COMPUTER SECURITY
Group Assignment on Computer Science
Topics
Title Page
Assignment Title: Understanding Computer Security and Related Concepts
Group Members:
1. Mahelet Yigebahal 040/16
2. [Member Name 2], [Student ID 2]
3. [Member Name 3], [Student ID 3]
4. [Member Name 4], [Student ID 4]
5. [Member Name 5], [Student ID 5]
Section: [Your Section]
Table of Contents
1. Introduction
2. Computer Security
Definition and Importance
Real-life Examples
3. Malware
Definition
Types of Malware
4. Binary, Decimal, and Other Number Systems
Why Computers Use Binary
5. Advantages of Hexadecimal and Octal Number Systems
6. Number Conversions
Decimal to Binary, Octal, and Hexadecimal
Binary to Decimal Conversion
Binary Multiplication
7. Conclusion
8. References
Question 1: Introduction
In this document, we explore fundamental concepts in computer science, focusing on computer security,
malware, and number systems. Our goal is to provide a comprehensive understanding of these topics
through detailed explanations and practical examples.
Question 2: Computer Security
Definition and Importance
Computer security, also known as cybersecurity, involves protecting computer systems from theft, damage,
and unauthorized access. It ensures the integrity, confidentiality, and availability of information.
- Computer security (also called cybersecurity) refers to the protection of computer systems, networks,
and data from unauthorized access, theft, damage, or disruption. It involves the implementation of
various tools and practices to ensure the confidentiality, integrity, and availability of information.
2. Why is Computer Security Important?
Prevents Data Breaches: Protects sensitive data like personal info, banking details, or company secrets.
Avoids Financial Loss: Cyberattacks can lead to huge losses for individuals and businesses.
Protects Reputation: Companies that suffer data leaks often lose customer trust.
Ensures Safety: Some attacks can affect critical systems like healthcare, power grids, and transport.
Real-life Examples
Data Breaches: Companies like Equifax and Yahoo have faced significant data breaches, leading to
the compromise of millions of user records.
Ransomware Attacks: The 2017 WannaCry attack encrypted data on infected systems, demanding
ransom payments in Bitcoin.
Ransomware Attack on Hospitals
In 2020, ransomware (a type of malware that locks files and demands payment) hit hospitals in the U.S.
during the COVID-19 pandemic. Hackers demanded money to unlock patient records, delaying critical
care. This shows how computer security can directly affect human lives.
b. Facebook Data Leak (2019)
Over 530 million Facebook users' phone numbers and personal information were exposed due to poor
security. This leak showed how weak security practices can lead to massive data privacy violations.
c. Bank Card Skimming
Hackers often install hidden devices or malware in ATMs or websites to steal card details. For example,
Ethiopian bank customers have faced such fraud when using online payment platforms not protected with
HTTPS (secure encryption).
d. Ethiopian Airlines Cybersecurity Measures
Ethiopian Airlines uses firewalls, encryption, and multi-factor authentication to protect passengers’
booking details and internal systems from cyberattacks.
4. Common Computer Security Threats
-Malware: Viruses, worms, ransomware, and spyware.
-Phishing: Fake emails tricking users to give up passwords.
-Hacking: Unauthorized access to systems.
-Social Engineering: Tricking people into revealing confidential info.
-Insider Threats: Employees misusing their access rights.
5. Best Practices to Enhance Computer Security
-Use strong passwords and change them regularly.
-Enable two-factor authentication (2FA).
-Install antivirus and firewall software.
-Update software and systems to patch vulnerabilities.
-Avoid clicking on suspicious links or opening unknown attachments.
-Backup data regularly to recover in case of attack.
Question 3: Malware
Malware stands for malicious software — a broad term used to describe any program or file that is
intentionally designed to cause damage, gain unauthorized access, or disrupt normal functioning of
computers, servers, networks, or users.
Malware operates without the user’s consent and can silently run in the background, steal data, spy on
activities, damage systems, or demand money. It is one of the biggest threats in the field of computer
security and can affect individuals, businesses, and even governments.
How Does Malware Spread?
-Malware can spread through various means, such as:
-Email attachments (especially from unknown senders)
-Infected websites or fake pop-up ads
-Removable media like USB drives
-Software downloads from untrusted sources
-Phishing and social engineering tricks
Impact of Malware:
-The consequences of malware can be serious and include:
-Loss of important data
-Identity theft
-Financial loss
-System crashes or corruption
-Legal and reputational damage (for companies)
Types of Malware (with Detailed Explanation)
Malware comes in many forms, depending on how it behaves and what it’s designed to do. Here are two of
the most common types, explained in detail:
1. Virus
-A computer virus is a type of malware that attaches itself to a clean file or program, and spreads to other
programs or systems when the infected file is opened or executed. Just like a biological virus, it needs a
host to survive and spread.
