Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Systems & Security — Architecture, Networks, Cyber Defence & Digital Integrity
#1
Systems & Security — Architecture, Networks, Cyber Defence & Digital Integrity

Modern computing relies on stable systems, fast and reliable networks, and strong security. 
This thread introduces the essential foundations of system design, cybersecurity, and digital protection in a clear and beginner-friendly way.

-----------------------------------------------------------------------

1. What Is Computer Security?

Computer security (cybersecurity) focuses on protecting:
• data 
• systems 
• networks 
• users 

…from threats such as:
• malware 
• hacking 
• data breaches 
• social engineering 
• system failures 

Security aims to ensure the “CIA Triad”:
Confidentiality — only authorised users access data 
Integrity — data cannot be altered without permission 
Availability — systems remain online and functional 

-----------------------------------------------------------------------

2. Operating Systems & System Architecture

Understanding systems begins with the OS (Operating System).

Common OS types:
• Windows 
• macOS 
• Linux 
• Mobile OS (iOS / Android) 
• Real-Time OS (embedded systems)

Key OS responsibilities:
• managing hardware 
• allocating memory 
• file system operations 
• user permissions 
• running processes 
• networking 
• security controls 

System architecture shapes how everything interacts:
• CPU 
• RAM 
• storage 
• buses 
• input/output devices 
• kernel 
• user space 

-----------------------------------------------------------------------

3. Networking Fundamentals

Networks allow devices to communicate.

Core concepts:
• IP addresses 
• routers and switches 
• packets 
• ports 
• protocols (TCP, UDP, HTTP, FTP, SMTP) 
• firewalls 
• DNS (domain name → IP address) 
• LAN / WAN 

Client–server model: most internet services use this structure.

-----------------------------------------------------------------------

4. Cyber Threats & Attack Types

Common attack categories:

Malware: viruses, worms, trojans, ransomware 
Phishing: tricking users into revealing information 
DDoS attacks: overwhelming a system with traffic 
MITM (Man-in-the-Middle): intercepting communication 
SQL injection: manipulating databases through insecure input 
Brute-force attacks: guessing passwords automatically 
Zero-day exploits: unknown or unpatched software flaws 

Understanding attack methods helps prevent them.

-----------------------------------------------------------------------

5. Encryption — Protecting Data

Encryption converts readable data into unreadable form.

Symmetric encryption: same key for encrypt & decrypt 
(e.g. AES)

Asymmetric encryption: public + private key 
(e.g. RSA)

Used in:
• HTTPS websites 
• secure messaging 
• passwords 
• VPNs 
• digital signatures 

Hashing: one-way transformation of data (e.g., passwords stored as hashes).

-----------------------------------------------------------------------

6. Authentication & Access Control

Security is fundamentally about **who can access what**.

Methods:
• passwords 
• 2FA (two-factor authentication) 
• biometrics 
• security tokens 
• SSH keys 

Access control models:
RBAC — Role-Based Access (roles determine permissions) 
MAC — Mandatory Access Control (strict policies) 
DAC — Discretionary Access Control (owners choose)

-----------------------------------------------------------------------

7. Firewalls & Network Defence

Firewalls filter incoming/outgoing traffic.

They block:
• dangerous connections 
• suspicious ports 
• unauthorised access 

Types:
• hardware firewalls 
• software firewalls 
• cloud-based firewalls 
• next-gen firewalls (deep packet inspection)

Other defences:
• IDS (Intrusion Detection System) 
• IPS (Intrusion Prevention System) 
• VPNs 
• network segmentation 

-----------------------------------------------------------------------

8. Secure Software Development

Developing secure software involves:

1. Input validation — prevent injection attacks 
2. Least privilege — limit access rights 
3. Patch management — update software frequently 
4. Code reviews — catch logic errors 
5. Logging & monitoring — detect unusual behaviour 

Security is a process, not a single tool.

-----------------------------------------------------------------------

9. Cybersecurity Best Practices

• Use strong, unique passwords 
• Enable 2FA everywhere 
• Avoid suspicious emails/links 
• Keep systems updated 
• Use antivirus software 
• Backup important data 
• Regularly scan networks 
• Never run untrusted code 
• Encrypt sensitive files 

-----------------------------------------------------------------------

10. Practice Questions

1. Name the three parts of the CIA Triad. 
2. What is the purpose of encryption? 
3. Explain the difference between symmetric and asymmetric encryption. 
4. What is a firewall used for? 
5. Describe one common cyber attack and how to prevent it.

-----------------------------------------------------------------------

Summary

This thread covered:
• systems & OS fundamentals 
• architecture 
• networking 
• encryption 
• authentication 
• firewalls 
• cyber threats 
• best practices 

Systems & Security is the foundation of safe computing — essential for anyone building software, managing servers, or protecting digital environments.
Reply


Forum Jump:


Users browsing this thread: