Understanding Computer Security and Networking Concepts

What do you understand by the term computer security?

Computer security refers to the protection of computer systems, networks, and data from unauthorized access, theft, damage, or disruption. It encompasses various measures such as encryption, firewalls, antivirus software, access controls, and security policies to safeguard digital assets and ensure confidentiality, integrity, and availability.

Confidentiality:

Ensuring that sensitive information is accessible only to authorized individuals or entities. This is typically achieved through encryption, access controls, and authentication mechanisms.

Integrity:

Maintaining the accuracy and consistency of data throughout its lifecycle. Measures such as data validation, checksums, and digital signatures help detect and prevent unauthorized modifications.

Availability:

Ensuring that computer systems and resources are accessible and operational when needed. This involves implementing redundancy, fault tolerance, and disaster recovery measures to mitigate the impact of potential disruptions.

Authentication:

Verifying the identity of users or entities accessing computer systems or data. This can involve passwords, biometrics, two-factor authentication, and other identity verification mechanisms.

Authorization:

Granting appropriate privileges and access rights to authorized users based on their roles and responsibilities. Access control mechanisms such as role-based access control (RBAC) and discretionary access control (DAC) help enforce these policies.

Encryption:

Securing data by converting it into a form that can only be read or understood by authorized parties. Encryption algorithms and protocols protect data both in transit and at rest, reducing the risk of interception or theft.

Define a packet. Explain the working of the packet switching technique (5 marks)

A packet is a unit of data that is transmitted over a network. It typically consists of a header and a payload. The header contains control information such as the source and destination addresses, error checking codes, and sequencing information, while the payload contains the actual data being transmitted.

1.Packet switching is a technique used in computer networking where data is broken down into packets before being sent over a network. Here’s how it works:

2.Packetization: Data is divided into small, fixed-size packets. Each packet contains a portion of the original data along with header information.

3.Routing: Each packet is then routed independently through the network based on the destination address contained in its header. This allows packets to take different paths through the network and be reassembled correctly at the destination.

4.Transmission: Packets are transmitted over the network using available network resources such as routers and switches. They may encounter delays, congestion, or other network conditions along the way.

5.Reassembly: At the destination, packets are reassembled into the original data stream based on sequencing information in their headers. This ensures that the data is reconstructed accurately, even if packets arrive out of order.

Delivery: Once all packets have been successfully reassembled, the original data is delivered to the intended recipient.

What is scheduling? Explain Non-preemptive scheduling and Preemptive scheduling

Scheduling is the process of determining the order in which tasks or jobs are executed by a system or resource. It’s crucial for optimizing resource utilization and ensuring efficient operation.

Non-preemptive scheduling:

In non-preemptive scheduling, once a process starts executing, it continues until it completes or voluntarily relinquishes the CPU. Other processes must wait until the currently running process finishes before they can be executed. This approach is simpler to implement but may lead to inefficient resource utilization if a long-running process occupies the CPU while shorter processes are waiting.

Preemptive scheduling:

Preemptive scheduling allows the operating system to interrupt a currently executing process and allocate the CPU to another process with a higher priority. The interrupted process is placed back in the ready queue and can resume execution later. This approach ensures that higher-priority tasks can be executed promptly, even if lower-priority tasks are currently running.

What is security policy?

A security policy is a set of rules, procedures, and guidelines implemented by an organization to ensure the confidentiality, integrity, and availability of its information assets. It defines the framework for addressing security risks and outlines the measures to be taken to protect the organization’s resources from unauthorized access, misuse, or damage. A comprehensive security policy typically covers areas such as access control, data protection, network security, incident response, and compliance requirements.

What is binary encoding? Why do computers use Binary encoding?

Binary encoding is a method of representing data using only two symbols, typically 0 and 1. Computers use binary encoding because:

1.Simplicity: Binary encoding simplifies electronic circuitry by using two voltage levels to represent data, making it easier to design and manufacture computing devices.

2.Reliability: Binary encoding is less prone to errors because it relies on distinct, easily discernible states (0 and 1), reducing the chance of misinterpretation.

3.Compatibility: Binary encoding ensures compatibility across different computer systems and devices, as it’s universally understood and implemented.

4.Scalability: Binary encoding allows for easy scalability as data volumes increase, enabling efficient storage and processing of vast amounts of information.

5.Digital Electronics: Computers are fundamentally digital devices, and binary encoding aligns with the binary nature of digital electronics, facilitating seamless communication and computation within the system.

What is Deadlock? What are the reasons for deadlock? (5 marks)

Deadlock is a situation in computing where two or more processes are unable to proceed because each is waiting for the other to release a resource.

