Saturday, February 1, 2025

1.3 Computer Security - SEE COMPUTER SCIENCE 2081

 


1.3 Computer Security

 

Computer Security / Cyber Security

Computer security refers to the protection of computer systems, networks, and data from unauthorized access, theft, damage, or disruption.

 

Examples of computer security

Password, Biometric, Firewall, Cryptography etc

 

Types of computer security

Hardware security      &      Software security

 

Information Security (infosec)

Information security refers to the protection of data and information from being accessed, changed or used by unauthorized people.

It ensures that information remains confidential, accurate, and available only to those who are supposed to have access to it.

 

Key principles of Information Security

a)   Confidentiality:- Only authorized users can access the data resources and information.

b)   Integrity:- Only authorized users should be able to modify the data when needed.

c)   Availability:- Data should be available to users when needed.

 

How can we protect data?

We can protect data by using strong passwords, encryption, two-factor authentication, firewalls, and antivirus. Regularly update software, back up data, and restrict access to authorized users to enhance security.

 

 

Security Threats

Security threats are the possible dangers or risks that can potentially harm computer systems and organization. Examples include malware, phishing attacks, hacking etc,

 

 

 

 

Possible Security Threats

 

Phishing : A fake attempt to obtain sensitive information such as usernames, passwords and credit card details by pretending to be a trustworthy source.

 

Botnet: A group of infected computers controlled by a hacker, used together to perform harmful activities online, like attacking websites or sending spam, without the owners information.

 

Rootkit : A hidden software tool that allows a hacker to take control of a computer secretly, making it hard to detect and remove.

 

Key logger: A type of software or hardware that secretly records every keystroke a person types on their computer, often used to steal passwords and other sensitive information.

 

Hacker:

- A skilled computer expert who uses his/her technical knowledge to overcome a problem.

- An illegal activity and the individuals who are engaged in hacking. 

- A person who steals or destroys other’s data, information and program

 

Hacking is the act of breaking into computer systems or networks without permission, often to steal, change, or destroy data, or to disrupt operations.

 

Ethical Hacking: Hacking done with permission from the client.

 

Malicious code (Malware)

Malicious code is software or scripts created to damage, disrupt, or gain unauthorized access to computer systems. Examples include viruses, worms, and ransom ware, which can steal data, corrupt files, or cause other harm.

 

Types of malware

 

Computer Virus

A computer virus is malicious software that attaches itself to other programs or files and spreads to other computers. It can damage, corrupt, or delete data and disrupt system operations.

E.g. C-Brain, Frodo, Disk Killer, I Love You etc

- Some viruses produce unnecessary messages on the screen, some virus hide files, some virus corrupt files and programs, some virus reduce memory size, etc.

 

- Computer viruses can spread from one computer to other computers through sharing of infected portable disk like pen drive, opening a virus infected email, messages or attached files and downloading files and programs form the websites which are not secure.

 

Any four symptoms of computer virus.

- Program takes long time to load.

- Increased use of disk space and growth in file size.

- Corrupting the system data.

- Renaming files with different names.

Two preventive ways are:

  • Installing and regularly updating antivirus software.
  • Avoiding the download of files or attachments from unknown or untrusted sources.

 

A computer worm is a type of malware that spreads itself to other computers without needing to attach to other programs or files, often causing harm or using up system resources.

 

A Trojan horse is malicious software that pretends to be a useful program to trick users into installing it. Once installed, it can cause harm, like stealing data or giving unauthorized access to the computer. 

 

Spyware is a type of malicious software that secretly monitors and collects information about a user's activities or data without their knowledge. It often monitors browsing habits, keystrokes, or personal information and sends it to a third party.

 

Adware is software that automatically displays or downloads unwanted ads on the computer or device. It often tracks browsing habits to display targeted advertisements.

 

 

 

 

Security mechanisms

A security mechanism is a tool or method used to protect computer systems and data from unauthorized access, threats, or attacks.

It includes

  Authentication Systems

  Firewalls

  Cryptography

  Antivirus Software

  Backup System

 

Authentication System

An authentication system is a process that verifies the identity of a user or device before granting access to a system, typically using credentials like passwords, PINs, or biometric data.

