Algorithms Class Notes
1. Introduction to Computer Security
Computer Security focuses on protecting systems, networks, and data from cyber threats.
Key Goals (CIA Triad):
- Confidentiality: Prevent unauthorized access
- Integrity: Ensure data is accurate and unaltered
- Availability: Ensure systems are accessible when needed
2. Common Threats and Attacks
Types of attacks:
- Malware (viruses, worms, trojans)
- Phishing
- Denial of Service (DoS/DDoS)
- Man-in-the-Middle (MitM)
- SQL Injection
- Zero-day Exploits
3. Authentication and Access Control
Authentication verifies identity (e.g., passwords, biometrics).
Authorization controls access to resources.
Access Control Models:
- DAC (Discretionary Access Control)
- MAC (Mandatory Access Control)
- RBAC (Role-Based Access Control)
Algorithms Class Notes
4. Cryptography Basics
Cryptography secures data through encoding.
Types:
- Symmetric Key (AES, DES)
- Asymmetric Key (RSA, ECC)
- Hash Functions (SHA-256, MD5)
Applications: Secure communications, digital signatures, data integrity
5. Network Security
Protects data during transmission.
Mechanisms:
- Firewalls
- Intrusion Detection Systems (IDS)
- Virtual Private Networks (VPNs)
Protocols: HTTPS, TLS/SSL, IPSec
6. Security Policies and Best Practices
Principles:
- Least Privilege
- Defense in Depth
- Security by Design
Best Practices:
- Regular updates
- Strong passwords
Algorithms Class Notes
- Security audits
- User education