14.1.1 explain the importance of computer security;
14.1.2 explain cybercrime, hacking and cracking;
14.1.3 differentiate among the types of hackers, i.e. script kiddie, white hat hackers, black hat hackers, grey hat hacker, green hat hackers, red hat hackers, blue hat hackers;
14.1.4 differentiate among the types of malware, i.e. virus, worm, adware, spyware, Trojan horses;
14.2 Computer Viruses
14.2.1 discuss the ways in which a malware can spread via:
a. infected flash drives/ CD's
b. pirated software
c. local area network
d. internete.
e. e-mail attachments;
14.2.2 identify common symptoms of an attack by a malware on a computer system;
14.2.3 Identify the precautions to safeguard computer systems against the ways through which malware can spread mentioned in SLO 14.2.1;
14.3 Authentication Mechanisms
14.3.1 differentiate between authentication and authorisation;
14.3.2 differentiate between Two Factor Authentication (2FA) and Multifactor Authentication (MFA);
14.3.3 describe the following authentication methodologies:
a. username and password
b. Personal Identification Number (PIN)
c. access cards
d. biometrics.
___________________________________________________________________________________
14.1 Introduction to Computer Security
14.1.1 Importance of Computer Security
✅ What is Computer Security?
Computer security means protecting computers, data, and networks from damage, theft, and unauthorized access.
It keeps our information safe from hackers, viruses, and cybercriminals.
✅ Why is Computer Security Important?
Computer security is important because:
-
Protects Personal Information
Our computers store:-
Photos
-
Documents
-
Passwords
-
Bank details
If security is weak, someone can steal this information.
📌 Example: If a hacker steals your online banking password, they can take your money.
-
-
Prevents Financial Loss
Companies store important financial records. If hacked, they may lose millions of rupees.📌 Example: A company’s system gets hacked and customer credit card data is stolen.
-
Protects Privacy
Everyone has the right to privacy. Security helps protect personal chats, emails, and files.📌 Example: Without security, someone could read your private emails.
-
Prevents System Damage
Malware and viruses can destroy files and slow down computers.📌 Example: A virus deletes all files from your computer.
-
Maintains Trust
Businesses need strong security so customers trust them.
14.1.2 Cybercrime, Hacking and Cracking
✅ Cybercrime
Cybercrime is a crime committed using a computer or the internet.
📌 Examples of cybercrime:
-
Stealing money online
-
Identity theft
-
Sending fake emails
-
Spreading malware
✅ Hacking
Hacking means accessing a computer system without permission.
Sometimes hacking can be legal (to test security), and sometimes illegal.
📌 Example:
-
Breaking into someone’s social media account.
✅ Cracking
Cracking means breaking security systems with bad intentions.
Crackers:
-
Steal data
-
Damage systems
-
Remove software protection
📌 Example:
Breaking paid software so it can be used for free.
🔎 Difference Between Hacking and Cracking
| Hacking | Cracking |
|---|---|
| Can be legal | Always illegal |
| May improve security | Always harmful |
| Done by ethical hackers | Done by criminals |
14.1.3 Types of Hackers
🟢 Script Kiddie
-
Beginner hacker
-
Uses ready-made tools
-
Has little knowledge
📌 Example: A student downloads hacking software and tries to break into a game.
⚪ White Hat Hacker
-
Ethical hacker
-
Works legally
-
Helps improve security
📌 Example: A bank hires a white hat hacker to test its website security.
⚫ Black Hat Hacker
-
Criminal hacker
-
Steals data
-
Causes damage
📌 Example: Stealing credit card information.
🟡 Grey Hat Hacker
-
Mix of white and black hat
-
May hack without permission but not for personal gain
📌 Example: Finding a security weakness and informing the company later.
🟢 Green Hat Hacker
-
Beginner who wants to learn hacking
-
Not very experienced
🔴 Red Hat Hacker
-
Fights against black hat hackers
-
Stops cyber criminals
🔵 Blue Hat Hacker
-
Security expert invited to test a system before launch
14.1.4 Types of Malware
🦠 Virus
-
Attaches to files
-
Spreads when file is opened
-
Damages data
📌 Example: A virus deletes Word documents.
🐛 Worm
-
Spreads automatically
-
Does not need a file
📌 Example: Spreads through internet and slows network.
📢 Adware
-
Shows unwanted advertisements.
📌 Example: Pop-up ads opening again and again.
🕵 Spyware
-
Secretly collects information.
📌 Example: Records passwords.
🐴 Trojan Horse
-
Looks like useful software
-
Contains hidden malware
📌 Example: Fake game that installs virus.
14.2 Computer Viruses
14.2.1 How Malware Spreads
a. Infected Flash Drives / CDs
If USB has virus → it spreads when connected.
b. Pirated Software
Illegal software often contains hidden malware.
c. Local Area Network (LAN)
One infected computer can infect others in the same network.
d. Internet
Downloading unsafe files spreads malware.
e. Email Attachments
Opening unknown attachments can install virus.
