Cryptography (1)
Cryptography (1)
Introduction
Computer security is about protecting computers and networks from unauthorized
access, attacks, or damage. It ensures the confidentiality, integrity, and availability of
data.
Need for Security
Security is needed to:
• Prevent data theft or loss.
• Protect sensitive information like passwords or financial details.
• Stop hackers from causing damage to systems or networks.
• Ensure systems function correctly without disruptions (e.g., due to viruses).
Security Approaches
1. Prevention: Stopping threats before they occur (e.g., using firewalls).
2. Detection: Identifying when a security breach happens (e.g., antivirus
software).
3. Recovery: Fixing issues and restoring data after an attack.
Principles of Security
• Confidentiality: Ensures only authorized users can access data.
• Integrity: Keeps data accurate and unchanged unless authorized.
• Availability: Ensures data is available whenever needed.
Types of Attacks
1. Passive Attacks: Monitoring systems without causing damage (e.g.,
eavesdropping).
2. Active Attacks: Interfering with operations or altering data (e.g., phishing,
viruses).
3. Insider Attacks: Threats from within an organization.
4. External Attacks: Threats from outside, such as hackers.
Firewall
Introduction
• A firewall is a system that monitors and controls network traffic based on
security rules.
Types of Firewalls
1. Packet-Filtering Firewalls: Inspect individual packets; basic filtering.
2. Stateful Firewalls: Monitor entire connections.
3. Proxy Firewalls: Act as intermediaries between users and resources.
4. Next-Generation Firewalls (NGFW): Include advanced features like intrusion
prevention.
Firewall Configurations
1. Standalone: Protects a single computer or small network.
2. Network-Based: Protects larger networks.
DMZ (Demilitarized Zone) Network
• A separate network layer between the internal network and the internet.
• Hosts public-facing services like web servers for additional security.