0% found this document useful (0 votes)
31 views

Security in computing

Information protection is essential for preventing data breaches, maintaining privacy, and avoiding financial losses. It involves understanding various threats, such as malware and phishing, and implementing security measures like firewalls and intrusion detection systems. The CIA Triad (Confidentiality, Integrity, Availability) serves as a foundational model for securing data and ensuring trust in digital interactions.

Uploaded by

ptemp389
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views

Security in computing

Information protection is essential for preventing data breaches, maintaining privacy, and avoiding financial losses. It involves understanding various threats, such as malware and phishing, and implementing security measures like firewalls and intrusion detection systems. The CIA Triad (Confidentiality, Integrity, Availability) serves as a foundational model for securing data and ensuring trust in digital interactions.

Uploaded by

ptemp389
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Importance of Information Protection

Information protection is crucial because it helps keep data safe from


unauthorized access, theft, and damage. Here’s why it matters:
1. Prevents Data Breaches – Protecting information stops hackers
from stealing personal and business data.
2. Maintains Privacy – Ensures sensitive data, like personal details
and financial records, remains confidential.
3. Avoids Financial Loss – Cyberattacks can cause huge losses due to
fraud, ransom demands, and legal fines.
4. Ensures Business Continuity – Protecting data prevents
disruptions, ensuring smooth operations.
5. Builds Trust – Customers and employees trust organizations that
keep their data secure.
6. Complies with Legal Requirements – Many countries have strict
data protection laws (e.g., GDPR, IT Act).
7. Prevents Identity Theft – Protecting personal data stops criminals
from misusing identities.
A threat is anything that can harm or damage a system, data, or network. It can
be intentional (like hacking) or unintentional (like human error).
Common Types of Threats:
1. Malware – Harmful software (viruses, Trojans).
2. Phishing – Fake emails to steal info.
3. Hacking – Unauthorized access to systems.
4. Insider Threats – Employees causing harm.
5. DoS Attacks – Overloading systems to shut them down.
Impact of Threats:
 Loss of data
 System crashes
 Financial losses
 Reputation damage
2. Threat Sources (Where threats come from)
 Human Threats – Hackers, malicious insiders, cybercriminals.
 Technical Threats – Malware, viruses, software bugs.
 Natural Threats – Earthquakes, floods, fires causing system failures.
 Operational Threats – Weak passwords, misconfigurations,
human errors.
3. Threat Targets (What threats attack)
 Data – Personal, financial, or business information.
 Systems – Computers, servers, networks.
 Users – Individuals targeted through phishing or scams.
 Infrastructure – Websites, databases, cloud storage.
Application Layer Attack (Simple Explanation)
An application layer attack targets software applications like websites or email
systems to steal data or disrupt services. The goal of these attacks is to exploit
vulnerabilities in software or applications to gain unauthorized access, disrupt
services, or steal data.
Types of Application Layer Attacks:
1. SQL Injection – Attacker inserts harmful code into a website’s input
fields to access databases.
2. Cross-Site Scripting (XSS) – Malicious code is added to web pages
to steal data or control user actions.
3. Cross-Site Request Forgery (CSRF) – Attacker tricks users into
performing unwanted actions on a website.
4. Command Injection – Attacker inserts harmful commands into
input fields to take control of a server.

Password Cracking
Password cracking is the process of attempting to guess or decode a password
to gain unauthorized access to an account or system. Attackers use various
methods to crack weak passwords.

