wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Computer Security

profile
Yash Thumar
Sep 10, 2024
0 Likes
0 Discussions
39 Reads

Computer security refers to protecting and securing computers and their related data, networks, software, hardware from unauthorized access, misuse, theft, information loss, and other security issues. The Internet has made our lives easier and has provided us with lots of advantages but it has also put our system’s security at risk of being infected by a virus, of being hacked, information theft, damage to the system, and much more.

●Three key objectives that are at the heart of computer security:

1.Confidentiality: Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. A loss of confidentiality is the unauthorized disclosure of information. This term covers two related concepts:

●Data confidentiality: Assures that private or confidential information is not made available or disclosed to unauthorized individuals.

●Privacy: Assures that individuals controlor influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.

2.Integrity: Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity. A loss of integrity is the unauthorized modification or destruction of information.This term covers two related concepts:

●Data integrity: Assures that information (both stored and in transmitted packets) and programs are changed only in a specified and authorized manner.

●System integrity: Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.

3.Availability: Ensuring timely and reliable access to and use of information. A loss of availability is the disruption of access to or use of information or an information system .Assures that systems work promptly and service is not denied to authorized users.


Comments ()


Sign in

Read Next

PPC Advertising and its Impressive Benefits

Blog banner

How Sleep Impacts Learning and Behaviour for Toddlers?

Blog banner

MORDERN UNIX SYSTEM

Blog banner

Microsoft Windows Overview

Blog banner

Odoo

Blog banner

Recipe of Paneer Butter Masala

Blog banner

What is E-commerce

Blog banner

Social Engineering Deceptions and Defenses

Blog banner

Linux VServer Architecture

Blog banner

Self-love: Being the reason of your own smile

Blog banner

Cache Memory

Blog banner

6 Digital Marketing Trends You Must Watch Out For In 2022

Blog banner

The application udemy

Blog banner

File Sharing

Blog banner

MPL and how its effects?

Blog banner

IT Service as as Value Creation

Blog banner

Memory Management

Blog banner

Principles of Service Operation

Blog banner

Cache Memory

Blog banner

Career v/s Job : Choose your passion

Blog banner

Assignment 2

Blog banner

DMZ: Your Secret Weapon for Data Security

Blog banner

Principles of Concurrency

Blog banner

Types of Threads

Blog banner

Sessions In OS.

Blog banner

Cycling

Blog banner

Fault Tolerance

Blog banner

Online Games

Blog banner

Importance of internet

Blog banner

Disk Scheduling

Blog banner

Logical and physical address

Blog banner

Love is in air.....

Blog banner

What's Better : Supervised or Unsupervised Learning

Blog banner

TAILS OS

Blog banner

COMFORT IS ALL ABOUT FASHION

Blog banner

Data Security must be your Priority!

Blog banner

MAILFENCE

Blog banner

VIRUS

Blog banner

A True Friendship

Blog banner

Virtual memory

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

Networking 101: How to Build Meaningful Connections in College

Blog banner