wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Computer Security

profile
Yash Thumar
Sep 10, 2024
0 Likes
0 Discussions
39 Reads

Computer security refers to protecting and securing computers and their related data, networks, software, hardware from unauthorized access, misuse, theft, information loss, and other security issues. The Internet has made our lives easier and has provided us with lots of advantages but it has also put our system’s security at risk of being infected by a virus, of being hacked, information theft, damage to the system, and much more.

●Three key objectives that are at the heart of computer security:

1.Confidentiality: Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. A loss of confidentiality is the unauthorized disclosure of information. This term covers two related concepts:

●Data confidentiality: Assures that private or confidential information is not made available or disclosed to unauthorized individuals.

●Privacy: Assures that individuals controlor influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.

2.Integrity: Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity. A loss of integrity is the unauthorized modification or destruction of information.This term covers two related concepts:

●Data integrity: Assures that information (both stored and in transmitted packets) and programs are changed only in a specified and authorized manner.

●System integrity: Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.

3.Availability: Ensuring timely and reliable access to and use of information. A loss of availability is the disruption of access to or use of information or an information system .Assures that systems work promptly and service is not denied to authorized users.


Comments ()


Sign in

Read Next

What is Anxiety? How to manage Anxiety?

Blog banner

Music

Blog banner

What are Virtual Machines

Blog banner

(Input/Output) in os

Blog banner

BEAUTY IS IN THE EYE OF THE BEHOLDER

Blog banner

What is Spyware?

Blog banner

Spyware

Blog banner

10 Unknown facts about India's Independence

Blog banner

Teenagers of Today

Blog banner

Types of Big Data

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

Balance

Blog banner

Indian Culture and Tradition

Blog banner

Uniprocessor and Types

Blog banner

Boxing

Blog banner

Mesh Topology

Blog banner

Security Issues

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

India Digital Personal Data Protection Act, 2023

Blog banner

5 Powerful Mindset Shifts To Make 2026 Your Breakthrough Year

Blog banner

Fault Tolerance

Blog banner

About myself

Blog banner

Vulnerability Assessment

Blog banner

Guidelines for a Low sodium Diet.

Blog banner

PPT methodology

Blog banner

GOOGLE

Blog banner

Safeguarding Your Data: The Importance of Wireless Encryption

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner

Virtual memory in Operating System

Blog banner

Ola

Blog banner

Deadlock in Operating System

Blog banner

Discover The Top 3 Places To Stay in London

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Challenges and risks in service operations

Blog banner

Note on Process, Process creation and Process termination

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

How User Data Shapes Personalised Campaigns

Blog banner

Virtual Machine

Blog banner

Regression Analysis

Blog banner

Why Skipping Afternoon Meals Affects More Than Just Your Hunger?

Blog banner

Information Technology In E- Commerce

Blog banner

Types of threads

Blog banner