0% found this document useful (0 votes)
5 views

Computer_Security_Class_Notes

The document covers key concepts in computer security, including the CIA triad of confidentiality, integrity, and availability. It outlines common threats and attacks such as malware and phishing, as well as authentication methods and access control models. Additionally, it discusses cryptography, network security mechanisms, and best practices for maintaining security.

Uploaded by

Shagufta Anjum
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Computer_Security_Class_Notes

The document covers key concepts in computer security, including the CIA triad of confidentiality, integrity, and availability. It outlines common threats and attacks such as malware and phishing, as well as authentication methods and access control models. Additionally, it discusses cryptography, network security mechanisms, and best practices for maintaining security.

Uploaded by

Shagufta Anjum
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Algorithms Class Notes

1. Introduction to Computer Security

Computer Security focuses on protecting systems, networks, and data from cyber threats.

Key Goals (CIA Triad):

- Confidentiality: Prevent unauthorized access

- Integrity: Ensure data is accurate and unaltered

- Availability: Ensure systems are accessible when needed

2. Common Threats and Attacks

Types of attacks:

- Malware (viruses, worms, trojans)

- Phishing

- Denial of Service (DoS/DDoS)

- Man-in-the-Middle (MitM)

- SQL Injection

- Zero-day Exploits

3. Authentication and Access Control

Authentication verifies identity (e.g., passwords, biometrics).

Authorization controls access to resources.

Access Control Models:

- DAC (Discretionary Access Control)

- MAC (Mandatory Access Control)

- RBAC (Role-Based Access Control)


Algorithms Class Notes

4. Cryptography Basics

Cryptography secures data through encoding.

Types:

- Symmetric Key (AES, DES)

- Asymmetric Key (RSA, ECC)

- Hash Functions (SHA-256, MD5)

Applications: Secure communications, digital signatures, data integrity

5. Network Security

Protects data during transmission.

Mechanisms:

- Firewalls

- Intrusion Detection Systems (IDS)

- Virtual Private Networks (VPNs)

Protocols: HTTPS, TLS/SSL, IPSec

6. Security Policies and Best Practices

Principles:

- Least Privilege

- Defense in Depth

- Security by Design

Best Practices:

- Regular updates

- Strong passwords
Algorithms Class Notes

- Security audits

- User education

You might also like