPUT)
         This program deciphers a message, which has been coded using the
Non-alphabetic substitution code.
USES CRT
CONST
ALPHABETLENGHT 37,
MAXLEN = 80;
TYPE
ALPHABET = ARRY [1 ALPHABETLENGTH] OF CHAR;
CHARLINE = ARRAY [1, MAXLEN] OF CHAR;
{Procedure asks user to either read and cipher alphabets for the deciphering}
Var
IndeX: integer;
Begin
Clrser;
         Writeln („please enter the real alphabet‟)
         FOR index = 1 To alphabet length Do
         Read (Real A1 [index]); Readln;
Writeln („Below each letter in the real alphabet, please enter);
Writeln („ the corresponding letter of the cipher alphabet);
FOR index = I TO alphabet length Do
         Write ( real AI (index) writeln
FOR index = 1 TO alphabet length DO
         Read ( cipher A1 (index); readln
End : Enteralphabet);
Procedure Enterline (var codedmess: charline codelen in integer):
(procedure enters the coded message to be deciphered)
Var
begin
Writeln (please enter your coded message)
         Codelen; = 0,
WHILE (not EOLN) and Codelen & maxlen) DO
Begin
         Codelen = Codelen + 1:
         Read ( codedmess (Codelen).
End;
IF NOT EOLN THEN
Writeln („your coded message was too long; “message truncated to”
Maxlen: 1,; characters‟); readln
End {Enterline}:
Procedure Decipher ( var code: charline; plain;
Charline, length: integer; real A1,
Charline A1: alphabe),
Procedure deciphers coded message; looking up letter in the cipher A1 and
using the corresponding letters in real A1 to get the plain message.
Var
Index, position integer.

                                           www.iosrjournals.org                                        62 | Page
Using Mono-Alphabetic Substitution to Secure Against Threats and Risk In Information Technology

Procedure find { the position of the letter in the given alpha}
Begin
Position; = 1
WHILE ( letter alphabet [position]) Do
         Position : = position + 1

         End { find}
         Begin {Decipher }
         For index: = 1 TO length DO
         Begin
         Find ( position, code [ index ], cipher A1),
         Plain [index]; = real A1 [position ]
End
End [decipher]
Procedure print-results ( code, message charline length integer
{ This procedures print the message and the resulting coded text}
Var
Index integer
Begin
Writeln (“when the coded message)
Read1n
For index: = 1 TO length DO
         Write (code [index])
Write1n; read1n
Write1n (is decoded with the above substitutions, the result is”)
For index: = 1 to length DO
Write ( message [index ])
Write1n Read1n
End { print result};
Processing;
{ This procedure controls the main steps of data entry and processing}
Var
Real alphabet, Cipheralphabet; alphabet,
Message, Codedness: charline;
Input1en: integer;
Enteralphabets (realalphabet, cipheralphabet)
Enterline ( codeness, input1en);
Decipher ( codedness, message, input1en,
Realaphabet, cipheralphabet);
Printresults ( codedness, message, input1en)
End { control processing};
Begin { of main }
         Write1n („Deciphering program‟)
         Control processing
End { of main }

                                       IV       Using This Programme
          This typical programme has been written to encrypt and decrypt information already stored in any
computer system. It makes all information stored in a computer system not accessible to any user except the
owner or any person authorized to use such system as he/she has the password to open such system. If this
programme is enabled after a user enters his/her password access is given to the user automatically. As soon as
he/she finishes with the work at hand he/she can then encrypt the work before closing the system. In so doing,
the work in the system becomes encrypted until a decryption process is enabled. The entire work on the
computer becomes encrypted and secured from any intruder. In addition a process whereby an unauthorized
attacker is only allowed two attempt after which it becomes locked and any other attempt is seen as an error.

                                              V         Conclusion
          The encryption techniquehereto demonstrates that information can be kept secured to a certain extent
so far the process is known to all and sundry. This encryption technique will mitigate the threat and attack faced

                                             www.iosrjournals.org                                       63 | Page
Using Mono-Alphabetic Substitution to Secure Against Threats and Risk In Information Technology

by computers. Alphabetic substitution does not require the use of keys, but can protect information from any
how attack. Other methods of encryption can be used to keep information secured. Constant changing of
encryption methods can continuously keep information secured. Other Programming languages could also be
used.

