Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
3 views5 pages

OS Mod5

The document provides an overview of computer security, including key concepts such as confidentiality, integrity, and availability, as well as various security threats like masquerading, man-in-the-middle attacks, and malware. It outlines prevention techniques, types of encryption, and authentication methods to protect systems and data. Additionally, it covers specific tools and features for enhancing security in systems like Windows 10 and UNIX.

Uploaded by

shivi srivastav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views5 pages

OS Mod5

The document provides an overview of computer security, including key concepts such as confidentiality, integrity, and availability, as well as various security threats like masquerading, man-in-the-middle attacks, and malware. It outlines prevention techniques, types of encryption, and authentication methods to protect systems and data. Additionally, it covers specific tools and features for enhancing security in systems like Windows 10 and UNIX.

Uploaded by

shivi srivastav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Mod-05

 Computer security-
Computer Security refers to the protection of computer systems and data
from harm, theft, and unauthorized access. It ensures confidentiality,
integrity, and availability of data.
The key components are:
 Confidentiality – Ensuring only authorized users access the data.
 Integrity – Protecting data from unauthorized modification.
 Availability – Ensuring systems are operational when needed.
Techniques include:
 Firewalls
 Antivirus software
 Encryption
 Authentication mechanisms
 Masquerading-
Masquerading is a security attack in which an attacker pretends to be an
authorized user to gain access to a system. This is typically done by stealing
user credentials like usernames and passwords.
Example: A hacker logs in to a system using someone else’s credentials to
access sensitive files.
Protection Techniques:
 Strong password policies
 Multi-factor authentication
 Intrusion detection systems
 Man-in-the-middle attack-
A Man-in-the-Middle (MitM) attack is a type of cyberattack where the
attacker secretly intercepts and possibly alters communication between
two parties who believe they are directly communicating.
Example: An attacker intercepting login credentials during an unencrypted
Wi-Fi session.
Prevention:
 Use of HTTPS protocols
 Strong encryption
 VPNs and secure networks
 4 layers of system security model-
The System Security Model consists of four layers:
1. Physical Security – Protection of hardware (e.g., locked rooms, CCTV).
2. Network Security – Securing data during transmission (e.g., firewalls).
3. OS-level Security – Access control, user authentication, encryption.
4. Application-level Security – Security features within software (e.g.,
input validation).
Diagram
 Malware with example-
Malware (Malicious Software) is a type of software designed to damage,
disrupt, or gain unauthorized access to computer systems. It includes
viruses, worms, trojan horses, ransomware, and spyware.
Example:
WannaCry Ransomware – A malware that encrypted users’ files and
demanded ransom in Bitcoin.
Ways to prevent malware:
 Install antivirus software
 Keep systems updated
 Avoid downloading from untrusted sources
 Access matrix-
An Access Matrix is a security model that defines the rights of subjects
(users) on objects (resources) in a system.
It helps in implementing access control.
 Rows represent subjects (users, processes).
 Columns represent objects (files, printers).
 Entries define the rights (read, write, execute) a subject has on an
object.
Diagram
 Computer virus-
A computer virus is a program that can replicate itself and spread
from one computer to another, often causing harm like deleting files,
slowing the system, stealing data, etc.
Effects:
 Corrupts files
 Slows down system performance
 Deletes important data
Example: ILOVEYOU Virus – Spread via email and damaged millions of
computers.
Prevention:
 Use updated antivirus
 Avoid opening unknown email attachments
 Sniffing-
Sniffing is a technique used to monitor and capture data packets traveling
through a network. It is often used by hackers to collect sensitive
information like passwords and credit card numbers.
Types:
 Passive sniffing – Monitors traffic without altering it.
 Active sniffing – Involves injecting traffic into the network.
Tools: Wireshark, tcpdump
Prevention:
 Use encryption (HTTPS, SSL)
 Secure switches and routers
 Spoofing-
Spoofing is a cyberattack where a person or program disguises as another by
falsifying data to gain an illegitimate advantage.
Types:
 IP Spoofing
 Email Spoofing
 DNS Spoofing
Example: A hacker sends an email appearing to be from a trusted source to
steal login credentials.
Prevention:
 Use email authentication (SPF, DKIM)
 Enable firewalls
 Avoid suspicious links
 Denial of Services-
Denial of Service (DoS) is an attack that aims to make a machine or network
resource unavailable to users by overwhelming it with traffic.
Symptoms:
 Server slowdown or crash
 Inaccessibility of services
Example: Flooding a website with too many requests to make it
unresponsive.
Prevention:
 Firewalls
 Intrusion Detection Systems (IDS)
 Rate-limiting mechanisms
 Encryption of Data-
Encryption is the process of converting plaintext data into unreadable
ciphertext to prevent unauthorized access. It ensures data confidentiality
and security during storage or transmission.
Benefits:
 Protects sensitive information
 Maintains privacy
 Prevents data tampering
 Different types of Encryptions-
Types:
 Symmetric encryption: Same key for encryption and decryption (e.g.,
AES).
 Asymmetric encryption: Different keys for encryption and decryption
(e.g., RSA).
 Trojan horse-
A Trojan Horse is a type of malware that appears to be a legitimate program
but performs malicious activities once installed.
Features:
 Does not replicate itself (unlike viruses).
 Can steal data, create backdoors, or corrupt files.
 Often spread via emails, fake software, or websites.
Example: A free game download that secretly installs spyware.
Prevention:
 Avoid downloading from untrusted sources.
 Use antivirus and firewall.
 Any 3 types of authentications-
Authentication is the process of verifying the identity of a user or system.
Common types include:
1. Password-based authentication – The most common method using a
username and password.
2. Biometric authentication – Uses unique physical traits like fingerprints,
face, or iris.
3. Two-Factor Authentication (2FA) – Combines two methods, like a
password + OTP.
Purpose: To ensure that only authorized users access the system.
 Few techniques to protect password-
i. Use strong passwords (combination of uppercase, lowercase, numbers,
symbols).
ii. Avoid using personal information (name, birthdate).
iii. Enable two-factor authentication.
iv. Change passwords regularly.
v. Never share passwords and use password managers.
Goal: Prevent unauthorized access and reduce risk of breaches.
 In UNIX, how file can be protected from modifying-
In UNIX, file protection is managed using file permissions:
Each file has read (r), write (w), and execute (x) permissions for:
Owner
Group
Others
To prevent modification, remove write permission: chmod -w filename
Or for others: chmod o-w filename
Use ls -l to view permissions. This ensures only authorized users can modify
the file.
 How to clean up your browser-
Cleaning up your browser improves performance and privacy. Steps:
1. Clear browsing history and cache.
2. Delete cookies (Settings > Privacy > Clear browsing data).
3. Disable unused extensions.
4. Use incognito/private mode for sensitive browsing.
5. Update your browser for security patches.
Tools: Chrome Cleanup Tool, built-in privacy settings.
 Features of Windows 10 security
Windows Defender Antivirus – Built-in real-time protection.
Firewall & Network Protection – Blocks unauthorized access.
BitLocker – Encrypts hard drives.
Secure Boot – Prevents malware from loading during startup.
Windows Hello – Facial/fingerprint login.
Exploit Protection – Protects against malicious exploits.
All these features together improve system security.
 Windows Defender-
Windows Defender is Microsoft’s built-in antivirus and security tool.
Features:
 Real-time protection against malware and spyware.
 Regular updates for virus definitions.
 Firewall integration.
 Controlled folder access (prevents ransomware).
 Cloud-based threat detection.
Advantage: No need for third-party antivirus for most users.

You might also like