Buffer Overflow
A buffer overflow occurs when a program tries to store more data in a buffer
(temporary data storage) than it can hold, causing the extra data to
overwrite adjacent memory. This can lead to unexpected behavior, crashes,
or even the execution of malicious code.
Different Types of Attacks in Computing Security (Simple Explanation)
Here are common types of attacks in computing security:
1. Malware Attacks: Harmful software like viruses, worms, and Trojans
that damage or steal data.
2. Phishing Attacks: Attackers trick users into sharing sensitive info
(like passwords) by pretending to be trustworthy.
3. Denial-of-Service (DoS): Attackers overload a server with too
many requests, causing it to crash and stop working.
4. Man-in-the-Middle (MitM): The attacker intercepts and
alters communication between two parties.
5. SQL Injection: Attackers insert malicious code into a website’s
input fields to access its database.
6. Brute Force Attack: The attacker tries every possible password or
key until they find the correct one.
7. Ransomware: Malware that locks your files and demands money
to unlock them.
8. Cross-Site Scripting: Malicious scripts injected into websites that run
on users' browsers, stealing data or taking control of accounts.
9. Social Engineering: Attackers manipulate people into giving out
confidential information or performing actions that compromise security.
10.Insider Attack: Someone inside the organization (like an
employee) misuses their access to harm the system or steal data.
11.Session Hijacking: The attacker takes control of a session between a
user and a website, pretending to be the user.
12.Buffer Overflow: The attacker sends more data to a program than it
can handle, causing it to crash or let them execute harmful code.
One-Time Password (OTP) System (Simple Explanation)
A One-Time Password (OTP) is a password that is valid for only one login
session or transaction. It provides an extra layer of security because even if
someone intercepts the OTP, they won't be able to use it again.
How OTP Works:
1. Request: The user enters their regular login information
(username, password).
2. OTP Generation: The system generates a unique, temporary
password (OTP) and sends it to the user, usually via:
o SMS
o Email
o Authenticator apps (like Google Authenticator or Authy)
3. Verification: The user enters the OTP within a short period (typically
a few minutes).
4. Access Granted: If the OTP matches, the user is granted access.
Why OTP is Secure:
 Single Use: Once used, the OTP cannot be reused, making it much
safer than regular passwords.
 Short Life: OTPs are time-sensitive, meaning they expire after a
few minutes, reducing the risk of interception.
 Two-Factor Authentication (2FA): OTPs are often used as a second
factor in two-factor authentication systems, adding more security to
online
accounts.
Protection:
 Use for sensitive transactions: OTPs should be used for activities like
logging into accounts, making payments, or changing account
settings.
 Secure Delivery: Ensure OTPs are sent securely, via encrypted channels
OTP systems make it harder for attackers to access accounts, even if they know
your regular password.
CIA Triad
The CIA Triad is a widely used model to guide security practices, ensuring the
protection of information. It consists of three core principles:
1. Confidentiality
o What it is: Ensuring that only authorized individuals or
systems can access specific data.
o Goal: Protect sensitive information from unauthorized access
or disclosure.
2. Integrity
o What it is: Ensuring that the data remains accurate, complete,
and unaltered during storage, transmission, or processing.
o Goal: Protect data from being tampered with or modified
by unauthorized individuals.
3. Availability
o What it is: Ensuring that data and services are accessible
and usable when needed by authorized users.
o Goal: Prevent disruptions to data access or service outages.
Why It's Important:
The CIA Triad helps organizations secure their data, maintain trust with users,
and protect against cyber threats. By focusing on confidentiality, integrity, and
availability, organizations ensure that information remains safe, reliable, and
Accessible.
Firewall and Its Features
A firewall is a security system that acts as a barrier between a trusted internal
network (like your home or office network) and an untrusted external network
(like the internet). It monitors and controls incoming and outgoing network
traffic based on security rules to protect against cyber threats.

Features of a Firewall:

1. Packet Filtering – Inspects data packets and allows or blocks


them based on predefined rules.

2. Stateful Inspection – Tracks active connections and makes


decisions based on the state of the connection.

3. Proxy Service – Acts as an intermediary between users and the


internet, filtering traffic to ensure security.

4. Intrusion Detection and Prevention (IDS/IPS) – Detects and


blocks suspicious activities in real-time.

5. VPN Support – Allows secure remote access by encrypting data


transmission.

6. Logging and Monitoring – Records network activity to help in


detecting and analysing security threats.

7. Access Control – Restricts access to unauthorized users or


applications.

8. Deep Packet Inspection (DPI) – Examines the content of data


packets for threats, not just headers.
Intrusion Detection System (IDS)

An Intrusion Detection System (IDS) is a security tool that monitors network


traffic or system activities for suspicious behaviour and security threats. It helps
detect cyberattacks like hacking, malware, or unauthorized access.

