wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

computer security

profile
Khushi Sanghavi
Sep 09, 2024
0 Likes
0 Discussions
95 Reads

computer security refers to protecting and securing computers and their related data, networks, software, hardware from unauthorized access, misuse, theft, information loss, and other security issues. The Internet has made our lives easier and has provided us with lots of advantages but it has also put our system’s security at risk of being infected by a virus, of being hacked, information theft, damage to the system, and much more

Three key objectives that are at the heart of computer security:

1.Confidentiality: Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. A loss of confidentiality is the unauthorized disclosure of information.

2.Integrity: Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity. A loss of integrity is the unauthorized modification or destruction of information

3.Availability: Ensuring timely and reliable access to and use of information. A loss of availability is the disruption of access to or use of information or an information system .Assures that systems work promptly and service is not denied to authorized users.

Types of computer security

Computer security can be classified into four types:

1. Cyber Security: Cyber security means securing our computers, electronic devices, networks , programs, systems from cyber attacks. Cyber attacks are those attacks that happen when our system is connected to the Internet.

2. Information Security: Information security means protecting our system’s information from theft, illegal use and piracy from unauthorized use. Information security has mainly three objectives: confidentiality, integrity, and availability of information.

3. Application Security: Application security means securing our applications and data so that they don’t get hacked and also the databases of the applications remain safe and private to the owner itself so that user’s data remains confidential.

4. Network Security: Network security means securing a network and protecting the user’s information about who is connected through that network. Over the network hackers steal, the packets of data through sniffing and spoofing attacks, man in the middle attack, war driving, etc, and misuse the data for their benefits.

~khushi sanghavi (53003230009).


Comments ()


Sign in

Read Next

GraphQL

Blog banner

Memory Management in Operating System

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

Memory management

Blog banner

Google classroom

Blog banner

Multicore and multithreading 171

Blog banner

6 Digital Marketing Trends You Must Watch Out For In 2022

Blog banner

Dr. Venkadavarahan

Blog banner

Data Mining

Blog banner

Cache memory

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

Top 3 Places To Stay In Vienna

Blog banner

Importance of modern technology era

Blog banner

Image Steganalysis in Digital Forensics

Blog banner

SQL Injection

Blog banner

Understanding E-mail Servers

Blog banner

Why is online marketing is important in current scenario

Blog banner

Multiprocessor

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

Multiple processor scheduling

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

Types of Threads

Blog banner

Understanding Gen Z: A Generation Facing Crisis and Potential

Blog banner

Linux 94

Blog banner

Why You Should Not Use Free VPNs

Blog banner

Education?

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

Assignment-3

Blog banner

security requirements for safe e-payment

Blog banner

Service stratergy principles

Blog banner

Security in Operating Systems

Blog banner

Earth with no trees

Blog banner

(Input/Output) in os

Blog banner

Threads

Blog banner

SECURITY TOOLS

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

Life

Blog banner

Data Warehouse Bus Matrix

Blog banner

Visualization in Data Science

Blog banner

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner

Instagram Features in 2023 That Will Leave You Stunned!

Blog banner