                                               References
[1]   Bowker Sauer C. (1993) “Security of electronic information perspectives in information management
[2]   Parker D. B. (1982) “Computer security some easy things to do”. Wellesley Publishing co.
[3]   Burham D. (1983), “The Risk of the computer state”. New York; Random House
[4]   John Silltow (2003) Shedding light on information technology Risk: Business services Industry
[5]   Thomas L. Naps (1988) Programme Design with Pascal; West Publishing Company, New York




                                          www.iosrjournals.org                                     64 | Page

Mais conteúdo relacionado

Mais procurados

Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information SystemDaryl Conson
 
Information security
Information securityInformation security
Information securityLJ PROJECTS
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
Security Awareness and Training
Security Awareness and TrainingSecurity Awareness and Training
Security Awareness and TrainingPriyank Hada
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information systemOnline
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technologyparamalways
 
IT Security & Risk
IT Security & Risk IT Security & Risk
IT Security & Risk Tanujpandey5
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Kirti Ahirrao
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
Securing information system (Management Information System)
Securing information system (Management Information System)Securing information system (Management Information System)
Securing information system (Management Information System)Masudur Rahman
 
Introduction to the management of information security
Introduction to the management of information security  Introduction to the management of information security
Introduction to the management of information security Sammer Qader
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityKumawat Dharmpal
 
Security in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than everSecurity in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than everEC-Council
 
Keamanan informasi
Keamanan informasiKeamanan informasi
Keamanan informasiNova Novelia
 
Information systems security(1)
Information systems security(1)Information systems security(1)
Information systems security(1)Sandeep Agarwal
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information securityethanBrownusa
 

Mais procurados (20)

Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information System
 
Information security
Information securityInformation security
Information security
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Forensics
ForensicsForensics
Forensics
 
Security Awareness and Training
Security Awareness and TrainingSecurity Awareness and Training
Security Awareness and Training
 
Ijcatr04061002
Ijcatr04061002Ijcatr04061002
Ijcatr04061002
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
IT Security & Risk
IT Security & Risk IT Security & Risk
IT Security & Risk
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Securing information system (Management Information System)
Securing information system (Management Information System)Securing information system (Management Information System)
Securing information system (Management Information System)
 
Introduction to the management of information security
Introduction to the management of information security  Introduction to the management of information security
Introduction to the management of information security
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
security IDS
security IDSsecurity IDS
security IDS
 
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
 
Security in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than everSecurity in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than ever
 
Keamanan informasi
Keamanan informasiKeamanan informasi
Keamanan informasi
 
Information systems security(1)
Information systems security(1)Information systems security(1)
Information systems security(1)
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information security
 

Destaque

Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsIOSR Journals
 
An Adaptive Zero Voltage Mechanism for Boost Converter
An Adaptive Zero Voltage Mechanism for Boost ConverterAn Adaptive Zero Voltage Mechanism for Boost Converter
An Adaptive Zero Voltage Mechanism for Boost ConverterIOSR Journals
 
Bmb02012013 00000
Bmb02012013 00000Bmb02012013 00000
Bmb02012013 00000Defense1
 
Ndta mentor protege program 2-2-15
Ndta mentor protege program 2-2-15Ndta mentor protege program 2-2-15
Ndta mentor protege program 2-2-15watersb
 
Презентация Томашпольского района - Проект приграничного сотрудничества Украи...
Презентация Томашпольского района - Проект приграничного сотрудничества Украи...Презентация Томашпольского района - Проект приграничного сотрудничества Украи...
Презентация Томашпольского района - Проект приграничного сотрудничества Украи...Anastasia Lanina
 
Modeling and Application of a Modified Attributional Psychometric Instrument...
Modeling and Application of a Modified Attributional  Psychometric Instrument...Modeling and Application of a Modified Attributional  Psychometric Instrument...
Modeling and Application of a Modified Attributional Psychometric Instrument...IOSR Journals
 