Types of IDS:
1. Network-based IDS (NIDS) – Monitors network traffic to detect threats
across multiple devices.
2. Host-based IDS (HIDS) – Monitors activity on a single computer or server,
checking logs, system files, and application activities.
Functions of IDS:
 Traffic Monitoring – Analyzes network data for unusual patterns.
 Attack Detection – Identifies known attack signatures (e.g., brute-force
attacks, malware).
 Alert Generation – Notifies administrators when suspicious activity is
detected.
 Log Analysis – Records events to help in forensic investigations.

Intrusion Prevention System (IPS)


An Intrusion Prevention System (IPS) is a security tool that detects and actively
blocks cyber threats in real time. It is like an advanced version of an IDS
because, while IDS only detects attacks, IPS detects and prevents them.

How IPS Works:


1. Monitors network traffic – Scans data packets for suspicious activity.
2. Detects threats – Uses known attack signatures and behaviour analysis.
3. Prevents attacks – Blocks malicious traffic by dropping packets or blocking
IP addresses.
4. Logs events – Records details of detected threats for analysis.

Types of IPS:
1. Network-based IPS (NIPS) – Protects an entire network by monitoring
traffic.
2. Host-based IPS (HIPS) – Protects a single device (like a server) by
monitoring its activities.
Wireless Network Positioning

Wireless network positioning refers to determining the location of devices using


wireless signals like Wi-Fi, GPS, Bluetooth, and cellular networks. It is commonly
used in navigation, asset tracking, and location-based services.

Methods of Wireless Positioning:


1. GPS (Global Positioning System) – Uses satellites to find exact locations.
2. Wi-Fi Positioning System (WPS) – Determines location using nearby Wi-Fi
access points.
3. Cell Tower Triangulation – Uses signals from multiple cell towers to
estimate position.
4. Bluetooth-based Positioning – Uses Bluetooth beacons for indoor
navigation.

Secure Gateways

A secure gateway is a security system that controls and filters traffic between an
internal network and external sources (like the internet). It ensures safe access
to resources while blocking threats.

Types of Secure Gateways:


1. Web Secure Gateway (WSG) – Filters and monitors web traffic, blocking
malicious sites.
2. Email Secure Gateway (ESG) – Protects against spam, phishing, and email-
based attacks.
3. Cloud Secure Gateway (CSG) – Ensures safe access to cloud applications
and services.

Functions of Secure Gateways:


 Traffic Filtering – Blocks harmful websites and malware.
 Data Encryption – Protects sensitive data during transmission.
 User Authentication – Ensures only authorized users access the network.
 Threat Prevention – Detects and stops cyberattacks before they reach
users.
Signature Detection Model

The Signature Detection Model is a security technique used in Intrusion


Detection Systems (IDS), Intrusion Prevention Systems (IPS), and antivirus
software to identify known threats based on a predefined database of attack
patterns (signatures).

How It Works:
1. Database of Signatures – The system maintains a collection of known
malware, viruses, or attack patterns.

2. Scanning & Matching – It scans incoming data, files, or network traffic and
compares it with known signatures.

3. Threat Detection – If a match is found, the system alerts or blocks the


threat.

Advantages:
✔ Fast and Efficient – Quickly detects known threats.
✔ Accurate – Minimal false positives for recognized attacks.
✔ Widely Used – Common in antivirus, IDS/IPS, and firewalls.

Disadvantages:
❌ Cannot Detect New Threats – Fails against unknown or modified malware.
❌ Requires Regular Updates – Needs frequent signature updates to stay
effective.
Wireless Intrusion Detection System (WIDS) & Wireless
Intrusion Prevention System (WIPS)

Wireless networks are more vulnerable to attacks like rogue access points,
eavesdropping, and denial-of-service (DoS) attacks. To protect them, we use
Wireless IDS (WIDS) and Wireless IPS (WIPS).

1. Wireless Intrusion Detection System (WIDS)


A WIDS monitors a wireless network for suspicious activities but does not take
action to block them.