14.2.2 Symptoms of Malware Attack
-
Computer becomes slow
-
Strange pop-up ads
-
Files deleted automatically
-
Unknown programs installed
-
System crashes frequently
14.2.3 Precautions Against Malware
-
Install antivirus software
-
Do not use pirated software
-
Scan USB before use
-
Do not open unknown email attachments
-
Update operating system regularly
-
Use firewall protection
14.3 Authentication Mechanisms
14.3.1 Authentication vs Authorization
| Authentication | Authorization |
|---|---|
| Verifying identity | Giving permission |
| Who are you? | What can you do? |
📌 Example:
Logging in with password = Authentication
Accessing admin panel = Authorization
14.3.2 2FA vs MFA
Two-Factor Authentication (2FA)
Uses two methods to verify identity.
Example:
-
Password
-
OTP sent to phone
Multi-Factor Authentication (MFA)
Uses two or more methods.
Example:
-
Password
-
OTP
-
Fingerprint
14.3.3 Authentication Methods
a. Username and Password
Most common method.
📌 Example:
Login to Gmail with email and password.
b. PIN (Personal Identification Number)
Short numeric code.
📌 Example:
ATM card PIN.
c. Access Cards
Card used to enter restricted area.
d. Biometrics
Uses body features:
-
Fingerprint
-
Face
-
Eye scan
📌 Example:
Unlocking phone with fingerprint.
___________________________________________________________________________________
14.1.3 Types of Hackers (Detailed Explanation in Simple Language)
Hackers are people who use their computer skills to find weaknesses (security gaps) in computer systems.
Some hackers use their skills for good purposes, while others use them for bad purposes.
Let’s explain each type in detail with examples.
🟢 Script Kiddie
✅ Who are Script Kiddies?
A script kiddie is a beginner hacker who does not have much technical knowledge.
They use ready-made hacking tools or software created by others.
They do not understand how hacking really works — they just download tools and try them.
✅ Characteristics:
-
Little experience
-
Uses tools made by others
-
Hacks for fun, attention, or to impress friends
-
Sometimes causes damage without knowing
📌 Example:
A student downloads a password cracking tool from the internet and tries to hack a game account.
❗ Danger Level:
Medium — because even without knowledge, they can still cause harm using powerful tools.
⚪ White Hat Hacker (Ethical Hacker)
✅ Who are White Hat Hackers?
White hat hackers are ethical hackers.
They hack legally and with permission to improve security.
Their job is to:
-
Find security weaknesses
-
Report problems
-
Help companies fix them
✅ Characteristics:
-
Highly skilled
-
Work for companies or government
-
Follow laws and ethics
-
Help protect systems
📌 Example:
A bank hires a white hat hacker to test its website to make sure criminals cannot steal customer data.
🎯 Purpose:
To protect systems and stop cybercrime.
⚫ Black Hat Hacker
✅ Who are Black Hat Hackers?
Black hat hackers are criminal hackers.
They hack systems for money, revenge, or personal benefit.
They break into systems without permission.
✅ Characteristics:
-
Illegal activities
-
Steal data
-
Spread malware
-
Damage systems
📌 Example:
A hacker breaks into a company’s database and steals customers’ credit card details.
❗ Danger Level:
Very High — because they can cause serious financial and data loss.
🟡 Grey Hat Hacker
✅ Who are Grey Hat Hackers?
Grey hat hackers are in between white and black hat hackers.
They may hack without permission, but they usually do not want to harm anyone.
Sometimes they:
-
Find security weaknesses
-
Inform the company
-
Ask for reward
✅ Characteristics:
-
Break rules but not always criminals
-
May not have bad intentions
-
Do not always take permission first
📌 Example:
A person finds a weakness in a website and tells the company after hacking into it.
⚠ Important:
Even if their intention is good, hacking without permission is still illegal.
🟢 Green Hat Hacker
✅ Who are Green Hat Hackers?
Green hat hackers are beginners who want to learn hacking properly.
They:
-
Study cybersecurity
-
Practice legally
-
Want to become ethical hackers
✅ Characteristics:
-
New learners
-
Interested in security
-
Still gaining experience
📌 Example:
A student taking a cybersecurity course and learning how firewalls work.
🔴 Red Hat Hacker
✅ Who are Red Hat Hackers?
Red hat hackers fight against black hat hackers.
They are like “digital soldiers” who:
-
Attack criminal hackers
-
Destroy their systems
-
Protect organizations
✅ Characteristics:
-
Very aggressive toward criminals
-
Focus on stopping cybercrime
-
Work to protect networks
📌 Example:
A red hat hacker tracks down a cybercriminal and disables their hacking server.
🔵 Blue Hat Hacker
✅ Who are Blue Hat Hackers?
Blue hat hackers are security experts invited by companies to test a system before launching it.
They are usually hired for:
-
Finding weaknesses
-
Testing new software
📌 Example:
A software company invites a blue hat hacker to test a new app before releasing it to the public.
✅ Quick Comparison Table
| Type | Purpose | Legal or Illegal? |
|---|---|---|
| Script Kiddie | For fun / attention | Usually illegal |
| White Hat | Improve security | Legal |
| Black Hat | Steal / damage | Illegal |
| Grey Hat | Mix of both | Sometimes illegal |
| Green Hat | Learning | Legal |
| Red Hat | Fight criminals | Legal (if authorized) |
| Blue Hat | Testing systems | Legal |
🎯 Simple Summary
-
White hat = Good hacker
-
Black hat = Bad hacker
-
Grey hat = In between
-
Script kiddie = Beginner using tools
-
Green hat = Learning hacker
-
Red hat = Fights criminals
-
Blue hat = Security tester






