Selected Topics in Computer Science
Selected Topics in Computer Science
Safety refers to the protection of systems, individuals, and assets from accidental harm or
unintentional failures. It focuses on ensuring that a system operates without causing danger to
its users or surroundings.
Computer Security refers to the protection of computer systems, networks, and data from
unauthorized access, cyberattacks, and data breaches. It ensures the confidentiality, integrity,
and availability of digital information.
---
2. Using real-life examples, what are the differences between safety and security?
---
3. Explain this statement: "Safety describes a state where a system is protected from its
environment, whereas security is a condition where the environment of a system is protected
against failure."
This statement highlights the key distinction between safety and security in system protection:
Safety focuses on protecting a system from external factors (e.g., natural disasters, accidental
failures).
Example: A power plant is designed with cooling systems to prevent overheating (protecting the
system from its environment).
Security ensures that external threats cannot harm the system (e.g., hacking, sabotage,
cyberattacks).
Example: A bank’s security system ensures that hackers cannot manipulate transactions
(protecting the environment from security breaches).
In summary, safety ensures a system can function without being harmed, while security ensures
that the system cannot be exploited by malicious threats.
---
Security depends on several fundamental principles that ensure systems remain protected from
attacks. These include:
1. Authentication – Verifying the identity of users to ensure only authorized individuals can
access systems.
2. Access Control – Restricting users to only the information and resources they are authorized
to access.
4. Network Security – Protecting data during transmission over networks to prevent hacking
and eavesdropping.
5. Incident Response – Implementing procedures to detect, respond to, and recover from
security breaches.
8. Security Policies – Establishing rules and guidelines to enforce cybersecurity best practices.
These independent issues work together to create a comprehensive security system that
protects against cyber threats, unauthorized access, and data breaches.
---
1. What is confidentiality?
---
2. What are the primary duties of a detection mechanism?
Detection mechanisms are security systems designed to identify and alert users about potential
threats or breaches.
Examples:
Intrusion Detection Systems (IDS) – Detects unauthorized access attempts.
---
---
Integrity ensures that data remains accurate, consistent, and unaltered during storage or
transmission.
2. Digital Signatures – Ensure that documents or messages are authentic and untampered.
3. Access Controls – Restrict modification rights to authorized users only.
4. Audit Logs – Maintain records of all system changes to detect unauthorized modifications.
Example:
When downloading a software update, a checksum ensures that no malicious changes have
been made to the file.
---
Availability refers to ensuring that a system and its resources are accessible when needed.
Threats to availability:
Example:
---
Key Differences:
Prevention focuses on stopping threats, while detection focuses on identifying ongoing threats.
Example: A firewall prevents hackers from entering a network, while an IDS detects an intruder
who bypassed security.
---
1. What is a system?
Examples of Systems:
Computer Systems – Hardware and software components working together to process data.
Security Systems – Measures such as firewalls, encryption, and authentication to protect assets.
Plumbing Systems – Piping networks that control the flow of water in buildings.
---
2. Explain the meaning of this statement: “Our increasing use of systems (computer systems,
security systems, bureaucratic systems, quality control systems, electrical systems, plumbing
systems) is an embracement of presumed rigour.”
This statement suggests that as society relies more on systems, we assume that these
systems are designed with rigor and precision to function reliably.
"Presumed Rigour" – Assumes that these systems have been carefully designed, tested, and
implemented to prevent failures.
Example:
A computer security system is expected to provide strong protection against cyber threats.
However, if not properly designed, it can have vulnerabilities that attackers can exploit.
This statement highlights the importance of testing and maintaining systems to ensure they
truly provide the security and efficiency they promise.
---
3. Identify types of faults that can be exploited by attackers.
Types of Faults:
1. Software Bugs – Programming errors that create vulnerabilities (e.g., buffer overflow, SQL
injection).
2. Misconfigurations – Incorrect system settings that expose sensitive data (e.g., weak access
controls).
5. Human Errors – Mistakes made by users, such as using weak passwords or falling for
phishing attacks.
