Concise chapter-wise revision notes + SEE exam-style questions (very short, technical terms, full forms,short answers)
Definition: Computer security refers to the protection of data and information (stored or being transferred), computer programs, credentials, and computer hardware from intended harm, theft, unauthorized access, or unintended accidents/natural disasters.
Types:
Discussion: Emphasize why security is crucial in today's digital world, especially for students handling school projects or online activities. Mention that threats can be physical (e.g., theft) or non-physical (e.g., cyber-attacks).
These principles form the foundation of InfoSec. For example, confidentiality prevents data leaks, integrity ensures data isn't tampered with, and availability keeps systems running during attacks.
Focuses on protecting physical components from damage, theft, or environmental factors.
Why Needed? To prevent damage, expensive data loss, and unnecessary downtime from power issues — especially in areas like Nepal with unstable electricity.
Definition: Threats that can harm computer programs, data, and information. Can be physical (e.g., theft) or non-physical (e.g., cyber-attacks).
Malicious Code (Malware): Code designed by cyber attackers to damage data/systems or gain unauthorized access. Includes viruses, worms, Trojan horses, spyware, etc. Functions: stealing, encrypting, deleting data, hijacking functions, monitoring activity.
Computer Virus Example:
Computer Worm Propagation:
Victim → Phishing/Exploit → Infection → C2 Connection → Spread (Lateral) → Scan Files → Encrypt Files → Display Ransom Note → Payment Demand → (Pay or Not) → Attacker Decrypts (if paid)
Phishing Attack:
Definition: Designed to detect, prevent, or recover from attacks. Includes authentication, firewalls, cryptography, antivirus, and backups.
How to Protect from Infection: Use firewall/antivirus, avoid untrusted emails/links, regular backups.
Definition: Verifies identity to ensure only authorized access.
Compare passwords (easy but crackable) vs. biometrics (secure but hardware-dependent).
Definition: Creating duplicate copies of data/programs in secure locations to protect against corruption/loss.
Methods: USB flash drives, external hard drives, backup servers, cloud storage.
Discussion: Emphasize regular backups (e.g., to cloud or external drives) as a recovery tool.
Activity: "CIA Triad Buzz": Find a good example for each (Confidentiality, Integrity, and Availability). You have 2 minutes to brainstorm real-life examples (e.g., a locked diary for confidentiality). Share and vote on the best example.
Very Short: 1. Intended harm, theft, unauthorized access, accidents. 2. Information Security, Hardware Security.
Technical Terms: 1. Protection of data, programs, credentials, and hardware from harm/theft/unauthorized access. 2. Protection of confidential/sensitive data from unauthorized access, misuse, or disruption.
Full Forms: 1. Confidentiality, Integrity, Availability. 2. Information Security.
MCQs: 1. d, 2. b.
Fill in the Blanks: 1. intended, 2. Integrity.
Short: 1. Confidentiality: Only authorized access (e.g., password-protected files). Integrity: Accurate modification (e.g., no tampering with exam scores). Availability: Data ready when needed (e.g., server uptime). 2. Physical: Stealing hardware; Non-physical: Virus attack via software.
Activity: "Hardware Hunt Game": Bring images of devices (UPS, Spike Guard, etc.) on the board or projector. Students race to identify and explain one in pairs.
Very Short: 1. UPS, Volt Guard, Spike Guard (any two). 2. 21°C to 24°C.
Technical Terms: 1. Uninterruptible Power Supply: Battery-supported device providing power during failures. 2. Keeping hardware in good condition to prevent severe damage (e.g., fixing CPU cooler).
Full Forms: 1. Uninterruptible Power Supply. 2. Closed Circuit Television.
MCQs: 1. c, 2. b.
Fill in the Blanks: 1. Dust, 2. fire.
Short: 1. Theft: Grills, locks, CCTV, alarms. Fire: Alarms, detectors, extinguishers. (Explain briefly). 2. To prevent damage from power issues; examples: UPS for backups, Spike Guard for spikes.
Activity: "Threat Matching Relay": Write threats (e.g., Phishing, Rootkit) on cards and definitions on others. Students in teams relay to match them.
Very Short: 1. Virus, Worm, Trojan (any three from notes). 2. Spreading malware via insecure websites without user action.
Technical Terms: 1. Malicious code causing damage or unauthorized access. 2. Obtaining sensitive info by pretending to be trustworthy. 3. Records keystrokes secretly. 4. Network of compromised devices controlled by a bot master.
Full Forms: 1. Hypertext Transfer Protocol. 2. Internet of Things.
MCQs: 1. b, 2. b.
Fill in the Blanks: 1. boot/system, 2. encrypts.
Short: 1. Virus: Infects files/programs; Worm: Self-replicates; Trojan: Appears legitimate but malicious. 2. Use firewall/antivirus; Avoid untrusted emails/links; Regular backups.
Very Short: 1. Hardware, Software. 2. Symmetric, Asymmetric.
Technical Terms: 1. Securing communications via encryption/decryption. 2. Using unique human traits (e.g., fingerprints) for identity verification. 3. Detects/removes viruses/malware. 4. Creating duplicate data copies for recovery.
Full Forms: 1. Advanced Encryption Standard. 2. Rivest-Shamir-Adleman.
MCQs: 1. b, 2. c.
Fill in the Blanks: 1. one/same, 2. regularly.
Short: 1. Symmetric: One key (e.g., AES); Asymmetric: Public/private keys (e.g., RSA). 2. Not guessable, mix chars, change regularly, avoid popular words; Backups prevent data loss from corruption/attacks.
Note: This is the starting chapter for final revisions. More chapters will be added below in coming days.