How it works:
-Once activated, the virus starts replicating and infecting other files or systems.
-It can delete files, corrupt data, slow down system performance, or completely crash a computer.
Real-Life Example:
-The ILOVEYOU virus (2000) is one of the most famous viruses in history. It came through an email with
the subject "I LOVE YOU" and an attachment. Once opened, it spread rapidly and deleted important files,
affecting over 50 million systems worldwide.
Prevention:
-Use up-to-date antivirus software
-Avoid opening unknown email attachments
-Regularly update your operating system and software
2. Ransomware
-Ransomware is a type of malware that locks or encrypts a user’s files and then demands a ransom —
usually in cryptocurrency — to unlock or decrypt the data.
How it works:
-Ransomware usually enters a system through a phishing email or a malicious link.
-Once inside, it encrypts all files, making them inaccessible to the user.
-A ransom note appears, demanding payment (e.g., in Bitcoin) in exchange for the decryption key.
Real-Life Example:
-In 2017, the WannaCry ransomware attack hit more than 200,000 computers across 150 countries. It
locked hospital data in the UK, shut down businesses, and caused an estimated $4 billion in losses.
Prevention:
-Backup important data regularly
-Do not click on suspicious links or download unknown attachments
-Use anti-ransomware tools and keep systems updated
*Other Common Types of Malware (Briefly Listed):
Type of Malware Description
-Worms Self-replicating malware that spreads without user action.
-Trojan Horse Disguises itself as legitimate software but contains hidden malware.
-Spyware Secretly records user actions like keystrokes and online activity.
Adware Displays unwanted
ads and may redirect browser searches.
Rootkits Hide deep inside systems to allow remote control without detection.
Question 4: Binary, Decimal, and Other Number Systems
Why Computers Use Binary
Computers use the binary number system (base-2), which consists only of two digits: 0 and 1. Unlike
humans who typically use the decimal system (base-10), computers are built on a different foundation that
makes binary far more efficient and practical for their operation.
1. Simple and Reliable Electronic Design
The most important reason computers use binary is that it matches the basic physical design of electronic
circuits.
Binary digits can easily be represented using two voltage levels:
0 = Low voltage or off
1 = High voltage or on
This system is simple, stable, and reliable. It is easier to detect only two states rather than multiple levels
like 0–9 in decimal.
📌 Real-life example: Inside a computer chip, a tiny switch (called a transistor) turns on or off to represent
binary 1 or 0. These millions or billions of switches make up the computer's logic and memory.
2. Less Risk of Error
With binary, detecting and maintaining only two states (on/off) reduces the chances of misinterpretation
caused by electrical noise or interference.
If computers used decimal (with 10 voltage levels), it would be much harder to accurately distinguish
between small differences in voltage.
This would increase the risk of errors, especially in high-speed processing.
3. Easier for Logical Operations
Binary is ideal for performing logical operations (like AND, OR, NOT) that are the foundation of
computing.
Logic gates in a computer use binary to control decision-making and data processing.
These operations are simpler and faster in binary because they only have to consider two possibilities: true
(1) or false (0).
🧠 Example: If a computer wants to check if two signals are both active, it uses a binary AND gate — it
outputs 1 only if both inputs are 1.
4. Cost-Efficient Hardware
Building binary-based hardware (like processors and memory chips) is cheaper and more energy-efficient.
Fewer components are needed to represent 0 and 1.
It also consumes less power and reduces the complexity of design.
💡 Using decimal would require circuits capable of handling 10 distinct levels, which would be more
expensive, slower, and more prone to failure.
5. Compatibility with Digital Technology
Most modern technology — from smartphones to satellites — is based on digital electronics that rely on
binary.
Signals are digitized, meaning they are converted to binary form (0s and 1s) before processing or
transmitting.
Binary data is also easier to store, compress, and encrypt, making it more secure and manageable.
Question 5: Advantages of Hexadecimal and Octal Number Systems
In addition to binary, computers often use hexadecimal (base-16) and octal (base-8) number systems as
shortcuts or abbreviations for representing binary numbers. Although computers operate in binary (0s and
1s), hex and octal make it easier for humans to read, write, and understand large binary values.
🔢 1. Simplifies Large Binary Numbers
Binary numbers can become very long and difficult to manage. Hexadecimal and octal reduce the length
of binary expressions, making them easier to read and work with.
1 hexadecimal digit = 4 binary digits (bits)
1 octal digit = 3 binary digits (bits)
🧠 Example:
Binary: 110101111011
Octal: 6573
Hexadecimal: D7B
This reduction makes code and memory addresses more compact and human-friendly.
