week 11 COS 101 student copy
week 11 COS 101 student copy
Introduction to
Computer
Science
CSC 101
Week 11
• Importance of Networks:
✓ Facilitates communication (email, video calls).
✓ Enables resource sharing (printers, storage).
✓ Supports collaborative work environments.
• Types of Networks:
✓ Local Area Network (LAN): Covers a small area, such as an office or home. like
your home or office network - devices connected within a limited area, sharing a
printer or accessing a local server.
✓ Wide Area Network (WAN): Connect across countries or continents - the
Internet being the largest WAN we know. Spans large geographical areas (e.g., the
Internet).
✓ Metropolitan Area Network (MAN): Covers a city or large campus. expand this
concept of LAN to cover a city,
• Components:
✓ Hardware: Routers, switches, servers, and client devices.
✓ Software: Operating systems, network management tools, and protocols.
• Common Vulnerabilities:
✓ Unpatched Software: Outdated systems without security updates.
✓ Weak Passwords: Easily guessable or reused passwords.
✓ Phishing: Deceptive emails or messages to steal information.
• Real-World Examples:
✓ Target Data Breach (2013): Hackers exploited a third-party vendor’s
credentials to access the network.
✓ WannaCry Ransomware Attack (2017): Exploited unpatched Windows
systems.
Security Concepts
• CIA Triad:
The foundation of network security:
✓ Confidentiality: Ensuring data is accessible only to authorized users.
Confidentiality ensures that sensitive information is accessible only to authorized
users, like keeping private conversations private
✓ Integrity: Ensuring data is accurate and untampered. Integrity guarantees that
data remains accurate and unaltered during transmission, like ensuring a
message arrives exactly as it was sent
✓ Availability: Ensuring systems and data are accessible when needed. Availability
means systems remain accessible when needed, like making sure emergency
services can always be reached.
Summary
✓ Networks are essential for modern communication and resource sharing.
✓ Common vulnerabilities include weak passwords, unpatched systems, and insider
threats.
✓ The CIA Triad is the backbone of network security principles.
✓ Tools like firewalls and IDS play a critical role in protecting networks.
1. Review Questions
1. What are the main types of computer networks, and how do they differ?
2. Explain the CIA Triad and its significance in network security.
3. Describe three common vulnerabilities in computer networks and how they can be
mitigated.
Methods of Attack
Cyber-attacks are deliberate attempts to breach the security of information systems,
typically for malicious purposes such as theft, disruption, or espionage.
Emerging Threats
• Advanced Persistent Threats (APTs): Prolonged, targeted attacks by well-funded
adversaries, often for espionage.
o Characteristics: Stealthy, multi-phase attacks that focus on persistence
within the target system.
o Example: The Stuxnet worm targeting Iran's nuclear facilities.
• Zero-Day Vulnerabilities: Exploiting software vulnerabilities before developers can
issue patches.
o Example: The 2021 Microsoft Exchange Server vulnerabilities exploited
globally.
• IoT-Based Attacks: Exploiting vulnerabilities in interconnected devices like smart
cameras and thermostats.
o Risks: Compromised IoT devices can be part of botnets for DDoS attacks.
2. Review Questions
1. What are the differences between a virus, a worm, and ransomware?
2. Describe the steps involved in a typical cyber attack.
3. How do phishing and social engineering attacks work? Provide an example.
Security Policies
A network security policy is a set of rules and guidelines designed to protect the integrity,
confidentiality, and availability of data and resources in a network.
Importance:
• Aligns security measures with organizational goals.
• Provides clear guidelines for employees and IT teams.
• Ensures compliance with legal and regulatory requirements (e.g., GDPR, HIPAA).
✓ Ensure mandatory compliance with privacy regulations like GDPR, HIPAA, or CCPA
✓ Include procedures for securely disposing of outdated data.
3 Acceptable Use Policy (AUP):
✓ Set expectations for how employees use organizational resources like internet, email,
and devices. Defines appropriate use of organizational resources (e.g., internet, email,
BYOD).
✓ Prohibits activities like downloading pirated content or accessing malicious websites.
4. Incident Response Policy:
✓ Steps to detect, respond to, and recover from security incidents.
✓ Define a structured process for identifying, mitigating, and recovering from security
incidents.
✓ Assign roles for incident response management teams (e.g., IT, legal, and public
relations).
✓ Example: Steps to take if a ransomware attack occurs.
5. Remote Access Policy:
✓ Ensure employees accessing systems remotely use secure methods, such as VPNs and
multi-factor authentication (MFA) and device security standards.
✓ Define security requirements for personal devices used for work (e.g., mandatory
antivirus software).
6. Password Policy:
✓ Guidelines for creating and maintaining strong passwords.
✓ Require employees to create strong passwords (e.g., at least 12 characters, a mix of
uppercase, lowercase, numbers, and symbols).