Aung san suu kyi pictures
Aung san suu kyi picturesAung san suu kyi pictures
Aung san suu kyi pictureszelinski3269
 
Презентация Ямпольского района - Проект приграничного сотрудничества Украина ...
Презентация Ямпольского района - Проект приграничного сотрудничества Украина ...Презентация Ямпольского района - Проект приграничного сотрудничества Украина ...
Презентация Ямпольского района - Проект приграничного сотрудничества Украина ...Anastasia Lanina
 
Enhancing the NS-2 Traffic Generator for the MANETs
Enhancing the NS-2 Traffic Generator for the MANETsEnhancing the NS-2 Traffic Generator for the MANETs
Enhancing the NS-2 Traffic Generator for the MANETsIOSR Journals
 
Privacy and Security in Online Examination Systems
Privacy and Security in Online Examination SystemsPrivacy and Security in Online Examination Systems
Privacy and Security in Online Examination SystemsIOSR Journals
 
Smart Data Server for Smart Shops
Smart Data Server for Smart ShopsSmart Data Server for Smart Shops
Smart Data Server for Smart ShopsIOSR Journals
 
Performance Comparison of Various Filters and Wavelet Transform for Image De-...
Performance Comparison of Various Filters and Wavelet Transform for Image De-...Performance Comparison of Various Filters and Wavelet Transform for Image De-...
Performance Comparison of Various Filters and Wavelet Transform for Image De-...IOSR Journals
 
Luminescence of Cesium Thiocyanate (CsSCN) doped with Eu2+ (CsSCN:Eu2+)
Luminescence of Cesium Thiocyanate (CsSCN) doped with Eu2+ (CsSCN:Eu2+)Luminescence of Cesium Thiocyanate (CsSCN) doped with Eu2+ (CsSCN:Eu2+)
Luminescence of Cesium Thiocyanate (CsSCN) doped with Eu2+ (CsSCN:Eu2+)IOSR Journals
 
Sistema de Comando de incidentes, Como organizar recursos
Sistema de Comando de incidentes, Como organizar recursosSistema de Comando de incidentes, Como organizar recursos
Sistema de Comando de incidentes, Como organizar recursosYeison Ramirez
 
Design of Low Noise Amplifier for Wimax Application
Design of Low Noise Amplifier for Wimax ApplicationDesign of Low Noise Amplifier for Wimax Application
Design of Low Noise Amplifier for Wimax ApplicationIOSR Journals
 
Secure Network Discovery for Risk-Aware Framework in Manet
Secure Network Discovery for Risk-Aware Framework in ManetSecure Network Discovery for Risk-Aware Framework in Manet
Secure Network Discovery for Risk-Aware Framework in ManetIOSR Journals
 
A Critical Review of the Nigerian Energy Scenario
A Critical Review of the Nigerian Energy ScenarioA Critical Review of the Nigerian Energy Scenario
A Critical Review of the Nigerian Energy ScenarioIOSR Journals
 
Opportunity Arabia 2015 (London, September 14 2015)
Opportunity Arabia 2015 (London, September 14 2015)Opportunity Arabia 2015 (London, September 14 2015)
Opportunity Arabia 2015 (London, September 14 2015)Odyssey Recruitment
 

Destaque (20)

Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network Models
 
An Adaptive Zero Voltage Mechanism for Boost Converter
An Adaptive Zero Voltage Mechanism for Boost ConverterAn Adaptive Zero Voltage Mechanism for Boost Converter
An Adaptive Zero Voltage Mechanism for Boost Converter
 
Bmb02012013 00000
Bmb02012013 00000Bmb02012013 00000
Bmb02012013 00000
 
Ndta mentor protege program 2-2-15
Ndta mentor protege program 2-2-15Ndta mentor protege program 2-2-15
Ndta mentor protege program 2-2-15
 
Презентация Томашпольского района - Проект приграничного сотрудничества Украи...
Презентация Томашпольского района - Проект приграничного сотрудничества Украи...Презентация Томашпольского района - Проект приграничного сотрудничества Украи...
Презентация Томашпольского района - Проект приграничного сотрудничества Украи...
 
Modeling and Application of a Modified Attributional Psychometric Instrument...
Modeling and Application of a Modified Attributional  Psychometric Instrument...Modeling and Application of a Modified Attributional  Psychometric Instrument...
Modeling and Application of a Modified Attributional Psychometric Instrument...
 
Media genre
Media genreMedia genre
Media genre
 
Aung san suu kyi pictures
Aung san suu kyi picturesAung san suu kyi pictures
Aung san suu kyi pictures
 
Презентация Ямпольского района - Проект приграничного сотрудничества Украина ...
Презентация Ямпольского района - Проект приграничного сотрудничества Украина ...Презентация Ямпольского района - Проект приграничного сотрудничества Украина ...
Презентация Ямпольского района - Проект приграничного сотрудничества Украина ...
 
Enhancing the NS-2 Traffic Generator for the MANETs
Enhancing the NS-2 Traffic Generator for the MANETsEnhancing the NS-2 Traffic Generator for the MANETs
Enhancing the NS-2 Traffic Generator for the MANETs
 
Privacy and Security in Online Examination Systems
Privacy and Security in Online Examination SystemsPrivacy and Security in Online Examination Systems
Privacy and Security in Online Examination Systems
 
Smart Data Server for Smart Shops
Smart Data Server for Smart ShopsSmart Data Server for Smart Shops
Smart Data Server for Smart Shops
 
Performance Comparison of Various Filters and Wavelet Transform for Image De-...
Performance Comparison of Various Filters and Wavelet Transform for Image De-...Performance Comparison of Various Filters and Wavelet Transform for Image De-...
Performance Comparison of Various Filters and Wavelet Transform for Image De-...
 
K0946269
K0946269K0946269
K0946269
 
Luminescence of Cesium Thiocyanate (CsSCN) doped with Eu2+ (CsSCN:Eu2+)
Luminescence of Cesium Thiocyanate (CsSCN) doped with Eu2+ (CsSCN:Eu2+)Luminescence of Cesium Thiocyanate (CsSCN) doped with Eu2+ (CsSCN:Eu2+)
Luminescence of Cesium Thiocyanate (CsSCN) doped with Eu2+ (CsSCN:Eu2+)
 
Sistema de Comando de incidentes, Como organizar recursos
Sistema de Comando de incidentes, Como organizar recursosSistema de Comando de incidentes, Como organizar recursos
Sistema de Comando de incidentes, Como organizar recursos
 
Design of Low Noise Amplifier for Wimax Application
Design of Low Noise Amplifier for Wimax ApplicationDesign of Low Noise Amplifier for Wimax Application
Design of Low Noise Amplifier for Wimax Application
 
Secure Network Discovery for Risk-Aware Framework in Manet
Secure Network Discovery for Risk-Aware Framework in ManetSecure Network Discovery for Risk-Aware Framework in Manet
Secure Network Discovery for Risk-Aware Framework in Manet
 
A Critical Review of the Nigerian Energy Scenario
A Critical Review of the Nigerian Energy ScenarioA Critical Review of the Nigerian Energy Scenario
A Critical Review of the Nigerian Energy Scenario
 
Opportunity Arabia 2015 (London, September 14 2015)
Opportunity Arabia 2015 (London, September 14 2015)Opportunity Arabia 2015 (London, September 14 2015)
Opportunity Arabia 2015 (London, September 14 2015)
 

Semelhante a I0516064

Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysisdadkhah077
 
Computer Security Policy
Computer Security PolicyComputer Security Policy
Computer Security Policyeverestsky66
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02anjalee990
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxedgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxfathwaitewalter
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundohdbundo
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfJazmine Brown
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security madunix
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network SecuritySachithra Gayan
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfsrtwgwfwwgw
 
Protection and security
Protection and securityProtection and security
Protection and securitymbadhi
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1Temesgen Berhanu
 

Semelhante a I0516064 (20)

Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
 
E04 05 2841
E04 05 2841E04 05 2841
E04 05 2841
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
 
Computer Security Policy
Computer Security PolicyComputer Security Policy
Computer Security Policy
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
 
