Security in computing
Security in computing
Password Cracking
Password cracking is the process of attempting to guess or decode a password
to gain unauthorized access to an account or system. Attackers use various
methods to crack weak passwords.
Buffer Overflow
A buffer overflow occurs when a program tries to store more data in a buffer
(temporary data storage) than it can hold, causing the extra data to
overwrite adjacent memory. This can lead to unexpected behavior, crashes,
or even the execution of malicious code.
Different Types of Attacks in Computing Security (Simple Explanation)
Here are common types of attacks in computing security:
1. Malware Attacks: Harmful software like viruses, worms, and Trojans
that damage or steal data.
2. Phishing Attacks: Attackers trick users into sharing sensitive info
(like passwords) by pretending to be trustworthy.
3. Denial-of-Service (DoS): Attackers overload a server with too
many requests, causing it to crash and stop working.
4. Man-in-the-Middle (MitM): The attacker intercepts and
alters communication between two parties.
5. SQL Injection: Attackers insert malicious code into a website’s
input fields to access its database.
6. Brute Force Attack: The attacker tries every possible password or
key until they find the correct one.
7. Ransomware: Malware that locks your files and demands money
to unlock them.
8. Cross-Site Scripting: Malicious scripts injected into websites that run
on users' browsers, stealing data or taking control of accounts.
9. Social Engineering: Attackers manipulate people into giving out
confidential information or performing actions that compromise security.
10.Insider Attack: Someone inside the organization (like an
employee) misuses their access to harm the system or steal data.
11.Session Hijacking: The attacker takes control of a session between a
user and a website, pretending to be the user.
12.Buffer Overflow: The attacker sends more data to a program than it
can handle, causing it to crash or let them execute harmful code.
One-Time Password (OTP) System (Simple Explanation)
A One-Time Password (OTP) is a password that is valid for only one login
session or transaction. It provides an extra layer of security because even if
someone intercepts the OTP, they won't be able to use it again.
How OTP Works:
1. Request: The user enters their regular login information
(username, password).
2. OTP Generation: The system generates a unique, temporary
password (OTP) and sends it to the user, usually via:
o SMS
o Email
o Authenticator apps (like Google Authenticator or Authy)
3. Verification: The user enters the OTP within a short period (typically
a few minutes).
4. Access Granted: If the OTP matches, the user is granted access.
Why OTP is Secure:
Single Use: Once used, the OTP cannot be reused, making it much
safer than regular passwords.
Short Life: OTPs are time-sensitive, meaning they expire after a
few minutes, reducing the risk of interception.
Two-Factor Authentication (2FA): OTPs are often used as a second
factor in two-factor authentication systems, adding more security to
online
accounts.
Protection:
Use for sensitive transactions: OTPs should be used for activities like
logging into accounts, making payments, or changing account
settings.
Secure Delivery: Ensure OTPs are sent securely, via encrypted channels
OTP systems make it harder for attackers to access accounts, even if they know
your regular password.
CIA Triad
The CIA Triad is a widely used model to guide security practices, ensuring the
protection of information. It consists of three core principles:
1. Confidentiality
o What it is: Ensuring that only authorized individuals or
systems can access specific data.
o Goal: Protect sensitive information from unauthorized access
or disclosure.
2. Integrity
o What it is: Ensuring that the data remains accurate, complete,
and unaltered during storage, transmission, or processing.
o Goal: Protect data from being tampered with or modified
by unauthorized individuals.
3. Availability
o What it is: Ensuring that data and services are accessible
and usable when needed by authorized users.
o Goal: Prevent disruptions to data access or service outages.
Why It's Important:
The CIA Triad helps organizations secure their data, maintain trust with users,
and protect against cyber threats. By focusing on confidentiality, integrity, and
availability, organizations ensure that information remains safe, reliable, and
Accessible.
Firewall and Its Features
A firewall is a security system that acts as a barrier between a trusted internal
network (like your home or office network) and an untrusted external network
(like the internet). It monitors and controls incoming and outgoing network
traffic based on security rules to protect against cyber threats.
Features of a Firewall:
Types of IDS:
1. Network-based IDS (NIDS) – Monitors network traffic to detect threats
across multiple devices.
2. Host-based IDS (HIDS) – Monitors activity on a single computer or server,
checking logs, system files, and application activities.
Functions of IDS:
Traffic Monitoring – Analyzes network data for unusual patterns.
Attack Detection – Identifies known attack signatures (e.g., brute-force
attacks, malware).
Alert Generation – Notifies administrators when suspicious activity is
detected.
Log Analysis – Records events to help in forensic investigations.
Types of IPS:
1. Network-based IPS (NIPS) – Protects an entire network by monitoring
traffic.
2. Host-based IPS (HIPS) – Protects a single device (like a server) by
monitoring its activities.
Wireless Network Positioning
Secure Gateways
A secure gateway is a security system that controls and filters traffic between an
internal network and external sources (like the internet). It ensures safe access
to resources while blocking threats.
How It Works:
1. Database of Signatures – The system maintains a collection of known
malware, viruses, or attack patterns.
2. Scanning & Matching – It scans incoming data, files, or network traffic and
compares it with known signatures.
Advantages:
✔ Fast and Efficient – Quickly detects known threats.
✔ Accurate – Minimal false positives for recognized attacks.
✔ Widely Used – Common in antivirus, IDS/IPS, and firewalls.
Disadvantages:
❌ Cannot Detect New Threats – Fails against unknown or modified malware.
❌ Requires Regular Updates – Needs frequent signature updates to stay
effective.
Wireless Intrusion Detection System (WIDS) & Wireless
Intrusion Prevention System (WIPS)
Wireless networks are more vulnerable to attacks like rogue access points,
eavesdropping, and denial-of-service (DoS) attacks. To protect them, we use
Wireless IDS (WIDS) and Wireless IPS (WIPS).
Functions of WIDS:
✅ Scans for rogue access points – Detects unauthorized Wi-Fi networks.
✅ Monitors wireless traffic – Identifies unusual activity, like hacking attempts.
✅ Alerts administrators – Sends warnings when an attack is detected.
🔹 Limitation: WIDS can only detect threats, not prevent them.
Functions of WIPS:
✅ Blocks rogue access points – Prevents unauthorized Wi-Fi networks.
✅ Stops suspicious connections – Disconnects devices showing unusual
behaviour.
✅ Prevents Wi-Fi-based attacks – Protects against DoS, Man-in-the-Middle
(MITM), and eavesdropping attacks.
🔹 Limitation: If not configured properly, WIPS may block legitimate users.
Voice over IP (VoIP)
Voice over IP (VoIP) is a technology that allows voice calls to be made over the
Internet instead of traditional telephone networks. It converts voice signals into
digital data and transmits them over IP (Internet Protocol) networks.
Features of VoIP:
✅ Cost-effective – Cheaper than traditional phone calls, especially for long
distances.
✅ Flexibility – Works on multiple devices (phones, laptops, tablets).
✅ Advanced Features – Supports video calls, voicemail, call forwarding, and
conferencing.
✅ Uses the Internet – No need for separate telephone lines.
Cloud computing is a technology that allows users to store, manage, and process
data on remote servers (the cloud) instead of local computers or physical
storage devices. It provides on-demand access to computing resources over the
internet.
Sessions and cookies are used to store user-related data in web applications. If
not handled securely, they can lead to attacks like Session Hijacking, Cross-Site
Scripting (XSS), and Cross-Site Request Forgery (CSRF).
1. What is a Switch?
A switch is a network device that connects multiple devices within a local area
network (LAN) and helps them communicate efficiently.
🔹 Features of a Switch:
✅ Operates at Layer 2 (Data Link Layer) of the OSI model.
✅ Uses MAC addresses to forward data to the correct device.
✅ Provides multiple ports for connecting computers, printers, and other
devices.
✅ Improves network efficiency by sending data only to the intended device
instead of broadcasting it to all.
🔹 Example of a Switch in Use:
A company's office network has multiple computers connected to a
switch.
When Computer A sends data to Computer B, the switch forwards the
data only to Computer B, improving speed and security.
2. What is a Router?
A router connects different networks (e.g., home network to the internet) and
directs data between them.
🔹 Features of a Router:
✅ Operates at Layer 3 (Network Layer) of the OSI model.
✅ Uses IP addresses to forward data between networks.
✅ Connects LANs to the internet (WAN – Wide Area Network).
✅ Includes security features like firewalls and parental controls.
🔹 Example of a Router in Use:
A home Wi-Fi router connects multiple devices (phones, laptops, smart
TVs) to the internet.
When you open a website, the router sends your request to the internet
and brings back the response.