wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Computer Security

profile
Yash Thumar
Sep 10, 2024
0 Likes
0 Discussions
39 Reads

Computer security refers to protecting and securing computers and their related data, networks, software, hardware from unauthorized access, misuse, theft, information loss, and other security issues. The Internet has made our lives easier and has provided us with lots of advantages but it has also put our system’s security at risk of being infected by a virus, of being hacked, information theft, damage to the system, and much more.

●Three key objectives that are at the heart of computer security:

1.Confidentiality: Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. A loss of confidentiality is the unauthorized disclosure of information. This term covers two related concepts:

●Data confidentiality: Assures that private or confidential information is not made available or disclosed to unauthorized individuals.

●Privacy: Assures that individuals controlor influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.

2.Integrity: Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity. A loss of integrity is the unauthorized modification or destruction of information.This term covers two related concepts:

●Data integrity: Assures that information (both stored and in transmitted packets) and programs are changed only in a specified and authorized manner.

●System integrity: Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.

3.Availability: Ensuring timely and reliable access to and use of information. A loss of availability is the disruption of access to or use of information or an information system .Assures that systems work promptly and service is not denied to authorized users.


Comments ()


Sign in

Read Next

semaphores

Blog banner

TEAMWORK

Blog banner

Top 5 Benefits of Artificial Intelligence

Blog banner

Subnet Masking

Blog banner

Threads

Blog banner

IT security management

Blog banner

Which Smartphone Company Has the Largest Market Share in India?

Blog banner

Virtual Memory

Blog banner

How To Invest In Indian Stock Market @ BSE & NSE ~ Tutorial 3

Blog banner

Facebook marketing

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

Install Ubuntu in Vmware

Blog banner

POVERTY:Causes and solutions to problems

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner

Veg Mix Pickle

Blog banner

Online Games

Blog banner

Teamwork

Blog banner

Soak knowledge and level up your intellectual potential!!!

Blog banner

Introduction to Virtual Memory - 080

Blog banner

How to write a cover letter

Blog banner

Service Strategy principles

Blog banner

This too shall pass

Blog banner

MEMORY HIERARCHY

Blog banner

Data Warehousing

Blog banner

The Impact of Cyber Forensics on Corporate Governance and Compliance

Blog banner

RSA (Rivest-Shamir-Adelman) Algorithm

Blog banner

Explain website hacking issues

Blog banner

Online Education

Blog banner

Service Design Model

Blog banner

c

Blog banner

OLA

Blog banner

CYBER FORENCIS: PAST, PRESENT AND FUTURE.

Blog banner

STARVATION

Blog banner

Street foods

Blog banner

Importance of self defence for girls

Blog banner

Precision-Recall in Data Science

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

A MODERN OPERATING SYSTEM

Blog banner

Why am I never satisfied with my Life?

Blog banner

How to Prepare Your Child for Their First Day of School?

Blog banner

PHONE TECHNOLOGY

Blog banner

Broken Authentication Attacks

Blog banner