Mod-05
Computer security-
Computer Security refers to the protection of computer systems and data
from harm, theft, and unauthorized access. It ensures confidentiality,
integrity, and availability of data.
The key components are:
Confidentiality – Ensuring only authorized users access the data.
Integrity – Protecting data from unauthorized modification.
Availability – Ensuring systems are operational when needed.
Techniques include:
Firewalls
Antivirus software
Encryption
Authentication mechanisms
Masquerading-
Masquerading is a security attack in which an attacker pretends to be an
authorized user to gain access to a system. This is typically done by stealing
user credentials like usernames and passwords.
Example: A hacker logs in to a system using someone else’s credentials to
access sensitive files.
Protection Techniques:
Strong password policies
Multi-factor authentication
Intrusion detection systems
Man-in-the-middle attack-
A Man-in-the-Middle (MitM) attack is a type of cyberattack where the
attacker secretly intercepts and possibly alters communication between
two parties who believe they are directly communicating.
Example: An attacker intercepting login credentials during an unencrypted
Wi-Fi session.
Prevention:
Use of HTTPS protocols
Strong encryption
VPNs and secure networks
4 layers of system security model-
The System Security Model consists of four layers:
1. Physical Security – Protection of hardware (e.g., locked rooms, CCTV).
2. Network Security – Securing data during transmission (e.g., firewalls).
3. OS-level Security – Access control, user authentication, encryption.
4. Application-level Security – Security features within software (e.g.,
input validation).
Diagram
Malware with example-
Malware (Malicious Software) is a type of software designed to damage,
disrupt, or gain unauthorized access to computer systems. It includes
viruses, worms, trojan horses, ransomware, and spyware.
Example:
WannaCry Ransomware – A malware that encrypted users’ files and
demanded ransom in Bitcoin.
Ways to prevent malware:
Install antivirus software
Keep systems updated
Avoid downloading from untrusted sources
Access matrix-
An Access Matrix is a security model that defines the rights of subjects
(users) on objects (resources) in a system.
It helps in implementing access control.
Rows represent subjects (users, processes).
Columns represent objects (files, printers).
Entries define the rights (read, write, execute) a subject has on an
object.
Diagram
Computer virus-
A computer virus is a program that can replicate itself and spread
from one computer to another, often causing harm like deleting files,
slowing the system, stealing data, etc.
Effects:
Corrupts files
Slows down system performance
Deletes important data
Example: ILOVEYOU Virus – Spread via email and damaged millions of
computers.
Prevention:
Use updated antivirus
Avoid opening unknown email attachments
Sniffing-
Sniffing is a technique used to monitor and capture data packets traveling
through a network. It is often used by hackers to collect sensitive
information like passwords and credit card numbers.
Types:
Passive sniffing – Monitors traffic without altering it.
Active sniffing – Involves injecting traffic into the network.
Tools: Wireshark, tcpdump
Prevention:
Use encryption (HTTPS, SSL)
Secure switches and routers
Spoofing-
Spoofing is a cyberattack where a person or program disguises as another by
falsifying data to gain an illegitimate advantage.
Types:
IP Spoofing
Email Spoofing
DNS Spoofing
Example: A hacker sends an email appearing to be from a trusted source to
steal login credentials.
Prevention:
Use email authentication (SPF, DKIM)
Enable firewalls
Avoid suspicious links
Denial of Services-
Denial of Service (DoS) is an attack that aims to make a machine or network
resource unavailable to users by overwhelming it with traffic.
Symptoms:
Server slowdown or crash
Inaccessibility of services
Example: Flooding a website with too many requests to make it
unresponsive.
Prevention:
Firewalls
Intrusion Detection Systems (IDS)
Rate-limiting mechanisms
Encryption of Data-
Encryption is the process of converting plaintext data into unreadable
ciphertext to prevent unauthorized access. It ensures data confidentiality
and security during storage or transmission.
Benefits:
Protects sensitive information
Maintains privacy
Prevents data tampering
Different types of Encryptions-
Types:
Symmetric encryption: Same key for encryption and decryption (e.g.,
AES).
Asymmetric encryption: Different keys for encryption and decryption
(e.g., RSA).
Trojan horse-
A Trojan Horse is a type of malware that appears to be a legitimate program
but performs malicious activities once installed.
Features:
Does not replicate itself (unlike viruses).
Can steal data, create backdoors, or corrupt files.
Often spread via emails, fake software, or websites.
Example: A free game download that secretly installs spyware.
Prevention:
Avoid downloading from untrusted sources.
Use antivirus and firewall.
Any 3 types of authentications-
Authentication is the process of verifying the identity of a user or system.
Common types include:
1. Password-based authentication – The most common method using a
username and password.
2. Biometric authentication – Uses unique physical traits like fingerprints,
face, or iris.
3. Two-Factor Authentication (2FA) – Combines two methods, like a
password + OTP.
Purpose: To ensure that only authorized users access the system.
Few techniques to protect password-
i. Use strong passwords (combination of uppercase, lowercase, numbers,
symbols).
ii. Avoid using personal information (name, birthdate).
iii. Enable two-factor authentication.
iv. Change passwords regularly.
v. Never share passwords and use password managers.
Goal: Prevent unauthorized access and reduce risk of breaches.
In UNIX, how file can be protected from modifying-
In UNIX, file protection is managed using file permissions:
Each file has read (r), write (w), and execute (x) permissions for:
Owner
Group
Others
To prevent modification, remove write permission: chmod -w filename
Or for others: chmod o-w filename
Use ls -l to view permissions. This ensures only authorized users can modify
the file.
How to clean up your browser-
Cleaning up your browser improves performance and privacy. Steps:
1. Clear browsing history and cache.
2. Delete cookies (Settings > Privacy > Clear browsing data).
3. Disable unused extensions.
4. Use incognito/private mode for sensitive browsing.
5. Update your browser for security patches.
Tools: Chrome Cleanup Tool, built-in privacy settings.
Features of Windows 10 security
Windows Defender Antivirus – Built-in real-time protection.
Firewall & Network Protection – Blocks unauthorized access.
BitLocker – Encrypts hard drives.
Secure Boot – Prevents malware from loading during startup.
Windows Hello – Facial/fingerprint login.
Exploit Protection – Protects against malicious exploits.
All these features together improve system security.
Windows Defender-
Windows Defender is Microsoft’s built-in antivirus and security tool.
Features:
Real-time protection against malware and spyware.
Regular updates for virus definitions.
Firewall integration.
Controlled folder access (prevents ransomware).
Cloud-based threat detection.
Advantage: No need for third-party antivirus for most users.