Functions of WIDS:
✅ Scans for rogue access points – Detects unauthorized Wi-Fi networks.
✅ Monitors wireless traffic – Identifies unusual activity, like hacking attempts.
✅ Alerts administrators – Sends warnings when an attack is detected.
🔹 Limitation: WIDS can only detect threats, not prevent them.

2. Wireless Intrusion Prevention System (WIPS)


A WIPS goes a step further than WIDS—it not only detects but also prevents
wireless attacks.

Functions of WIPS:
✅ Blocks rogue access points – Prevents unauthorized Wi-Fi networks.
✅ Stops suspicious connections – Disconnects devices showing unusual
behaviour.
✅ Prevents Wi-Fi-based attacks – Protects against DoS, Man-in-the-Middle
(MITM), and eavesdropping attacks.
🔹 Limitation: If not configured properly, WIPS may block legitimate users.
Voice over IP (VoIP)

Voice over IP (VoIP) is a technology that allows voice calls to be made over the
Internet instead of traditional telephone networks. It converts voice signals into
digital data and transmits them over IP (Internet Protocol) networks.

How VoIP Works:


1. Voice Conversion – Your voice is converted into digital signals.
2. Data Transmission – The digital data is sent over the internet in packets.
3. Receiving & Playback – The packets are received by the other party and
converted back into sound.

Features of VoIP:
✅ Cost-effective – Cheaper than traditional phone calls, especially for long
distances.
✅ Flexibility – Works on multiple devices (phones, laptops, tablets).
✅ Advanced Features – Supports video calls, voicemail, call forwarding, and
conferencing.
✅ Uses the Internet – No need for separate telephone lines.

Examples of VoIP Services:


📞 WhatsApp Calls
📞 Skype
📞 Zoom & Google Meet
📞 Microsoft Teams
Cloud Computing

Cloud computing is a technology that allows users to store, manage, and process
data on remote servers (the cloud) instead of local computers or physical
storage devices. It provides on-demand access to computing resources over the
internet.

Key Characteristics of Cloud Computing:


✅ On-Demand Access – Users can access computing resources anytime.
✅ Scalability – Can easily scale up or down based on demand.
✅ Cost-Effective – Reduces the need for expensive hardware and maintenance.
✅ Accessibility – Access from anywhere with an internet connection.
✅ Automatic Updates – Cloud providers handle software and security updates.

Types of Cloud Computing:


1. Public Cloud – Services offered to multiple users over the internet (e.g.,
Google Drive, AWS).
2. Private Cloud – Exclusive cloud infrastructure for a single organization.
3. Hybrid Cloud – A mix of public and private clouds for better flexibility.

Cloud Service Models:


☁ Infrastructure as a Service (IaaS) – Provides virtual machines, storage, and
networking (e.g., AWS, Google Cloud).
☁ Platform as a Service (PaaS) – Offers platforms for developers to build and
deploy apps (e.g., Heroku, Azure App Services).
☁ Software as a Service (SaaS) – Provides ready-to-use software applications
(e.g., Gmail, Dropbox, Zoom).

Examples of Cloud Computing Services:


📂 Google Drive – Cloud storage for files.
🎥 Netflix – Streams videos using cloud servers.
️Amazon Web Services (AWS) – Provides cloud hosting and computing power.
Managing Sessions and Cookies in Secure Application Design

Sessions and cookies are used to store user-related data in web applications. If
not handled securely, they can lead to attacks like Session Hijacking, Cross-Site
Scripting (XSS), and Cross-Site Request Forgery (CSRF).

1. Secure Session Management


Sessions store user information on the server for a specific period.
✅ Best Practices for Secure Sessions:
1. Use Secure Session IDs – Generate random and unique session IDs to
prevent guessing.
2. Enable HTTPS – Always use SSL/TLS to encrypt session data.
3. Set Session Expiry – Automatically log out users after inactivity (e.g., 15
minutes).
4. Store Sessions Securely – Avoid storing sensitive data like passwords in
session variables.
🔹 Example Attack:
❌ Session Hijacking – An attacker steals an active session ID and gains
unauthorized access.