🖥️ 2. Easier for Programmers and Engineers
Programmers often deal with memory addresses, machine code, color codes, and low-level hardware
instructions, which are easier to interpret in hex or octal than in raw binary.
Hexadecimal is widely used in:
Memory addresses (e.g., 0x3FA2)
Color codes in HTML/CSS (e.g., #FF5733)
Assembly language and debugging tools
Octal is commonly used in:
Unix file permissions (e.g., chmod 755 = rwxr-xr-x)
📌 Example:
In Linux, file permissions rwxr-xr-x are written as 755 in octal, which is quicker and easier to use than
binary: 111101101.
⚙️ Matches Hardware Architecture
Hex and octal align neatly with binary machine architecture:
Since 1 hex = 4 bits and 1 octal = 3 bits, converting between these systems and binary is fast and error-free.
This is useful in hardware-level programming and digital electronics.
💡 Improves Error Detection and Debugging
When developers inspect long binary sequences (e.g., memory dumps or machine code), errors are easier
to spot when represented in hexadecimal or octal.
Instead of looking at:
1001111100001111
It’s easier to see:
9F0F (in hexadecimal)
🔄 Simple Conversion from Binary
Another benefit is that binary-to-hex or binary-to-octal conversion is direct and doesn't require complex
calculations.
Binary Octal Hexadecimal
000 0 0
111 7 7
1111 - F
1101 - D
This makes switching between systems efficient in programming and digital design.
🧾 Summary of Advantages:
Benefit Explanation
Shorter Representation Large binary numbers become compact and easier to read
Ease for Programmers Common in coding, memory addressing, and system-level debugging
Better Readability Fewer digits mean fewer chances of making mistakes
Fast Conversion with Binary Hex ↔ Binary and Octal ↔ Binary conversions are quick and
straightforward
Helpful in Digital Systems Matches how bits are grouped in modern processors and circuits
Useful in Color and Permission Codes Hex for colors (web design), Octal for file permissions
(Unix/Linux systems)
Question 6: Number Conversions
Decimal to Binary, Octal, and Hexadecimal
Decimal 156:
Let's convert the decimal number 156 into binary, octal, and hexadecimal:
🔹 1. Binary (Base 2):
To convert 156 to binary, divide it by 2 repeatedly:
156 ÷ 2 = 78→ remainder 0
78 ÷ 2 = 39 → remainder 0
39 ÷ 2 = 19 → remainder 1
19 ÷ 2 = 9 → remainder 1
9 ÷ 2 = 4 → remainder 1
4 ÷ 2 = 2 → remainder 0
2 ÷ 2 = 1 → remainder 0
1 ÷ 2 = 0 → remainder 1
Now write the remainders from bottom to top:
🔸 156 in binary = 10011100
🔹 2. Octal (Base 8):
Group the binary number 10011100 in groups of 3 digits from right to left:
Binary: 100 111 00→ pad with a zero → 001 001 110 0
Actually: 100 111 00 → pad with zero → 001 001 110 0 → better: group 3 from right: 010 011 100
But easier: Convert directly:
Use direct division:
156 ÷ 8 = 19→ remainder 4
19 ÷ 8 = 2 → remainder 3
2 ÷ 8 = 0 → remainder 2
Write remainders from bottom to top:
🔸 156 in octal = 234
🔹 3. Hexadecimal (Base 16):
Divide by 16:
156 ÷ 16 = 9 → remainder 12
12 in hexadecimal = C
So:
🔸 156 in hexadecimal = 9C
✅ Final Answer:
Binary: 10011100
Octal: 234
Hexadecimal: 9C
Binary to Decimal Conversion
Binary (1010.101)₂:
To convert the binary number to decimal, we break it into two parts:
🔹 Integer Part:
Convert to decimal using powers of 2:
1×2^3 + 0×2^2 + 1×2^1 + 0×2^0 = 8 + 0 + 2 + 0 = 10
🔹 Fractional Part:
Convert using negative powers of 2:
1×2^{-1} + 0×2^{-2} + 1×2^{-3} = 0.5 + 0 + 0.125 = 0.625
✅ Final Result:
(1010.101)_2 = 10 + 0.625 = \boxed{10.625}_{10}
Binary Multiplication
Binary 111 × 10:
Result: (1110_2)
Question 7: Conclusion
Understanding computer security, malware, and number systems is crucial for navigating and safeguarding
the digital world. Through this document, we have explored these topics in detail, providing both
theoretical insights and practical examples.
: References
[Journal Article on Cybersecurity Best Practices]
[Industry Report on Malware Trends]
[Textbook on Digital Logic and Number Systems]