CHAPTER 4

πŸ›‘οΈ Cyber Security

The bad guys on the Internet, the tricks they use, and every wall, guard, and alarm we've built to keep them out.

4.1Introduction to Cyber Security

Cyber security is the practice of protecting computers, networks, programs, and data from digital attacks, damage, or unauthorized access.

The CIA Triad β€” the three goals of security

CIA in a bank = locker, ledger, opening hours. Confidentiality: only you can open your locker. Integrity: the ledger can't be rewritten. Availability: the bank is actually open when you go there.

Why cyber security matters

4.2Common security threats

Social engineering

Hacking humans, not computers. Trick a person into giving up passwords, clicking a bad link, or handing over money.

Phishing = the fake "bank SMS" asking for your PIN. Same logic as a stranger at the ATM saying "sir, dai, let me help you with this card." No real bank ever asks for your PIN. Ever.

Denial of Service (DoS) & Distributed Denial of Service (DDoS)

DDoS = 10,000 pranksters ringing your doorbell at the same time. You can't even answer the door when your real guest arrives.

Malware (malicious software)

Trojan horse = the original trick. Greeks pretended to leave a giant wooden horse as a gift. Soldiers were hiding inside. Same story when you install a "free PC cleaner" from a sketchy website.

Other common threats

4.3Security Mechanisms

Encryption

Scrambling readable data (plaintext) into unreadable form (ciphertext) using a key. Only someone with the right key can unscramble it.

Symmetric key = a shared padlock between two friends. They both have the same key. Asymmetric = a mailbox. Anyone can drop letters in (your public key). Only you have the key that opens the box (private key).

Hashing

A one-way function that turns any input into a fixed-length "fingerprint." Used to check if data was tampered with, and to store passwords safely. Examples: MD5 (old, weak), SHA-1 (weak), SHA-256 (strong).

Digital signatures

Proves who sent a message and that it wasn't changed. Uses the sender's private key to sign a hash of the message.

Backup

Regular copies of data stored separately. The only cure for ransomware. Follow the 3-2-1 rule: 3 copies, on 2 different media, with 1 off-site.

Secure protocols

4.4Identity and Access Control

The three A's

Authentication factors

MFA (Multi-Factor Authentication)

Combines two or more of the above. Example: password + OTP = 2FA. Much harder to bypass than a password alone.

MFA = Nepali visa interview. You have to show the passport (something you have) and answer questions (something you know) and sometimes even a biometric. Slow for you β€” nearly impossible for an impersonator.

Access control models

Password best practices

4.5Firewalls, IDS, and IPS

Firewall

A firewall is a security system that monitors and controls incoming and outgoing network traffic based on rules. It sits between your network and the Internet.

Firewall = the security guard at a mall entrance. Shoppers (legitimate traffic) walk in freely. The guy with the sack, the ski mask, and "shopkeeper of suspicion" stamped on his forehead? Blocked at the door.

IDS β€” Intrusion Detection System

Watches network traffic and alerts you when it sees suspicious activity. Does not block β€” just sounds the alarm.

IPS β€” Intrusion Prevention System

Like IDS, but actively blocks the bad traffic. IDS = alarm; IPS = alarm + auto-lockdown.

SystemWhat it doesAnalogy
FirewallAllows/blocks traffic by rulesMall guard checking IDs
IDSDetects and alertsCCTV with a watchman who shouts
IPSDetects and blocks automaticallyCCTV that also locks the gate

4.6Email Filtering

Email filtering is the process of sorting incoming email into legitimate, spam, and malicious categories β€” automatically.

What filters look at

Where filtered mail goes

Spam filter = your mom sorting the mail pile. Real letters β†’ your desk. "You have won 5 crore rupees!" flyer β†’ straight to the raddi pile.

4.7Use of Antivirus Software

Antivirus software detects, prevents, and removes malware from a computer.

Antivirus = childhood vaccines. When you got the polio vaccine, your body was trained to recognize the virus signature instantly. Antivirus does the same for computers β€” it carries a "signature list" of known nasties and blocks them before they infect you. And just like vaccines need boosters, antivirus needs regular updates.

How antivirus works

Popular antivirus programs

Safe-computing habits (just as important as antivirus)

Ready for MCQs?

Gemini will write 10 fresh questions from this chapter's syllabus. Hit "Generate more" for another round.

Back to Home