UNit 4 Part 1
UNit 4 Part 1
Sure! Here’s a more detailed and structured version of Section 1.1: “What Does Secure Mean?” —
perfect for exam writing, with clear points and definitions:
Robberies were hard to prevent due to slow communication and law enforcement response.
CCTV cameras
Alarms
Software code
Customer data
Transaction logs
Communication records
Attacks may come from external hackers, internal employees, or malicious software.
1/14
🧾 Table: Protecting Money vs. Information
Aspect Banks (Money) Computers (Information)
Size & Portability Physical, large, stored in buildings with vaults & Digital, small, stored in chips or drives
guards
Physical Contact Required for cash theft Not needed – data can be stolen remote
Access Protection Layers of locks and access control Passwords, encryption, authentication,
firewalls
Incident Slower in the past; faster now with alarms, CCTV Automated alerts, logs, security protoco
Response
Example: A bank's customer data can be more profitable to a hacker than actual cash.
2/14
3. Recognize the importance of continuous monitoring and vulnerability assessment.
Would you like this turned into a 2-mark / 5-mark / 10-mark exam format version or expanded for
next topics like attacks and types of criminals?
Here is a detailed, exam-structured version of Section 1.2: Attacks, ideal for writing in 5- or 10-
mark questions:
1.2 Attacks
Security attacks aim to exploit weaknesses in a system’s design or operation to compromise its
confidentiality, integrity, or availability. To understand attacks, we must first define key concepts.
3/14
Examples:
Unpatched software
🔹 Threat
A threat is a potential danger that could exploit a vulnerability to cause damage, loss, or
unauthorized access.
Malicious users
Malware
System malfunctions
🔹 Attack
An attack is an active exploitation of a vulnerability by a threat agent.
Example:
A hacker flooding a server with traffic (DoS attack) to crash it and deny service.
🔹 Control
A control is a defensive mechanism (policy, device, procedure, or technique) that eliminates or
reduces the impact of a vulnerability.
Examples:
Firewalls
Authentication systems
Security patches
4/14
Encryption
Crack = vulnerability
Interruption An asset becomes lost, unavailable, or unusable Hardware failure, data deletion
Fabrication Insertion of fake data or commands by an attacker Fake transactions, spoofed messages
Often, organizations underestimate the value of their computing resources (e.g., customer
data).
Attackers may exploit these weak points to gain profit, cause disruption, or steal
identity/data.
5/14
1.2.4 Method, Opportunity, and Motive (MOM)
For a successful attack, a malicious actor needs the following:
Component Description
Opportunity Access to the system and time to carry out the attack
Would you like the next topic — "1.3 Types of Attackers / Computer Criminals" — summarized in a
similar format?
Here’s a detailed, structured, and exam-oriented explanation of Section 1.3: The Meaning of
Computer Security along with its key subtopics: CIA Triad, Vulnerabilities, and Asset-Based
Weaknesses.
6/14
🎯 Security Goals: The CIA Triad
1.🔐 Confidentiality
Ensures that information is accessible only to authorized users.
Example: A user's banking details must be visible only to them and their bank, not third
parties.
2. 🧾 Integrity
Ensures data is accurate, complete, and not tampered with.
3. 🟢 Availability
Ensures that authorized users can access data and services when needed.
Protected against system crashes, DoS (Denial of Service) attacks, or resource exhaustion.
Security must find an optimal balance between restricting access and ensuring usability.
7/14
⚠️ Vulnerabilities in Computing Systems
A vulnerability is a flaw or weakness that could be exploited to compromise security goals. These
may exist in:
💻 Hardware Vulnerabilities
Physical tampering: damage, theft, device replacement.
🧠 Software Vulnerabilities
Bugs in code or design errors exploited by attackers.
Types:
Software Modification:
📂 Data Vulnerabilities
Confidentiality Risks:
8/14
Unauthorized access, disclosure, or theft of sensitive data.
Integrity Risks:
Availability Risks:
Principle of Adequate Protection: Data must be protected in proportion to its value and
lifecycle.
Includes firewalls, intrusion detection systems (IDS), anti-virus, VPNs, and encryption protocols
(SSL/TLS).
🔑 Access Control
Controls who can view, use, or manage system resources.
Types:
Authentication Techniques:
Passwords, PINs
10/14
Would you like this formatted as a 2-page revision sheet or help with a model answer for a 10-
mark question on this topic?
Here's a detailed and exam-oriented summary of Sections 1.4 and 1.5: Computer Criminals and
Methods of Defense. This format is perfect for writing answers in 5- to 10-mark questions.
Amateurs Inexperienced users who accidentally access unauthorized data or An office worker reading an
resources without malicious intent. user’s email.
Crackers Also called malicious hackers. They intentionally exploit Breaking into systems and
vulnerabilities for fun, challenge, or disruption. sharing exploits on forums
Career Professional cybercriminals who make a living by stealing data, selling Selling stolen credentials,
Criminals information, or performing attacks for financial gain. ransomware attacks.
11/14
🔹 Five Core Security Strategies
1. Prevent – Block attacks before they occur.
E.g., firewalls, access control policies.
🔹 Types of Controls
Control Type Description Examples
Physical Controls Protect hardware and sites physically. Locks, guards, CCTV, fire safety.
Software Controls Embedded in programs to limit unauthorized access. User authentication, secure codin
Hardware Controls Secure hardware-level access or identity verification. TPM chips, biometric scanners.
Encryption Converts data into unreadable form to unauthorized users. AES, RSA, SSL/TLS.
Policies Organizational rules and procedures to enforce security. Password rotation, user training.
🔹 Encryption
Converts data into unreadable format using keys.
Note: Improper use of encryption can reduce effectiveness. Use wisely and appropriately.
12/14
🔹 Software Controls
Include development controls (coding/testing standards), OS controls, and internal program
controls.
🔹 Hardware Controls
Prevent physical tampering and control access.
Examples include smart cards, hardware locks, and hardware-based encryption devices.
🔹 Policies
Guidelines or rules to ensure proper usage of systems.
Examples:
🔹 Effectiveness of Controls
Key Principles:
5. Periodic Review – Regularly test and update controls to match evolving threats.
13/14
🔹 Principle of the Weakest Link
A system is only as secure as its weakest point.
Administrative Policies, training, legal compliance Password policies, employee onboarding, audit logs
Would you like a sample answer for a 10-mark question on “Methods of Defense in Computer
Security”?
14/14