wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Computer security techniques

profile
Krishna Johari
Sep 09, 2024
0 Likes
0 Discussions
95 Reads
Computer Security Techniques 
1. Computer Security, also referred to as cybersecurity, is the practice of protecting computer systems, networks, and data from theft, damage, and unauthorized access. 
2. It involves implementing measures that prevent and respond to security threats, ensuring the confidentiality, integrity, and availability of information.
3. Several techniques are used to protect computer systems. 
4. Below are explanations of the key techniques like Authentication, Access Control, Intrusion Detection, Malware Defense, and Buffer Overflow Attack mitigation.
•Authentication :
(I) Authentication is the process of verifying a user's identity before granting access to sensitive data or systems. Common forms include password-based, multi-factor, biometric, and token-based. (II) These methods ensure only authorized individuals can access sensitive data and systems, reducing vulnerability to attacks.
•Access control : 
(I) Access Control is a system mechanism that restricts access to specific resources. It can be discretionary, mandatory, role-based, or access control lists. 
(II) Discretionary Access Control (DAC) determines access and permissions, Mandatory Access Control (MAC) assigns permissions based on security policies, and Role-Based Access Control (RBAC) assigns access based on roles within an organization.
•Intrusion Detection : 
(I) Intrusion Detection Systems (IDS) monitor network traffic to detect unauthorized access or activities. 
(II) They can be Signature-Based, Anomaly-Based, Host-Based, or Network-Based, focusing on incoming and outgoing traffic, log files, configuration changes, and process behavior.
•Malware Defense : 
(I) Malware, including viruses, worms, trojans, and ransomware, infiltrates systems without user knowledge.
(II) Defending against it involves antivirus software, firewalls, sandboxing, and regular updates/patches to prevent malware from affecting systems.
•Dealing with Buffer Overflow Attacks : 
(I) Buffer overflow attacks occur when a program writes more data than it can hold, potentially leading to malicious code execution. 
(II) Defenses include bounds checking, data execution prevention, address space layout randomization, and safe programming practices like using memory-management languages like Java or Python.

Comments ()


Sign in

Read Next

social media issue

Blog banner

Question

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner

c

Blog banner

The art of being alone

Blog banner

Explain DBMS in Brief

Blog banner

Starvation

Blog banner

Bitcoin sent using radio waves! No internet!

Blog banner

Benefits and drawback of web security.

Blog banner

All you need to know about “Off-page SEO”

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

Cloud Computing

Blog banner

Jio .....A Revolution ?? ??

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

Financial Fraud Detection

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

5 ways to save money on catering services in Mumbai

Blog banner

Deadlock and Starvation

Blog banner

GIS info about Bermuda Triangle

Blog banner

Making Money through Instagram

Blog banner

**THE MUJAWARR: Transforming the Logistics Industry**

Blog banner

Os Virtual Memory

Blog banner

Microsoft Windows Overview

Blog banner

Memory heirchy

Blog banner

Starvation

Blog banner

Business Intelligence v/s Big Data

Blog banner

Mumbai Metro 3

Blog banner

Virtual memory

Blog banner

Importance Of Yoga.

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

RAID

Blog banner

Security and E-mail

Blog banner

What is Password Cracking ? and it's Techniques.

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

Web Site

Blog banner

I/O Management and Disk Scheduling

Blog banner

Life lesson

Blog banner

Deadlock and Starvation

Blog banner

Life

Blog banner

All you need to know about “On-page SEO”

Blog banner

A Happier Workplace Starts with Healthy Lunches by Meal Maharaj

Blog banner