ISEC NOTES CHAPTER 1-4
ISEC NOTES CHAPTER 1-4
• Pre-computer era: Security was about locking filing cabinets and physical safes.
• Mainframe era: Simple passwords protected central computers.
• Networked era: As systems connected via LANs/WANs/Internet, security needed
to protect data in motion.
• Modern era: Cybersecurity threats include hackers, malware, social engineering,
etc. Security now includes people, processes, and technology.
🔄 3. Security in the Systems Development Life Cycle (SDLC)
Role Responsibility
Chief Information Security Officer Oversees all info security programs in the organization.
(CISO)
IT Manager Manages IT staff and ensures infrastructure supports security.
Security Analyst Monitors threats, analyses risks, and recommends solutions.
Software Developer Writes secure code and ensures applications are not
vulnerable.
End Users Follow security policies, use strong passwords, avoid risky
behaviors.
🛡️ Theme 2: The Need for Security
Organizations collect and store sensitive data (like customer records, financial data). If
this is compromised:
• SQL Injection: If input is not sanitized, attackers can access the database.
• Cross-Site Scripting (XSS): Attackers inject code into websites to steal user data.
• Unvalidated Input: Not checking input types allows code execution.
• Hardcoded Passwords: Using fixed passwords in code exposes systems.
• No Error Handling: Reveals system info when crashes happen.
2. True or False: Information security only focuses on protecting data from hackers.
• Initiation
• Design
• Maintenance
• Implementation
4. Which of the following roles is responsible for overseeing all information security
programs in an organisation?
a) IT Technician
b) Software Developer
c) CISO
d) Database Administrator
6. Fill in the blank: In the SDLC, the __________ phase involves conducting security
testing like penetration testing and vulnerability scans.
7. True or False: End users are not responsible for any part of information security.
a) Accountability
b) Integrity
c) Confidentiality
d) Availability
a) Fire
b) Ransomware
c) Employee strike
a) Legal penalties
c) Financial damage
16. Fill in the blank: SQL injection is an example of an attack due to _______________.
17. What law in South Africa requires organisations to protect personal data?
18. Which role is mainly responsible for ensuring code written does not introduce
vulnerabilities?
a) Security Analyst
b) Software Developer
c) End User
d) IT Support
Chapter 2
Risk Management is a plan to protect something important (like data or systems) by:
Example: A company stores customer credit card info. Risk management helps them
find out:
• Risk Identification: Finding what could go wrong (e.g., “someone might hack into
our system”).
• Risk Assessment: Figuring out how likely and how bad each risk is.
• Risk Control: Deciding how to prevent or reduce the risk (e.g., using strong
passwords, antivirus software).
1. Identify risks
2. Analyze how serious they are (likelihood × impact)
3. Prioritize the biggest ones
4. Decide on actions to reduce them
Example: A small risk with a big impact may still need attention.
Goal: Everyone should know how to avoid mistakes like clicking on phishing emails.
• Cyberattacks
• Fires
• System crashes
Because no system is perfect, and problems can happen anytime. Being prepared saves
time, money, and reputation.
Example: If the power goes out, the plan might include using backup generators and
restoring systems from backups.
Theme Focus
Risk Management Identifying, assessing, and controlling
threats
Security Management Roles, policies, and planning for good
security
Incident/Contingency Handling problems and continuing
Planning operations
Chapter 3
Think of access control like a security gate for information. It controls who can enter,
what they can do, and what they can’t do inside a system or building.
• Fingerprint scanners
• Facial recognition
• Iris scans
• MAC (Mandatory Access Control) – Strict rules set by the system, not users.
• DAC (Discretionary Access Control) – Owners control who gets access.
• RBAC (Role-Based Access Control) – Access is based on job roles.
🛡️ Theme 2: Protecting Connections
🔥 5. Types of Firewalls
Firewalls are like security guards that inspect traffic coming in or out.
• Single Bastion Host: One heavily protected computer that controls access.
• Screened Host: Adds a firewall between users and the protected system.
• Screened Subnet (DMZ): Isolates public-facing services to keep internal systems
safer.
🧹 8. Content Filters
Used in:
• Schools
• Businesses
• Public Wi-Fi
• Devices move
• Signals are hard to monitor
• Easier to spoof (pretend to be someone else)
• Missing updates
• Weak passwords
• Open ports
Quizzz
Great! Here are quiz questions and answers based on Learning Unit 3: Security
Technology, separated clearly for your study convenience.
✅ Quiz Questions: Learning Unit 3
🔒 Access Control
🛡️ Protecting Connections
11. What does an Intrusion Detection and Prevention System (IDPS) do?
12. What is the difference between host-based and network-based IDPS?
13. Why is wireless IDPS more challenging?
14. What is the difference between signature-based and anomaly-based IDPS?
15. Name two scanning or analysis tools used in cybersecurity.
✅ Quiz Answers: Learning Unit 3
🔒 Access Control
🛡️ Protecting Connections
Chapter 4
🧠 Learning Unit 4: Cryptography & Physical Security – Full Explanation
🔐 Theme 1: Cryptography
Analogy: Imagine writing a secret message to a friend and locking it in a box. You
keep the key, and your friend has a copy. Only you two can unlock the box.
• A hash takes any file or text and turns it into a short code.
• You can’t reverse a hash to get the original data.
• Used to:
o Check if a file has been changed
o Secure passwords (you never store real passwords — only their hash)
Analogy: Like turning a document into a barcode — if the content changes, the
barcode changes too.
1. Symmetric encryption
a. One key for locking and unlocking
b. Fast but risky if someone steals the key
c. Example: AES
2. Asymmetric encryption
a. Two keys: public (for everyone) and private (just for you)
b. Secure, used in emails, digital signatures
c. Example: RSA
3. Hashing
a. One-way only
b. Checks if something was changed
Protocol Use
SSL/TLS Secure websites
(HTTPS)
IPSec Secures network data
PGP Secure emails
HTTPS Website security layer
Not all security is digital. If someone steals your laptop or server, they can get your
data too. That’s why we must protect the physical space.
🛡️ LO8: Why Physical Security Matters
• You can have the best encryption in the world, but if someone walks in and steals
the computer, your data is still at risk.
• So, we need locks, gates, guards, and environmental control.
Threat Description
Theft Someone steals a device
Fire Destroys physical systems
Flood Damages computers and files
Power failure System shutdowns, data loss
Someone intentionally destroys
Vandalism
data
Treat server rooms like bank vaults — protect the "gold" (data).
Theme 1: Cryptography