wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Computer Security

profile
Darshan Tank
Sep 13, 2024
0 Likes
0 Discussions
137 Reads

computer security, the protection of computer systems and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same means used to protect other valuable or sensitive equipment—namely, serial numbers, doors and locks, and alarms. The protection of information and system access, on the other hand, is achieved through other tactics, some of them quite complex.


The security precautions related to computer information and access address four major threats: (1) theft of data, such as that of military secrets from government computers; (2) vandalism, including the destruction of data by a computer virus; (3) fraud, such as employees at a bank channeling funds into their own accounts; and (4) invasion of privacy, such as the illegal accessing of protected personal financial or medical data from a large database. The most basic means of protecting a computer system against theft, vandalism, invasion of privacy, and other irresponsible behaviours is to electronically track and record the access to, and activities of, the various users of a computer system. This is commonly done by assigning an individual password to each person who has access to a system. The computer system itself can then automatically track the use of these passwords, recording such data as which files were accessed under particular passwords and so on. Another security measure is to store a system’s data on a separate device or medium that is normally inaccessible through the computer system. Finally, data is often encrypted so that it can be deciphered only by holders of a singular encryption key. (See data encryption.)


Technology

Engineering

Civil Engineering

computer security

Also known as: cyber security, cybersecurity

Written and fact-checked by 

Last Updated: Aug 13, 2024 • Article History

Top Questions

What is computer security?

Does artificial intelligence (AI) compromise computer secutiry?

computer security, the protection of computer systems and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same means used to protect other valuable or sensitive equipment—namely, serial numbers, doors and locks, and alarms. The protection of information and system access, on the other hand, is achieved through other tactics, some of them quite complex.




Also called: cybersecurity

Related Topics: computer security and protection system password VPN

The security precautions related to computer information and access address four major threats: (1) theft of data, such as that of military secrets from government computers; (2) vandalism, including the destruction of data by a computer virus; (3) fraud, such as employees at a bank channeling funds into their own accounts; and (4) invasion of privacy, such as the illegal accessing of protected personal financial or medical data from a large database. The most basic means of protecting a computer system against theft, vandalism, invasion of privacy, and other irresponsible behaviours is to electronically track and record the access to, and activities of, the various users of a computer system. This is commonly done by assigning an individual password to each person who has access to a system. The computer system itself can then automatically track the use of these passwords, recording such data as which files were accessed under particular passwords and so on. Another security measure is to store a system’s data on a separate device or medium that is normally inaccessible through the computer system. Finally, data is often encrypted so that it can be deciphered only by holders of a singular encryption key. (See data encryption.)




Computer security has become increasingly important since the late 1960s, when modems (devices that allow computers to communicate over telephone lines) were introduced. The proliferation of personal computers in the 1980s compounded the problem because they enabled hackers (irresponsible computerphiles) to illegally access major computer systems from the privacy of their homes. With the tremendous growth of the Internet in the late 20th and early 21st centuries, computer security became a widespread concern. The development of advanced security techniques aims to diminish such threats, though concurrent refinements in the methods of computer crime pose ongoing hazards.


Comments ()


Sign in

Read Next

Fashion design

Blog banner

SECURITY TOOLS

Blog banner

Vulnerabilities in OnePlus Devices

Blog banner

Health and fitness in technology

Blog banner

I/O Buffering

Blog banner

Ethical Hacking

Blog banner

Way to make your meal healthier.

Blog banner

“Shot on iPhone” : A campaign by Apple that turned into a prodigy

Blog banner

Ethical Issues in Data Science and Role of Data Science in Smart Cities

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

Smart Shoephone: Is that technology overdose!?

Blog banner

Hosting basics

Blog banner

Mariana Trench: The deepest depths

Blog banner

21ST CENTURY PATRIARCHY

Blog banner

Virtual Memory

Blog banner

geographic information system (GIS)

Blog banner

Microsoft Word

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

Scheduling

Blog banner

Interesting fact about kangaroo.

Blog banner

Visualization in Data Science

Blog banner

Direct Memory Access

Blog banner

Modern operating system

Blog banner

OS Assignment-3

Blog banner

Zomato (Income Sources)

Blog banner

Anomaly Detection in Behavioral Data Using Machine Learning

Blog banner

CYBERBULLYING: Negative comments!

Blog banner

SWEET SHREDDED MANGO CHUNDA (MANGO CHUNDA)

Blog banner

WHAT IS SNAPCHAT AND HOW DOES IT WORK?

Blog banner

How to use open SSL for web server - browser communication

Blog banner

The IT Service Lifecycle

Blog banner

Heart Fulness Meditation

Blog banner

MEMORY MANAGEMENT (techniques)

Blog banner

AI and Data Science: Revolutionizing Industries

Blog banner

Understanding Univariate, Bivariate, and Multivariate Analysis in Data Science

Blog banner

RACI model in IT services

Blog banner

Modern Operating System

Blog banner

Preparing Students for Higher Education: How International Schools Shape Future Success

Blog banner

A Brief Review on Cyber Forensics and its Analysis Tool

Blog banner

RAID

Blog banner