2. Secure Cookie Management


Cookies store user data on the client-side (browser), often used for
authentication and tracking.
✅ Best Practices for Secure Cookies:
1. Use HTTP Only Attribute – Prevents JavaScript from accessing cookies.
2. Use Secure Attribute – Ensures cookies are only sent over HTTPS.
3. Limit Cookie Lifespan – Set an expiration time to reduce risk.
4. Use Strong Encryption – Encrypt cookie values to prevent data leakage.
🔹 Example Attack:
❌ Cross-Site Scripting (XSS) – An attacker injects a malicious script to steal
cookies and hijack accounts.
SQL Injection (SQLi)
SQL Injection is a web security vulnerability that allows attackers to manipulate
a website’s database by injecting malicious SQL queries through input fields. It
occurs when user input is not properly validated, allowing hackers to access,
modify, or delete sensitive data.

How SQL Injection Works:


1. A website has an input field (e.g., login form, search bar).
2. The attacker enters a malicious SQL query instead of normal input.
3. If the input is not properly validated, the database executes the attacker's
query.

Types of SQL Injection:


1. Classic SQL Injection – Directly injecting SQL code into input fields.
2. Blind SQL Injection – Attacker gets no direct response but can extract data
using True/False conditions.
3. Time-Based SQL Injection – Uses SQL commands that delay responses to
confirm database behaviour.
4. Union-Based SQL Injection – Uses UNION queries to retrieve hidden data.

How to Prevent SQL Injection:


✅ Use Prepared Statements – Parameterized queries prevent injection.
✅ Input Validation – Allow only expected characters
✅ Escape User Input – Convert special characters to harmless text.
✅ Limit Database Privileges – Restrict access to prevent full control.
✅ Use Web Application Firewalls (WAF) – Detect and block SQLi attacks.
Cloud Computing Security Benefits
1. Data Protection & Encryption 🔒
✅ End-to-End Encryption – Protects data during storage and transmission.
✅ Regular Data Backups – Prevents data loss due to failures or cyberattacks.

2. Identity & Access Management (IAM) 👤


✅ Multi-Factor Authentication (MFA) – Requires multiple verifications (e.g.,
password + OTP).
✅ Role-Based Access Control (RBAC) – Limits user access based on their job
roles.
✅ Single Sign-On (SSO) – Users access multiple services with one secure login.

3. Protection Against Cyber Threats ️


✅ Firewalls & Intrusion Detection Systems (IDS) – Block unauthorized access
and monitor threats.
✅ AI & Threat Intelligence – Uses machine learning to detect and prevent
attacks.

4. Cost-Effective & Scalable Security 💰


✅ No Need for Expensive Hardware – Cloud providers handle security
infrastructure.
✅ On-Demand Security Features – Pay only for what you need.
✅ Automatic Security Updates – Cloud providers regularly patch vulnerabilities.
Switch and Router Basics
Switches and routers are essential networking devices that help in data transfer
and communication between computers and networks.

1. What is a Switch?
A switch is a network device that connects multiple devices within a local area
network (LAN) and helps them communicate efficiently.
🔹 Features of a Switch:
✅ Operates at Layer 2 (Data Link Layer) of the OSI model.
✅ Uses MAC addresses to forward data to the correct device.
✅ Provides multiple ports for connecting computers, printers, and other
devices.
✅ Improves network efficiency by sending data only to the intended device
instead of broadcasting it to all.
🔹 Example of a Switch in Use:
 A company's office network has multiple computers connected to a
switch.
 When Computer A sends data to Computer B, the switch forwards the
data only to Computer B, improving speed and security.

2. What is a Router?
A router connects different networks (e.g., home network to the internet) and
directs data between them.
🔹 Features of a Router:
✅ Operates at Layer 3 (Network Layer) of the OSI model.
✅ Uses IP addresses to forward data between networks.
✅ Connects LANs to the internet (WAN – Wide Area Network).
✅ Includes security features like firewalls and parental controls.
🔹 Example of a Router in Use:
 A home Wi-Fi router connects multiple devices (phones, laptops, smart
TVs) to the internet.
 When you open a website, the router sends your request to the internet
and brings back the response.

You might also like