wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Computer Security

profile
Yash Thumar
Sep 10, 2024
0 Likes
0 Discussions
39 Reads

Computer security refers to protecting and securing computers and their related data, networks, software, hardware from unauthorized access, misuse, theft, information loss, and other security issues. The Internet has made our lives easier and has provided us with lots of advantages but it has also put our system’s security at risk of being infected by a virus, of being hacked, information theft, damage to the system, and much more.

●Three key objectives that are at the heart of computer security:

1.Confidentiality: Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. A loss of confidentiality is the unauthorized disclosure of information. This term covers two related concepts:

●Data confidentiality: Assures that private or confidential information is not made available or disclosed to unauthorized individuals.

●Privacy: Assures that individuals controlor influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.

2.Integrity: Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity. A loss of integrity is the unauthorized modification or destruction of information.This term covers two related concepts:

●Data integrity: Assures that information (both stored and in transmitted packets) and programs are changed only in a specified and authorized manner.

●System integrity: Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.

3.Availability: Ensuring timely and reliable access to and use of information. A loss of availability is the disruption of access to or use of information or an information system .Assures that systems work promptly and service is not denied to authorized users.


Comments ()


Sign in

Read Next

Women Empowerment

Blog banner

Interrupts in operating system.

Blog banner

Windows Operating System

Blog banner

Why is ITSM important in IT organization?

Blog banner

Data Science in Predictive Analytics: Transforming Business Decision-Making

Blog banner

Artificial Intelligence and I

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

Facebook Shut Down an AI Program!!! Facebook AI bots became Terminators???

Blog banner

Different Types of Data

Blog banner

Some facts about Technology

Blog banner

Importance Of Education.

Blog banner

File management

Blog banner

Have You Explored India Yet?

Blog banner

Interrupts - Types, Working & Importance

Blog banner

How To Setup DVWA Using XAMPP on Windows

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

Memory Management of Operating System(OS)

Blog banner

Computer Forensics and its Impact in Business Environment

Blog banner

M commerce

Blog banner

Software

Blog banner

bulk email software

Blog banner

Web browser forensics:Tools,Evidence collection and analysis

Blog banner

OS Assignment 3 Deadlock

Blog banner

DNS Cache

Blog banner

INDIAN CHEAPEST COSMETICS BRAND

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

Why is online marketing is important in current scenario

Blog banner

Outlook.com

Blog banner

Threads

Blog banner

Delhi city

Blog banner

GEOLOGY AND GEO-TECTONIC FRAME WORK OF WESTERN BASTAR CRATON

Blog banner

Celebrate Diwali the Delicious Way with Meal Maharaj Catering

Blog banner

Footprinting

Blog banner

Introduction to GIS

Blog banner

Never give up

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

AOL Mail

Blog banner

Who decides your overthinking, anyway?

Blog banner

A Happier Workplace Starts with Healthy Lunches by Meal Maharaj

Blog banner

10 Types of Friends in every friend group

Blog banner

Fitness

Blog banner

Understanding the 'Ambiverts'

Blog banner