Example:
---
4. What is a threat?
A threat is any potential event, action, or entity that can cause harm to a system by exploiting its
vulnerabilities.
Types of Threats:
Example:
A phishing attack where a hacker tricks an employee into revealing login credentials is a
cybersecurity threat.
---
According to Shirey (1823), threats can be classified into four broad categories:
---
These answers cover all aspects of the study questions. Let me know if you need any
modifications!
a) Preventive Approach
Implements security measures such as firewalls, encryption, authentication, and access control.
Example:
b) Reactive Approach
Uses intrusion detection systems (IDS), security logs, and incident response teams.
Helps mitigate damage by taking corrective actions after a breach.
Example:
---
2. Are there any advantages associated with the reactive approach? If there are, list them.
2. Incident Response & Mitigation – Provides a plan to contain and resolve security breaches.
4. Adaptive Security Measures – Improves future preventive security based on past incidents.
5. Threat Intelligence Gathering – Collects data on attacks to enhance security policies.
---
The preventive approach follows a circular flow where security measures are continuously
improved to adapt to evolving threats.
After step 5, the cycle repeats itself to ensure continuous security enhancement.
---
3. Security Logs & Monitoring – Tracks system activities to identify suspicious behavior.
6. Patch Management – Applies security updates to fix vulnerabilities after they have been
exploited.
a) Preventive Approach
Implements security measures such as firewalls, encryption, authentication, and access control.
b) Reactive Approach
Uses intrusion detection systems (IDS), security logs, and incident response teams.
Example:
---
2. Are there any advantages associated with the reactive approach? If there are, list them.
2. Incident Response & Mitigation – Provides a plan to contain and resolve security breaches.
4. Adaptive Security Measures – Improves future preventive security based on past incidents.
---
The preventive approach follows a circular flow where security measures are continuously
improved to adapt to evolving threats.
After step 5, the cycle repeats itself to ensure continuous security enhancement.
---
3. Security Logs & Monitoring – Tracks system activities to identify suspicious behavior.
5. Threat Intelligence – Uses attack data to predict and prevent future threats.
6. Patch Management – Applies security updates to fix vulnerabilities after they have been
exploited.
---
This set of answers fully covers the study questions. Let me know if you need further
clarifications!
Study Questions and Answers
The security process consists of several elements that work together to protect systems,
networks, and data from threats.
2. Preventive Measures – Implements security controls like firewalls, encryption, and access
control.
3. Detection Mechanisms – Uses intrusion detection systems (IDS) and security monitoring to
identify attacks.
5. Recovery and Mitigation – Restores systems and applies fixes to prevent future attacks.
---
Risk analysis involves identifying potential security risks and evaluating their impact.
2. Identify Threats and Vulnerabilities – Assess weaknesses that attackers could exploit.
1. Risk Avoidance – Eliminating risks where possible (e.g., disabling unnecessary network ports).
5. Monitoring and Review – Continuously reassessing risks and updating security policies.
---
3. Why is it important to view security as a continuous process, rather than a product that can
be applied anywhere?
2. Software and System Updates – Security patches must be applied to address vulnerabilities.
3. User Behavior Changes – Employees may adopt new technology or practices, introducing
new risks.
5. Monitoring and Incident Response – Security breaches must be detected and mitigated in
real-time.
Example:
A company that installs firewalls but does not update them regularly remains vulnerable to new
hacking techniques.
By treating security as a continuous process, organizations can adapt and defend against ever-
changing cyber threats.
---
These answers fully address the study questions. Let me know if you need further clarifications!
Threats to security originate from different sources and can cause harm to systems, data, or
networks.
Sources of Threats:
1. Natural Threats – Environmental factors such as earthquakes, floods, and fires that can
damage IT infrastructure.
5. Supply Chain Threats – Risks from third-party vendors who may introduce security
weaknesses.
---
---
5. Insider Threats – Employees or contractors misusing access for personal gain or sabotage.
---
6. Social Engineering Mistakes – An employee unknowingly sharing login details over the phone.
---
These answers fully address the study questions. Let me know if you need further explanations!