Reasons for deadlock include:

1.Mutual exclusion: Processes hold resources and wait for additional resources that are currently held by other processes.

2.Hold and wait: Processes hold resources while waiting for additional resources, without releasing the ones they already have.

3.No preemption: Resources cannot be forcibly taken from the process holding them; they must be released voluntarily.

4.Circular wait: A cycle of processes exists, where each process is waiting for a resource held by the next process in the cycle.

What is TCP/IP? Explain the working of the packet switching technique (5 marks)

TCP/IP (Transmission Control Protocol/Internet Protocol) is a set of networking protocols that allows computers to communicate over the internet. It provides reliable and efficient communication by breaking data into packets, routing them to the destination, and reassembling them at the receiving end.

. Here’s how it works:

1.Packetization: Data is divided into packets of fixed or variable size. Each packet includes the sender’s and receiver’s addresses, sequence numbers, and other control information.

2.Routing: Each packet is then routed independently through the network based on the destination address. Routers make decisions on the most efficient path for each packet, considering factors like network congestion, link quality, and available bandwidth.

3.Transmission: Packets are transmitted over the network using available communication links. They may take different routes and arrive at the destination out of order.

4.Reassembly: Upon reaching the destination, packets are reassembled based on their sequence numbers to reconstruct the original data.

5.Error Checking: Error-checking mechanisms ensure data integrity during transmission. If any packet is lost or corrupted, it can be retransmitted by the sender or requested again by the receiver.

What is the function of TCP/IP Protocol? (5 marks)

The TCP/IP protocol suite serves several functions:

1.Addressing: It provides a way to uniquely identify devices on a network using IP addresses.

2.Routing: It determines the best path for data packets to travel between devices on different networks.

3.Packetization: It breaks data into smaller packets for transmission and reassembles them at the destination.

4.Reliability: It ensures reliable delivery of data by using protocols like TCP (Transmission Control Protocol).

5.Interoperability: It enables different types of computers and networks to communicate with each other effectively.

What is Software? What are the two main categories of software (5 marks)

Software refers to a set of instructions or programs that enable a computer to perform specific tasks. There are two main categories of software:

1.System Software: This type of software manages and controls the computer hardware so that application software can perform its tasks. Examples include operating systems like Windows, macOS, and Linux, as well as device drivers, utilities, and software development tools.

2.Application Software: Application software is designed to perform specific tasks or solve particular problems for users. It includes programs like word processors, web browsers, email clients, and video games. Application software interacts with users and helps them accomplish various tasks

What do you mean by transmission media? Explain the features of a twisted pair cable? (5 marks)

Transmission media refers to the physical pathways that carry signals from one device to another in a telecommunication network. These pathways can be wired or wireless. Twisted pair cable is a type of wired transmission medium commonly used in telecommunications.

Features of twisted pair cable:

1.Twisted Configuration: Twisted pair cables consist of pairs of insulated copper wires twisted around each other. This twisting helps to reduce electromagnetic interference (EMI) from external sources and crosstalk between adjacent pairs, ensuring better signal quality.

2.Flexibility: Twisted pair cables are flexible and easy to install, making them suitable for a variety of applications including telephone lines, Ethernet networks, and more.

3.Cost-Effectiveness: Twisted pair cables are relatively inexpensive compared to other types of transmission media, making them a cost-effective choice for many networking scenarios.

4.Bandwidth: Twisted pair cables have a limited bandwidth compared to other transmission media like fiber optic cables. However, advancements in technology have led to the development of higher-grade twisted pair cables capable of supporting faster data rates.

5.Distance Limitation: Twisted pair cables have a limited transmission distance, especially when compared to fiber optic cables. As the distance increases, signal attenuation becomes more significant, limiting the reach of twisted pair cables without the use of signal repeaters or amplifiers.

What is Computer bus? Explain the function of data bus, address bus, and control bus (5 marks)

A computer bus is a communication system that transfers data between components within a computer or between computers. It consists of three main types: data bus, address bus, and control bus.

1.Data Bus: The data bus is responsible for carrying actual data between the processor, memory, and peripherals. It’s like the highway on which data travels within the computer. It’s typically bidirectional, meaning it can carry data in both directions.

2.Address Bus: The address bus is used to specify a physical address in memory or I/O space. It determines where data should be read from or written to. Essentially, it’s the system’s way of indicating the location of the data on the data bus.

3.Control Bus: The control bus carries control signals that coordinate and manage the various activities and operations within the computer system. It includes signals for tasks like memory read/write operations, interrupt requests, and bus arbitration.