Bis Chapter15
Bis Chapter15Bis Chapter15
Bis Chapter15
 
Is4560
Is4560Is4560
Is4560
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
C018131821
C018131821C018131821
C018131821
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Protection and security
Protection and securityProtection and security
Protection and security
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
 

Mais de IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

I0516064

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834, p- ISSN: 2278-8735. Volume 5, Issue 1 (Jan. - Feb. 2013), PP 60-64 www.iosrjournals.org Using Mono-Alphabetic Substitution to Secure Against Threats and Risk in Information Technology G. I. Ighalo1, T. E. Ighalo2 and B. S. Ighalo3 Ambrose Alli University, P. M. B. 14 Ekpoma- Nigeria Abstract: The awareness the world over on information technology (IT) is a welcome development but calls for great care and concern. This is so as there are out there, many people with evil minds who see nothing good that they would not capitalize on. There are persons who would want to create problems to make systems not workable while there are others who would want to steal or destroy such systems. This write-up therefore tries to analyse information technology systems, looking at all possible threats and risks and how to combat or make such systems secure. In doing this, very simple yet difficult to guess systems software are designed to check evil practices such that would-be risk or threat persons would find it difficult to use. Encryption methods that use either the substitution or transposition principles are designed to protect such threats or risk. The written program will encipher and decipher information such that the integrity of the information is protected. This method chooses this enciphering and deciphering such that any user can easily learn and design his/her own keys which are not stored in the system. Other measures that will check threats and risks are proposed and counter measures that are involved with access control are provided. A better risk management and training are proposed. Keywords: cipher, integrity, risk, substitution, threats, transposition I. Introduction Problems associated with computer systems and applications are privacy and security. Any network or even individual computer system without provision for privacy and security paves way for possible threats. Computer systems contain personal data and are accessible from distant terminals. When this situation arises, worms and viruses could be transmitted to such free systems with ease. Software obtained from such external sources provides a means of security risk [1]. A threat to a computer system is any potential occurrence malicious or otherwise that can have an individual effect on the assets and resources associated with the system. Threats can be reduced in any system by identifying and removing vulnerabilities. Vulnerabilities make systems more prone to attacks or they make attacks more likely to have success or impact. However there are countermeasures for vulnerabilities. These could be classified into four main types: - Deterrent controls: These types tend to reduce the likelihood of a deliberate attack. - Preventive controls: These types protect vulnerabilities and make any attack unsuccessful or reduce its impact. - Corrective controls: they reduce the effect of an attack - Detective controls: these types discover attack, and alerts or triggers preventive or corrective controls [2]. Threats to computer systems can be described in three forms: (a) Disclosure threat – When information is passed onto a person that it was not meant then it becomes a disclosure threat. This can be referred to as a leak. This situation arises when some secret stored in a computer system is disclosed to someone to whom it was not meant ( e.g. instructions for building a nuclear bomb) (b) Integrity threat – This involves any unauthorized change to information stored in a computer or in transit between computer systems. Also entry of false information or data to computer systems can be seen as involving life or loss of information. (c) Denial of service: - When access to some system resources is blocked intentionally then it implies denial of service. This blocking may become permanent Many other threats to information technology can be described in the form of computer crimes, cyber crimes, fraud etc. These types of threats have led to loss of billions of dollars. Most of these threats lead to breakdown, taking wrong decisions due to alterations [3]. To understand the issue of risk in information technology, it is of the view that various institutions using information technology systems must study their various organizations properly. They need to undergo various management problems especially as it relates to its technology. For any good security measures to be effective on the risk and Threats in IT, it would require a www.iosrjournals.org 60 | Page