✓ Enforce regular/ periodic password changes and prohibit password reuse.
✓ Promote the use of password managers for secure storage.
7. Monitoring and Logging:
✓ Mandate the logging of all critical system activities (e.g., logins, data access, and
configuration changes).
✓ Use Security Information and Event Management (SIEM) tools to analyze logs for
suspicious activities.
Internet
The Internet is a global network of interconnected computer systems that communicate
using standardized protocols to share information and services.
• Purpose:
✓ Facilitates communication and information exchange.
✓ Provides a platform for business, education, and entertainment.
✓ Serves as a backbone for technological innovation.
• Significance:
✓ Enabler of the digital age.
✓ Critical infrastructure for modern societies.
Databases
A database is a structured and organized collection of data that is stored electronically and
managed systematically to facilitate efficient retrieval, manipulation, and storage.
A database is an organized collection of data that is stored and managed to ensure easy
access, retrieval, and modification.
Importance of Databases:
• Enable efficient data storage and retrieval.
• Facilitate decision-making through data analysis.
• Support the functioning of software applications and websites.
Real-World Examples:
• Banking systems use databases to store account information.
• E-commerce platforms rely on databases to manage product inventories and
customer data.
Features of Databases
1. Data Organization:
o Databases arrange data into formats like tables, records, and fields to ensure
clarity and ease of access.
2. Data Integrity:
o Enforces rules to maintain the accuracy and reliability of data, such as ensuring
no duplicate records.
3. Data Security:
o Protects sensitive information through access controls, encryption, and
authentication mechanisms.
4. Scalability:
o Designed to handle growing data volumes without a loss in performance.
5. Concurrent Access:
o Supports multiple users accessing the database simultaneously without conflicts.
• Centralized Storage: Keeps all relevant data in one place, reducing redundancy and
inconsistency.
• Efficiency: Provides tools to query and analyze data quickly.
• Automation: Powers automated systems, such as billing or inventory management.
• Decision-Making: Enables data-driven decisions by offering insights from analyzed
data.
2. Scalability Issues:
o Difficulty in handling growing datasets.
o Solution: Cloud-based and distributed databases.
3. Data Consistency:
o Ensuring accurate and synchronized data across multiple systems.
o Solution: Employ database replication and robust synchronization
mechanisms.
4. Complexity:
• Managing relationships and queries in large databases.
• Solution: Implement user-friendly interfaces and advanced query tools.
5. Review Questions
1. What is the primary purpose of a database?
2. What are the ACID properties, and why are they important?
3. How can cloud databases improve scalability and reliability?
Types of AI
1. Narrow or Weak AI: Designed to perform a specific task, such as facial recognition or
language translation.
2. General or Strong AI: Designed to perform any intellectual task that a human can, such
as reasoning and problem-solving.
3. Superintelligence: Significantly more intelligent than the best human minds.
Applications of AI
1. Robotics: AI is used to control and navigate robots.
2. Natural Language Processing: AI is used to analyze and generate human language.
3. Computer Vision: AI is used to interpret and understand visual data.
4. Expert Systems: AI is used to mimic the decision-making abilities of a human expert.
Advantages of AI
1. Increased Efficiency: AI can automate repetitive tasks.
2. Improved Accuracy: AI can perform tasks with greater accuracy than humans.
3. Enhanced Decision-Making: AI can analyze large amounts of data to make informed
decisions.
Disadvantages of AI
1. Job Displacement: AI can automate jobs, leading to unemployment.
2. Bias and Discrimination: AI can perpetuate existing biases and discrimination.
3. Security Risks: AI can be used to launch cyber attacks.
Application of Computers
Computers are electronic devices that can store, process, and communicate information.
Applications of Computers
1. Business: Computers are used for accounting, management, and communication.
2. Education: Computers are used for online learning, virtual classrooms, and educational
software.
3. Healthcare: Computers are used for medical imaging, patient records, and telemedicine.
4. Science and Engineering: Computers are used for simulations, data analysis, and modeling.
Advantages of Computers
1. Increased Productivity: Computers can automate repetitive tasks.
2. Improved Accuracy: Computers can perform tasks with greater accuracy than humans.
3. Enhanced Communication: Computers can facilitate communication through email, video
conferencing, and social media.
Disadvantages of Computers
1. Dependence on Technology: Computers can lead to a loss of basic skills.
2. Security Risks: Computers can be vulnerable to cyber attacks and data breaches.
3. Environmental Impact: Computers can contribute to e-waste and energy consumption.
Conclusion
Artificial Intelligence and computers have revolutionized the way we live and work. While
they offer numerous advantages, they also pose significant challenges. As we continue to
develop and rely on these technologies, it is essential to consider their impact on society and
the environment.