wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Computer Security

profile
Yash Thumar
Sep 10, 2024
0 Likes
0 Discussions
39 Reads

Computer security refers to protecting and securing computers and their related data, networks, software, hardware from unauthorized access, misuse, theft, information loss, and other security issues. The Internet has made our lives easier and has provided us with lots of advantages but it has also put our system’s security at risk of being infected by a virus, of being hacked, information theft, damage to the system, and much more.

●Three key objectives that are at the heart of computer security:

1.Confidentiality: Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. A loss of confidentiality is the unauthorized disclosure of information. This term covers two related concepts:

●Data confidentiality: Assures that private or confidential information is not made available or disclosed to unauthorized individuals.

●Privacy: Assures that individuals controlor influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.

2.Integrity: Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity. A loss of integrity is the unauthorized modification or destruction of information.This term covers two related concepts:

●Data integrity: Assures that information (both stored and in transmitted packets) and programs are changed only in a specified and authorized manner.

●System integrity: Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.

3.Availability: Ensuring timely and reliable access to and use of information. A loss of availability is the disruption of access to or use of information or an information system .Assures that systems work promptly and service is not denied to authorized users.


Comments ()


Sign in

Read Next

Image Steganalysis in Digital Forensics

Blog banner

Importance Of Blockchain

Blog banner

Celebrate Diwali the Delicious Way with Meal Maharaj Catering

Blog banner

Life

Blog banner

Disk Management

Blog banner

AI and Data Science: Revolutionizing Industries

Blog banner

Cache Memory

Blog banner

Is Pursuing a Dance Career in India Worth it?

Blog banner

Introduction to Virtual Memory - 080

Blog banner

Paralysis/Paralysis Stroke

Blog banner

Multiple processor scheduling

Blog banner

MODERN OPERATING SYSTEM

Blog banner

What is Anxiety? How to manage Anxiety?

Blog banner

Cross site scripting Attack

Blog banner

What is service level Agreement?

Blog banner

Fun Christmas Activities For Toddlers & Kids

Blog banner

Evolution of Operating Systems

Blog banner

Data Visualization

Blog banner

Autonomy Vehicles: Future Ki Gadiya

Blog banner

Direct memory access

Blog banner

Socket Programming in Java

Blog banner

Technical SEO : Total Guide

Blog banner

SQL Injection practice on DVWA

Blog banner

Cyber Laws In India and Around the World

Blog banner

Continual service improvement vs maintenance phase in IT

Blog banner

Traveling

Blog banner

COMPUTER FORENSICS AND GRAPHICS

Blog banner

Solving Problems with AI: The Power of Search Algorithms

Blog banner

Some web vulnerabilities

Blog banner

Risk management in IT

Blog banner

AI & Data Science in Healthcare – Predicting diseases, medical imaging analysis

Blog banner

Types of OS

Blog banner

Cloud Security: Trends and Innovations

Blog banner

Race Conditions

Blog banner

Types of Viruses

Blog banner

Harsh Rathod

Blog banner

Exploring the Power of Encase Forensic Tools: Unraveling Digital Mysteries

Blog banner

PERT Overview

Blog banner

AOL Mail

Blog banner

Importance of Morning Routines for Students During the Festive Season

Blog banner

Indian Food

Blog banner

Types of Threads

Blog banner