  • 2. Using Mono-Alphabetic Substitution to Secure Against Threats and Risk In Information Technology proper study on all such systems. Such study would include access control, network security, data integrity, asset management and software acquisition and development [4]. It is common knowledge that most of the breaches in IT originated from inside of the various organizations. In the US, it is documented that 45 percent of US organizations polled reported unauthorized access by insiders. In addition, financial fraud and theft of proprietary information – “opportunity crimes” that securities experts say require access to company systems and insiders knowledge – ranked as the most costly types of computer crime. To help mitigate the risk of both deliberate and unintentional damage, organizations need to establish effective access control measures. Also policies and procedures that clearly define individual responsibilities for supporting or changing the computing environment need be established. II. Materials And Methods One of the foremost measures in checking risk of threats against IT is the access rights granted to all workers of any organization. Granting employees too many views enables them to extrapolate or conjecture further on information and exploit confidential data. The degree of access control depends on the value of data being protected. Many organizations use passwords for access control. For more sensitive information, it may require more rigorous measures such as biometric scans, smart cards, or one time password devices. Auditors in well established organizations are used to help determine the degree of control necessary by evaluating the risk facing each system. It has been found that when passwords are used, the most common form of access control is commonsense questions which have yielded very good results. Generally risks are defined and categorized. This definition creates or allows cost effective security measures to be employed and hence a consequent reduction in the risk gap. There are risks which need to be addressed by countermeasures, there are those that can be accepted and there are those to be insured against. As the IT revolves around the computer application then issues of security measures implies the security of computer systems. There are two types of computer security measures to be considered- - Physical security measures, and - Logical security measures. Physical security measures – These types of measures are external to the hardware and software systems. They are intended to prevent or facilitate recovery from physical disaster such as fire, flood riots, sabotage and theft of physical resources. These include control of physical access to computing resources in order to make decisions about who can have access to each terminal or user accounts as well as to the computer room itself. Logical security measures – these types are internal to the computer system. In these types of measures, actions are taken before and after a threat have occurred. Countermeasures here prevent threats that have already occurred. Safeguards are placed to prevent having effects of known threats. Countermeasures and safeguards which when built in any system will perfectly keep good security is:- i) Auditing and intrusion detection ii) Identification and authentication iii) Encryption iv) Mandatory and discretional access control v) Privileges vi) Security kernels vii) Configuration management viii) Format specification and verification ix) Enhancing life circle activities Presently, there are a lot of developed security measures which can be applied to secure information‟s in information technology. One of such developed packages is that by IBM (International Business Machine) which introduced the electronic copyright management system that uses a secure packaging technology called enable owner of copy righted material to distribute their information securely over the Internet and receive payment use. Another such method is that using a combination of software encryption and unique laser treatment to make copying of CD-ROMS immensely difficult. This system is embedded into each CD-ROM. At the mastering stage, each CD-ROM has a unique locking code that provides protections at three levels. The end result is that the products cannot be copied by any currently available CD recordable machine. The security implementation in this paper is based on the basic security of any information system which is :- (a) identification authentication (b) Authorization (access control) (c ) Integrity, consistence integrity constraint and rules been applied. Atypical encryption programme was carried out to execute the security process. The program is written using mono-alphabetic substitution as a security measure. It does not require any key to encrypt or decrypt a message and it is not complex. The presenter has been guided by the fact that many persons do not understand basic www.iosrjournals.org 61 | Page
