wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Computer Security

profile
Yash Thumar
Sep 10, 2024
0 Likes
0 Discussions
39 Reads

Computer security refers to protecting and securing computers and their related data, networks, software, hardware from unauthorized access, misuse, theft, information loss, and other security issues. The Internet has made our lives easier and has provided us with lots of advantages but it has also put our system’s security at risk of being infected by a virus, of being hacked, information theft, damage to the system, and much more.

●Three key objectives that are at the heart of computer security:

1.Confidentiality: Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. A loss of confidentiality is the unauthorized disclosure of information. This term covers two related concepts:

●Data confidentiality: Assures that private or confidential information is not made available or disclosed to unauthorized individuals.

●Privacy: Assures that individuals controlor influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.

2.Integrity: Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity. A loss of integrity is the unauthorized modification or destruction of information.This term covers two related concepts:

●Data integrity: Assures that information (both stored and in transmitted packets) and programs are changed only in a specified and authorized manner.

●System integrity: Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.

3.Availability: Ensuring timely and reliable access to and use of information. A loss of availability is the disruption of access to or use of information or an information system .Assures that systems work promptly and service is not denied to authorized users.


Comments ()


Sign in

Read Next

You'll get to know about Pankaj Negi

Blog banner

Modern Operating System

Blog banner

NETSUITE

Blog banner

Benefits and drawback of web security.

Blog banner

Memory Management

Blog banner

virtual machine

Blog banner

5 ways to save money on catering services in Mumbai

Blog banner

Types of email

Blog banner

Internet of Things and cyber security

Blog banner

10 Interesting facts you should know!!!

Blog banner

Android Flashlight Application

Blog banner

Google classroom

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

What Makes Patola the Queen of Silk?

Blog banner

Why Extreme Opinions Are Rising: Psychological Insights into Society’s Divides

Blog banner

Paginng In OS

Blog banner

Threats To Computer System

Blog banner

Why Kanye West (Now Ye) is the GOAT: A Legacy Beyond Music

Blog banner

R Programming

Blog banner

Why Consistency in Eating Habits Matters and How Meal Maharaj Makes It Easy

Blog banner

File system

Blog banner

Process Creation

Blog banner

Data Structures

Blog banner

How social media affect

Blog banner

Memory Management

Blog banner

Uniprocessor Scheduling

Blog banner

Impact of social media on the human life

Blog banner

Different types of scam Fraud

Blog banner

Operating system and overviews

Blog banner

The Psychology of Diversity, Equity & Inclusion: How Inclusive Workplaces Boost Productivity

Blog banner

Beautiful and stunning natural phenomena worth to see

Blog banner

Maharashtrian culture: Tradition, Art, Food

Blog banner

Note on Process, Process creation and Process termination

Blog banner

HOW CAN SOCIAL MEDIA MAKE YOU HAPPIER?

Blog banner

Disk Management

Blog banner

Cyber Forensics

Blog banner

How Reading Books Shape a Child’s Imagination and Thinking?

Blog banner

M commerce

Blog banner

Virtual Machine

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

OS ASSIGNMENT

Blog banner

Memory Management

Blog banner