wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Computer Security

profile
Yash Thumar
Sep 10, 2024
0 Likes
0 Discussions
39 Reads

Computer security refers to protecting and securing computers and their related data, networks, software, hardware from unauthorized access, misuse, theft, information loss, and other security issues. The Internet has made our lives easier and has provided us with lots of advantages but it has also put our system’s security at risk of being infected by a virus, of being hacked, information theft, damage to the system, and much more.

●Three key objectives that are at the heart of computer security:

1.Confidentiality: Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. A loss of confidentiality is the unauthorized disclosure of information. This term covers two related concepts:

●Data confidentiality: Assures that private or confidential information is not made available or disclosed to unauthorized individuals.

●Privacy: Assures that individuals controlor influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.

2.Integrity: Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity. A loss of integrity is the unauthorized modification or destruction of information.This term covers two related concepts:

●Data integrity: Assures that information (both stored and in transmitted packets) and programs are changed only in a specified and authorized manner.

●System integrity: Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.

3.Availability: Ensuring timely and reliable access to and use of information. A loss of availability is the disruption of access to or use of information or an information system .Assures that systems work promptly and service is not denied to authorized users.


Comments ()


Sign in

Read Next

All you need to know about “On-page SEO”

Blog banner

From Model Mistakes to Metrics

Blog banner

Jira Software

Blog banner

Outlook.com

Blog banner

Guidelines for a low sodium diet.

Blog banner

Number Guessing game --lisp

Blog banner

E-learning in today's world

Blog banner

Electronic Funds Transfer

Blog banner

Types of Threads

Blog banner

Memory Management in Operating System

Blog banner

Trello ( management software)

Blog banner

Process and Threading

Blog banner

ART AND CULTURE OF VRINDAVAN

Blog banner

EVOLUTION OF THE MIRCOPROCESSOR

Blog banner

De-Coding Love

Blog banner

Proton mail

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

Memory Management

Blog banner

Hello World

Blog banner

Sage

Blog banner

Critical success factors

Blog banner

My First Dream Bike

Blog banner

What is Network Security?

Blog banner

Process, process creation and process termination

Blog banner

Deadlock and starvation

Blog banner

Life of a 2020-2021 student

Blog banner

What is Email? Uses of Emails

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

Working with Sniffers for monitoring network communication

Blog banner

A Brief Review on Cyber Forensics and its Analysis Tool

Blog banner

Malware Detection Techniques for Mobile Devices

Blog banner

I/O buffer and its techniques

Blog banner

Zoho

Blog banner

Blockchain

Blog banner

Open Source Project By Google

Blog banner

Whatsapp Messenger

Blog banner

Inventory management software system

Blog banner

What is 'Multi-core and Multi-threading' ?

Blog banner

Design Considerations for Disk Cache Management

Blog banner

bulk email software

Blog banner

Annual Day Preparation for Toddlers: What Helps and What to Avoid

Blog banner

Intrusion Detection System

Blog banner