Threats to security originate from different sources and can cause harm to systems, data, or
networks.
Sources of Threats:
1. Natural Threats – Environmental factors such as earthquakes, floods, and fires that can
damage IT infrastructure.
5. Supply Chain Threats – Risks from third-party vendors who may introduce security
weaknesses.
---
---
5. Insider Threats – Employees or contractors misusing access for personal gain or sabotage.
6. Social Engineering Mistakes – An employee unknowingly sharing login details over the phone.
---
These answers fully address the study questions. Let me know if you need further explanations!
A computer security model is a framework that defines rules, policies, and procedures for
protecting computer systems from threats. It specifies how access control, confidentiality, and
integrity are maintained within an information system.
Rules:
No Read Up (Simple Security Property) – A lower-level user cannot read higher-level data.
No Write Down (*-Property) – A higher-level user cannot write to a lower security level.
---
The Biba Model enforces data integrity using three main properties:
1. Simple Integrity Property (No Read Down) – Higher-level users cannot read lower-integrity
data.
2. Star Integrity Property (No Write Up) – Lower-level users cannot modify higher-integrity data.
3. Invocation Property – Users cannot execute higher-privileged programs if they have lower
integrity.
Example:
A financial auditor (high integrity) cannot modify records created by an accountant (low
integrity).
---
The Bell-LaPadula (BLP) Model enforces data confidentiality using three properties:
1. Simple Security Property (No Read Up) – A subject cannot read data at a higher security level.
2. Star Property (No Write Down) – A subject cannot write data to a lower security level.
3. Discretionary Security Property – Access permissions are assigned using an access matrix.
Example:
A classified military document (Top Secret) cannot be read by a lower-level officer (Secret
clearance).
---
5. Illustrate how security models are used in the design of an Operating System.
Security models help in OS design by enforcing access control, authentication, and data
protection.
Example:
Windows and Linux use access control lists (ACLs) to implement Bell-LaPadula’s confidentiality
model.
MacOS uses sandboxing to apply the Biba integrity model, restricting app permissions.
---
The Clark-Wilson Model ensures data integrity using the following rules:
1. Well-Formed Transactions – Data modifications must follow defined rules.
2. Separation of Duties – No single user should have full control over critical processes.
3. Access Control Triple (Subject, Program, Object) – Users must use authorized programs to
modify data.
Example:
In banking systems, an employee cannot approve their own financial transactions, ensuring
separation of duties.
---
These answers fully address the study questions. Let me know if you need more details!
Study Questions and Answers
1. Confusion – Ensures that the relationship between the plaintext and ciphertext is complex,
making it difficult for attackers to predict the encryption pattern.
Example: Substitution ciphers, where letters are replaced with different symbols or characters.
2. Diffusion – Ensures that changes in the plaintext affect multiple parts of the ciphertext,
making it harder to determine the original message.
Example: A single letter change in plaintext should result in multiple changes in ciphertext using
block ciphers like AES.
---
2. Encryption methods have historically been divided into two categories. Identify and discuss
these categories using real examples.
It is fast and efficient, but sharing the secret key securely is a challenge.
Example:
Data Encryption Standard (DES): Older encryption used in early network security.
Example:
---
3. What is cryptography?
When you enter your password on a website, it is hashed using cryptographic techniques before
storage to prevent attackers from viewing the original password.
---
Plaintext:
"pleasedonottransferthesumofonehundredmillionnairaintotheaccountofthesupplieraspreviously
agreed"
pleasedo
nottrans
ferthesu
mofonehu
ndredmil
lionnair
aintothe
accounto
fthesupp
lieraspr
eviously
agreed
Ciphertext:
pnmfnalilaol ldoitcogtn
ltfoeiaimvo ienneoenuee
eteoncnrtra snmdrutvsel
aetsftdouhi essoroipoya
srrhooeimnp esioiurpgls
ednsnhltoln edreusliaed
---
These answers fully cover the study questions. Let me know if you need further clarifications!