  • 3. Using Mono-Alphabetic Substitution to Secure Against Threats and Risk In Information Technology mathematics and this approach has been chosen such that any individual can design his or her own mono- alphabetic substitution security measure. A typical security measure that can be used by owners of small scale enterprise is the format shown in the program highlighted hereunder. As soon as the private entrepreneur opens his computer with his password, so long as the programme has been installed, he needs to close his programme. This will enable him or her to execute his normal work in the normal language, be it in English or any language. As soon as he finishes, he can allow his programme to run and encrypt the work he has just typed or executed. He can then live his work in the encrypted format or close the work. This process may be tedious but for security it is necessary. The programme for the decryption mechanism is written in Pascal. III Program This program can be used encipher a message of interchanging by cipher alphabet and real alphabet PROGRAM DECIPHER MESSAGE (INPUT, OUTPUT) This program deciphers a message, which has been coded using the Non-alphabetic substitution code. USES CRT CONST ALPHABETLENGHT 37, MAXLEN = 80; TYPE ALPHABET = ARRY [1 ALPHABETLENGTH] OF CHAR; CHARLINE = ARRAY [1, MAXLEN] OF CHAR; {Procedure asks user to either read and cipher alphabets for the deciphering} Var IndeX: integer; Begin Clrser; Writeln („please enter the real alphabet‟) FOR index = 1 To alphabet length Do Read (Real A1 [index]); Readln; Writeln („Below each letter in the real alphabet, please enter); Writeln („ the corresponding letter of the cipher alphabet); FOR index = I TO alphabet length Do Write ( real AI (index) writeln FOR index = 1 TO alphabet length DO Read ( cipher A1 (index); readln End : Enteralphabet); Procedure Enterline (var codedmess: charline codelen in integer): (procedure enters the coded message to be deciphered) Var begin Writeln (please enter your coded message) Codelen; = 0, WHILE (not EOLN) and Codelen & maxlen) DO Begin Codelen = Codelen + 1: Read ( codedmess (Codelen). End; IF NOT EOLN THEN Writeln („your coded message was too long; “message truncated to” Maxlen: 1,; characters‟); readln End {Enterline}: Procedure Decipher ( var code: charline; plain; Charline, length: integer; real A1, Charline A1: alphabe), Procedure deciphers coded message; looking up letter in the cipher A1 and using the corresponding letters in real A1 to get the plain message. Var Index, position integer. www.iosrjournals.org 62 | Page
  • 4. Using Mono-Alphabetic Substitution to Secure Against Threats and Risk In Information Technology Procedure find { the position of the letter in the given alpha} Begin Position; = 1 WHILE ( letter alphabet [position]) Do Position : = position + 1 End { find} Begin {Decipher } For index: = 1 TO length DO Begin Find ( position, code [ index ], cipher A1), Plain [index]; = real A1 [position ] End End [decipher] Procedure print-results ( code, message charline length integer { This procedures print the message and the resulting coded text} Var Index integer Begin Writeln (“when the coded message) Read1n For index: = 1 TO length DO Write (code [index]) Write1n; read1n Write1n (is decoded with the above substitutions, the result is”) For index: = 1 to length DO Write ( message [index ]) Write1n Read1n End { print result}; Processing; { This procedure controls the main steps of data entry and processing} Var Real alphabet, Cipheralphabet; alphabet, Message, Codedness: charline; Input1en: integer; Enteralphabets (realalphabet, cipheralphabet) Enterline ( codeness, input1en); Decipher ( codedness, message, input1en, Realaphabet, cipheralphabet); Printresults ( codedness, message, input1en) End { control processing}; Begin { of main } Write1n („Deciphering program‟) Control processing End { of main } IV Using This Programme This typical programme has been written to encrypt and decrypt information already stored in any computer system. It makes all information stored in a computer system not accessible to any user except the owner or any person authorized to use such system as he/she has the password to open such system. If this programme is enabled after a user enters his/her password access is given to the user automatically. As soon as he/she finishes with the work at hand he/she can then encrypt the work before closing the system. In so doing, the work in the system becomes encrypted until a decryption process is enabled. The entire work on the computer becomes encrypted and secured from any intruder. In addition a process whereby an unauthorized attacker is only allowed two attempt after which it becomes locked and any other attempt is seen as an error. V Conclusion The encryption techniquehereto demonstrates that information can be kept secured to a certain extent so far the process is known to all and sundry. This encryption technique will mitigate the threat and attack faced www.iosrjournals.org 63 | Page
  • 5. Using Mono-Alphabetic Substitution to Secure Against Threats and Risk In Information Technology by computers. Alphabetic substitution does not require the use of keys, but can protect information from any how attack. Other methods of encryption can be used to keep information secured. Constant changing of encryption methods can continuously keep information secured. Other Programming languages could also be used. References [1] Bowker Sauer C. (1993) “Security of electronic information perspectives in information management [2] Parker D. B. (1982) “Computer security some easy things to do”. Wellesley Publishing co. [3] Burham D. (1983), “The Risk of the computer state”. New York; Random House [4] John Silltow (2003) Shedding light on information technology Risk: Business services Industry [5] Thomas L. Naps (1988) Programme Design with Pascal; West Publishing Company, New York www.iosrjournals.org 64 | Page