wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Computer Security

profile
Yash Thumar
Sep 10, 2024
0 Likes
0 Discussions
39 Reads

Computer security refers to protecting and securing computers and their related data, networks, software, hardware from unauthorized access, misuse, theft, information loss, and other security issues. The Internet has made our lives easier and has provided us with lots of advantages but it has also put our system’s security at risk of being infected by a virus, of being hacked, information theft, damage to the system, and much more.

●Three key objectives that are at the heart of computer security:

1.Confidentiality: Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. A loss of confidentiality is the unauthorized disclosure of information. This term covers two related concepts:

●Data confidentiality: Assures that private or confidential information is not made available or disclosed to unauthorized individuals.

●Privacy: Assures that individuals controlor influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.

2.Integrity: Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity. A loss of integrity is the unauthorized modification or destruction of information.This term covers two related concepts:

●Data integrity: Assures that information (both stored and in transmitted packets) and programs are changed only in a specified and authorized manner.

●System integrity: Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.

3.Availability: Ensuring timely and reliable access to and use of information. A loss of availability is the disruption of access to or use of information or an information system .Assures that systems work promptly and service is not denied to authorized users.


Comments ()


Sign in

Read Next

Memory management

Blog banner

The Benefits of Practical Life Activities in Preschool

Blog banner

Therapy Myths That Need to End in 2025

Blog banner

Game Theory in Blockchain

Blog banner

VPN

Blog banner

A Short History of GIS

Blog banner

8 Reasons Why You Must Try Digital Marketing

Blog banner

Cloud Security: Trends and Innovations

Blog banner

FREE VERSION OF G-MAIL

Blog banner

Deadlock

Blog banner

Vikrant’s first blog

Blog banner

Firewall / IDS Evasion Techniques

Blog banner

Digital Forensics Challenges and Tools

Blog banner

IP ADDRESS

Blog banner

Modern Teaching Methods: Why Inquiry-based & Experiential Learning Works Best

Blog banner

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

Service Operations Principles

Blog banner

Memory Management in Operating System

Blog banner

The Rich Heritage Of Patola Sarees: Gujarat’s Timeless Weaving Art

Blog banner

Which is a good bike to buy?

Blog banner

Social Media.

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

ACHIEVEMENTS IN OPERATING SYSTEMS

Blog banner

Sweet and Sour Mango Pickle (Gol Keri)

Blog banner

What are Tenders its various types

Blog banner

Wreck

Blog banner

Wrike

Blog banner

Data Science & AI

Blog banner

Deadlock and starvation in operating system

Blog banner

Career v/s Job : Choose your passion

Blog banner

Guidelines for a Low sodium Diet.

Blog banner

IT security management

Blog banner

Penetration Testing

Blog banner

5 Things I As A Dentist Would Never Do (And What You Can Learn From It)

Blog banner

Top 5 Benefits of Artificial Intelligence

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

Os assignment

Blog banner

Threads

Blog banner

Memory management

Blog banner

'Positivity in life'

Blog banner

Firewall in Computer Network

Blog banner