System Security
System security coursework covered host-based security measures, malware analysis, and intrusion detection. This page documents my learning in protecting individual systems from compromise.
Course Topics Covered
Malware Classification: Viruses, worms, trojans, and ransomware
Intrusion Detection Systems: Signature-based and anomaly-based detection
Host-Based Security: File integrity monitoring (Tripwire)
Authentication Mechanisms: Password policies and multi-factor authentication
Key Assignments
Malware Analysis
I studied how malware propagates and the differences between various malware types. Understanding that worms self-replicate while viruses require host programs, and how trojans masquerade as legitimate software, has informed my approach to system defense. Analysis of real-world malware incidents demonstrated the importance of layered security approaches.
Intrusion Detection
Coursework covered both signature-based detection, which identifies known attack patterns, and anomaly-based detection, which identifies deviations from normal behavior. I learned the advantages and limitations of each approach and how statistical profiling can detect novel attacks without prior knowledge of specific vulnerabilities.
Reflection
System security requires vigilance at every level—from password policies to malware defenses to intrusion detection. This coursework reinforced that security is not a product but a process requiring continuous monitoring and adaptation. The practical exercises with tools like Tripwire demonstrated how file integrity monitoring can detect unauthorized changes, while malware analysis taught me to think like an adversary to better defend systems.
