besidedegree@gmail.com
+9779709005491
Back to Home
School SEE

Computer Security

Highlight Save
This note explains the basics of computer security, including threats, data protection, and safe practices to keep systems secure. It helps students understand how to prevent attacks and maintain digital safety.

1. Introduction

Computer technology has become a part of everyday life. From big computers to smartphones, every device connects us to a global network of information. Most computers today are linked through the Internet, forming a vast virtual world called cyberspace.

As usage increases, threats also increase. Cybercriminals attempt to steal data, money, and resources. Therefore, computer security is necessary to protect:

Data and information

Programs and applications

Credentials (username & password)

Hardware devices

1.3.1 Information Security

Information security means protecting data while storing, processing, sharing, or transferring it.

A. Securing Stored Data

Data can be lost due to:

  • Accidental deletion
  • Hard disk crash
  • Computer damage (fire, flood, theft)

Methods to Protect Data

  • Regularly check and replace hard disks if faulty
  • Make backup copies on another disk
  • Use cloud storage (Google Drive, OneDrive, iCloud, Dropbox)
  • Email important files to yourself
  • Use passwords to protect files and folders

B. Security Threats (Cyber Security Threats)

1. Phishing

Fake attempts to steal sensitive details like passwords or credit card info by imitating trusted websites. Often done through emails, fake websites, or harmful links.

2. Botnet

A group of infected computers controlled by a hacker. Each infected device is called a bot. It is often used for attacks or illegal activities.

3. Rootkit

A hidden malicious program that gives a hacker full administrator control of the computer while hiding its presence.

4. Keylogger

A tool (hardware or software) that secretly records every key typed on a keyboard. Used to steal passwords & personal information.

5. Hacker

A skilled computer expert who breaks into systems. Types:

White hat: ethical hacker

Black hat: criminal hacker

Grey hat: in-between

6. Drive-By Attack

Malware gets installed simply by visiting an infected website. No clicking is required. Happens due to outdated apps or browsers.

C. Malicious Codes

Malicious codes create vulnerabilities, allowing hackers to access systems.

Forms include:

  • Java Applets
  • ActiveX controls
  • Plug-ins
  • Scripts

They can steal data or destroy files.

1.3.2 Security Mechanisms

1. Authentication System

Process of identifying a user using username + password.

a) Password

A memorized secret used to confirm identity.

Strong password tips:

  • Never share credentials
  • Don’t use easily guessable words
  • Use a mix of letters, numbers & symbols
  • Use different passwords for different sites
  • Change passwords regularly

b) Biometric

Uses biological features like fingerprints, face, or retina scanning. More secure than regular passwords.

c) Firewall

A security system that monitors and controls traffic between the Internet and a private network. It blocks unauthorized access.

Types:

  • Hardware firewall
  • Software firewall
  • OS-based firewall (Windows firewall)

d) Cryptography

Technique to secure communication so only intended users understand it.

Types:

i. Encryption

Converts data into unreadable form using a key.

ii. Decryption

Converts encrypted data back to original form.

2. Malware (Malicious Software)

a) Virus

A program that replicates itself, infects files & spreads to other computers.

b) Spyware

Secretly collects information without user’s knowledge. Often includes keylogging.

c) Trojan

A program that looks harmless but contains hidden malicious functions. Creates backdoors.

d) Worm

Spreads across networks automatically using security holes. Very fast-spreading.

e) Adware

Displays unwanted ads on the computer, usually through pop-ups.

1.3.3 Antivirus Software

Antivirus software detects, prevents, and removes malware. Modern antivirus can stop:

  • Viruses
  • Worms
  • Trojans
  • Spyware
  • Adware
  • Phishing attacks
  • Malicious links
  • Popular antivirus:
  • Norton
  • Bitdefender
  • Kaspersky
  • ESET NOD32
  • Webroot

Updates are essential because new malware appears every day.

1.3.4 Backup System

Backup means copying data to another safe location.

Importance:

  • Protects against accidental deletion
  • Protects from hardware failure
  • Helps recover data after corruption
  • Backup storage:
  • Hard disks
  • External drives
  • CDs/DVDs
  • Cloud storage

1.3.5 Hardware Security

Hardware can be damaged by:

Dust

Moisture

Irregular electricity

Overheating

Fire

Theft

Protection Measures

i. Regular Maintenance

  • Clean dust and dirt
  • Fix loose connections
  • Replace faulty devices

ii. Insurance
Covers loss of hardware from theft or disasters.

iii. Keep Free From Dust
Dust can block fans and cause overheating.

iv. Fire Extinguishers
Install fire extinguishers in computer rooms.

v. Theft Protection
Use locks, guards, or biometric access.

vi. Air Conditioning
Maintains temperature in rooms with heavy computer use.

vii. Power Protection Devices
Use:

Stabilizers

Spike controllers

UPS

UPS prevents loss of unsaved data during power cuts.

Summary (Short Exam Points)

  • Cloud storage allows online storage of data.
  • Phishing steals sensitive info through fake links/emails.
  • Keylogger secretly records keystrokes.
  • Hacker is a skilled person who breaks into systems.
  • Malicious code creates vulnerabilities.
  • Authentication identifies users, usually with username & password.
  • Password must be strong and secure.
  • Biometric authentication uses biological traits.
  • Firewall controls incoming and outgoing network traffic.
  • Cryptography secures communication.
  • Encryption changes data into unreadable form.
  • Decryption changes data back to readable form.
  • Malware includes viruses, spyware, worms, trojans, adware.
  • Spyware collects info secretly.
  • Backup protects data from loss.
  • Hardware security includes dust control, maintenance, insurance, fire safety & power protection.

Related Videos

Computer Security by TechnoSuraj