<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Jegan</title>
    <description>The latest articles on Forem by Jegan (@jegan).</description>
    <link>https://forem.com/jegan</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3641614%2F65ca44c1-d856-4148-aa62-d1ccfef69890.jpg</url>
      <title>Forem: Jegan</title>
      <link>https://forem.com/jegan</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/jegan"/>
    <language>en</language>
    <item>
      <title>Computer Systems Security An Introduction (Part 1)</title>
      <dc:creator>Jegan</dc:creator>
      <pubDate>Fri, 19 Dec 2025 11:32:12 +0000</pubDate>
      <link>https://forem.com/jegan/computer-systems-security-an-introduction-part-1-4bbi</link>
      <guid>https://forem.com/jegan/computer-systems-security-an-introduction-part-1-4bbi</guid>
      <description>&lt;h2&gt;
  
  
  What is Security
&lt;/h2&gt;

&lt;p&gt;Security is the ability of systems to achieve their intended goals even in the presence of an adversary.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Castle Analogy&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fg1lqxyi529lcdhyiluno.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fg1lqxyi529lcdhyiluno.png" alt=" " width="800" height="436"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;A castle is secure if the treasure remains protected even when enemies are actively trying to attack it.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Goal&lt;/strong&gt;: Keep the treasure safe&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Adversary&lt;/strong&gt;: Bad guys (hackers) trying to steal it&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Security&lt;/strong&gt;: Making sure the treasure stays safe even though attackers are trying to break in&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So, in computer systems:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Goal&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Keep data &lt;em&gt;confidential&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;Ensure data is &lt;em&gt;not changed&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;Keep systems &lt;em&gt;available&lt;/em&gt; for users&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Adversary&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Hackers, malware, unauthorized users&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Security&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Using logins, guards, walls, and alarms to still achieve the goal despite attacks&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  The Three Building Blocks of Security
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Goal
&lt;/h3&gt;

&lt;p&gt;Before you can protect something, you need to know &lt;em&gt;WHAT&lt;/em&gt; you're protecting and &lt;em&gt;WHY&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;The three types of goals:&lt;/p&gt;

&lt;h4&gt;
  
  
  1. Confidentiality
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Keep secrets &lt;strong&gt;SECRET&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Like keeping your diary locked&lt;/li&gt;
&lt;li&gt;Only you should read your file&lt;/li&gt;
&lt;li&gt;Your bank password should stay secret&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  2. Integrity
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Keep things &lt;strong&gt;CORRECT&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Like making sure nobody changes your homework&lt;/li&gt;
&lt;li&gt;Your grade file shouldn't be changed by students&lt;/li&gt;
&lt;li&gt;Your bank balance shouldn't be changed by hackers&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  3. Availability
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Keep it &lt;strong&gt;WORKING&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Like making sure the library is open when you need it&lt;/li&gt;
&lt;li&gt;Netflix should work when you want to watch&lt;/li&gt;
&lt;li&gt;Your email should always be accessible&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  Threat Model
&lt;/h3&gt;

&lt;p&gt;You can't protect against &lt;em&gt;EVERYTHING&lt;/em&gt;! You need to decide who you're protecting against.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu4kqmdfgmd1gupop8dmq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu4kqmdfgmd1gupop8dmq.png" alt=" " width="800" height="446"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Think of it like this:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Against a thief? You need locks and maybe an alarm&lt;/li&gt;
&lt;li&gt;Against a fire? You need smoke detectors and sprinklers&lt;/li&gt;
&lt;li&gt;Against rain? A good roof is enough&lt;/li&gt;
&lt;li&gt;Against a tank? Well, your house won't help much&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;In computers&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Are you protecting against random hackers on the internet?&lt;/li&gt;
&lt;li&gt;Or against a government with unlimited money?&lt;/li&gt;
&lt;li&gt;These need VERY different protections&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  Mechanism
&lt;/h3&gt;

&lt;p&gt;How do you actually protect it?&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;This is like the actual locks and walls you use&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Policy&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;The rules&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Only teachers can change grades&lt;/li&gt;
&lt;li&gt;Only you can read your email&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Mechanism&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;The tools&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Username and password&lt;/li&gt;
&lt;li&gt;Encryption&lt;/li&gt;
&lt;li&gt;Firewalls&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;




&lt;h2&gt;
  
  
  Why Security Is So Hard?
&lt;/h2&gt;

&lt;p&gt;The big problem:&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Security is negative — you have to defend against EVERYTHING&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Imagine you own a toy store.&lt;/p&gt;

&lt;p&gt;Making the door work is easy:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Put a lock on it&lt;/li&gt;
&lt;li&gt;Give keys to employees&lt;/li&gt;
&lt;li&gt;Open it during business hours&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;But keeping thieves out is HARD because they might:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Break a window&lt;/li&gt;
&lt;li&gt;Dig under the floor&lt;/li&gt;
&lt;li&gt;Come through the roof&lt;/li&gt;
&lt;li&gt;Pretend to be an employee&lt;/li&gt;
&lt;li&gt;Steal an employee's key&lt;/li&gt;
&lt;li&gt;Break the lock&lt;/li&gt;
&lt;li&gt;Come in during business hours disguised as a customer&lt;/li&gt;
&lt;li&gt;Bribe an employee&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You have to think of ALL possible ways in.&lt;/p&gt;




&lt;h3&gt;
  
  
  The Asymmetry Problem
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcbifnovrss9haygt3xkx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcbifnovrss9haygt3xkx.png" alt=" " width="800" height="800"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>beginners</category>
      <category>security</category>
      <category>tutorial</category>
    </item>
  </channel>
</rss>