Authentication system makes sure that right people enters the system and access the right information.

 

Types of Authentication

Password        &    Biometric

 

Password

  A password is a secret code or set of characters used to protect access to an account, system, or device, ensuring that only authorized users can gain entry.

 

Importance of password protection

  Password secures the data by protecting from unauthorized access.

  It safeguards personal information from being stolen or misused.

 

Password policy

A password policy is a set of rules or guidelines designed to ensure that passwords are secure. It often includes requirements for password length, complexity, and expiration to help protect accounts from unauthorized access.

 

How password policy protects computer software and data? Explain

Passwords protect data by preventing unauthorized access. Strong password policies significantly reduce security risks, safeguarding sensitive information and maintaining the integrity of computer systems and software.

 

 

Following are some of the tips to make password secure and strong:

Don't use easily guessable the name of a pet, child, family member, birthdays, birthplace, name of a favourite holiday.

Don't use a sequence like abcd or 1234 which are, again, easily guessable.

Mix characters, numbers and symbols. Also, mix small and capital letters.

Avoid using the same password in all applications and change password periodically

 

Biometric

Biometric is a technology that uses unique physical or behavioral characteristics, such as fingerprints, facial recognition, or voice patterns, to identify and authenticate individuals.

 

Any four areas where biometric are used -

o  Time and Attendance Tracking: track employee attendance accurately.

o  Smartphones and Devices: For unlocking phones and other devices through fingerprint or facial recognition.

o  Banking and Financial Services: To authenticate transactions and access accounts securely.

o  Access Control: Restricting entry to buildings or secure areas using fingerprint or facial recognition.

 

Biometric verification

Biometric verification is the process of using unique physical or behavioral characteristics, like fingerprints or facial features, to confirm a person's identity.

 

Firewall

 A firewall is a security system that monitors and controls incoming and outgoing network traffic to protect systems from unauthorized access and cyber threats. 

Firewall blocks unwanted traffic as well as malicious software from infecting the computer.

 

Its Types are:

  Hardware Firewall: A physical device that sits between a network and its internet connection, providing centralized protection by filtering and monitoring network traffic.

  Software Firewall: A program installed on individual computers or servers that controls and monitors network traffic, providing protection from unauthorized access and threats.

Two uses of firewall

v Prevents unauthorized users from accessing a network or computer system.

v Controls and filters incoming and outgoing network traffic based on security rules.

 

Cryptography

Cryptography is the practice of using techniques to secure and protect information by converting it into a coded format ensuring that only authorized users can access or understand it.

It involves methods for encrypting (encoding) and decrypting (decoding) data to ensure its confidentiality, integrity, and authenticity.

 

Types of Cryptography

Encryption         &      Decryption

 

Encryption

  Encryption is the process of converting plain text or data into a coded format, known as cipher text, to prevent unauthorized access. It ensures that only individuals with the correct decryption key can read the original information.

  Encryption is done by the person who is sending the data to the destination

 

How encryption helps in data protection?

  Encryption helps in data protection by providing a secure way to store and transmit sensitive information.

 

Decryption

  Decryption is the process of converting encrypted data, or cipher text, back into its original, readable format, or plaintext, using a decryption key.

  Decryption is done at the person who is receiving the data

 

Why data decryption is necessary?

- To convert encrypted (coded) data into readable form.

 

Antivirus software

  Antivirus software is a program that scans, detects, and removes malicious software from a computer or device to protect it from security threats.

E.g. Norton Antivirus, McAfee Antivirus, Bit defender, Kaspersky Antivirus, Avast Antivirus.

How antivirus helps to secure computer software?

An antivirus helps to secure computer software by detecting and removing malicious software, such as viruses, spyware, and Trojans, that can harm the computer or steal sensitive information.

 

Which software is used to remove virus from Computer System?

Antivirus Software is used to remove virus from Computer System

 

Backup system

·      Backup is a copy of important data or files stored separately from the original, used to restore the information if the original is lost, damaged, or corrupted.

·      Backup is important because it keeps copies of our important files and data in a safe place. If our computer crashes or we accidentally delete something, we can use these copies to restore our information and avoid losing important work or personal files.

 

Hardware Security

Hardware security refers to the protection of the physical components of a computer or electronic device from unauthorized access, theft, or damage.

 

Different hardware security measures are:

a)   Regular Maintenance                       e) Insurance

b)   Dust free environment                     f) Protection from Fire

c)   Protection from Thief                       g) Air condition system

d)   Power Protection device (Volt guard, Spike guard, UPS)

 

Regular Maintenance

Computer system need regular maintenance to keep the computer hardware in good working condition and it also helps to find out problems in hardware and correct the problems before they cause several damages.

 

Insurance

·      A means of protection from financial loss.

·      If a computer is damaged or stolen or any kind of harm done then we can claim for the insurance amount and get the economic support.

 

Dust Free Environment

·      Dust particles can cause the failure of hardware components.

·      Computer room should be absolutely free from dust and air pollution.

Protection from Fire

·      Due to faulty wiring, loose connection, smoking in the computer room and overload on power socket can cause fire in a room.

·      Using fire alarms, fire doors, fire detectors and fire extinguishers can minimize the damage of hardware components and loss of information from fire.

 

Protection from Theft

The computer room should have physical security with proper locking system, controlled access of authorized persons only by having human guard or biometric machine.

 

Air Condition System

A system for controlling the temperature and humidity (wetness) of the air

Maintains suitable temperature or humidity in the computer room.

Room Temperature should be maintained between 210C to 240C.

 

Power Protection Device

A power protection device is a tool used to safeguard electrical equipment from damage caused by issues with the power supply. Computer needs 220 volts to 240 volts constantly.

These devices protect against problems such as:

1.    Power Surges: Sudden increases in voltage.

2.    Power Outages: Loss of electricity.

3.    Voltage Fluctuations: Changes in voltage levels that are too high or too low.

Examples include:

  • Surge Protectors: Prevent damage from voltage spikes.
  • UPS (Uninterruptible Power Supply): Provides backup power during outages.
  • Volt Guards: Protect against unsafe voltage levels.

These devices help keep the electronic equipment safe and ensure it works properly.

 

Why Power Protection Device needed?

Power protection device is needed in computer security is to prevent damage to the computer's hardware and data loss due to sudden power fluctuations.

 

 

Volt Guard

A volt guard is a device designed to protect electrical appliances from damage caused by voltage fluctuations.

It monitors the voltage supply and cuts off the power if it detects levels that are too high or too low.

This helps prevent damage to the devices from unstable power sources and ensures that they receive a consistent and safe voltage level.

 

UPS (Uninterruptible Power Supply)

·      UPS is a battery supported power protection device which controls the electric voltage and supplies clean and continuous power to the computer system even during power failures.

·      The importance of UPS in computer security system is that it controls fluctuation of electric voltage and provides enough backup electric power to the computer system when there is power failure.

 

Why do you connect your PC to the UPS?

We connect PC to the UPS to control fluctuation of electric voltage and provides enough backup electric power to the computer system when there is power failure.

 

Spike Guard

A device designed to protect electrical devices from voltage spikes.

Automatically maintains a constant voltage level.

 

Software security
Software security is the protection of computer programs and applications from threats, such as hacking, virus attacks, and unauthorized access, to ensure their confidentiality, integrity, and availability.

 

Some of the software security measures 

- Backup                - Scandisk         - Password                 - Antivirus

 

Scan disk

Scan Disk is a tool used to check and fix problems on a computer’s hard drive. It looks for errors and bad sectors on the disk and tries to fix them.

 

 

 

List some points about how we can protect our data.

·      Install and Use Antivirus Software.

·      Create and maintain backups of important data so it can be restored it if it's lost or compromised.

 

What is digital signature?

Digital signature is a security mechanism system used on the internet for data and information transaction by attaching a code at the end of the electronic message that confirms the authenticity of sent message.

The importance of digital signature is that it provides legal framework to facilitate and safeguard electronic transaction in the electronic media

 

What is digital currency?

Digital currency is money that exists only in electronic form and is used for online transaction. Examples include cryptocurrencies like Bitcoin and digital versions of traditional currencies, such as digital dollars.

No comments:

Post a Comment