wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Computer Security

profile
Darshan Tank
Sep 13, 2024
0 Likes
0 Discussions
137 Reads

computer security, the protection of computer systems and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same means used to protect other valuable or sensitive equipment—namely, serial numbers, doors and locks, and alarms. The protection of information and system access, on the other hand, is achieved through other tactics, some of them quite complex.


The security precautions related to computer information and access address four major threats: (1) theft of data, such as that of military secrets from government computers; (2) vandalism, including the destruction of data by a computer virus; (3) fraud, such as employees at a bank channeling funds into their own accounts; and (4) invasion of privacy, such as the illegal accessing of protected personal financial or medical data from a large database. The most basic means of protecting a computer system against theft, vandalism, invasion of privacy, and other irresponsible behaviours is to electronically track and record the access to, and activities of, the various users of a computer system. This is commonly done by assigning an individual password to each person who has access to a system. The computer system itself can then automatically track the use of these passwords, recording such data as which files were accessed under particular passwords and so on. Another security measure is to store a system’s data on a separate device or medium that is normally inaccessible through the computer system. Finally, data is often encrypted so that it can be deciphered only by holders of a singular encryption key. (See data encryption.)


Technology

Engineering

Civil Engineering

computer security

Also known as: cyber security, cybersecurity

Written and fact-checked by 

Last Updated: Aug 13, 2024 • Article History

Top Questions

What is computer security?

Does artificial intelligence (AI) compromise computer secutiry?

computer security, the protection of computer systems and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same means used to protect other valuable or sensitive equipment—namely, serial numbers, doors and locks, and alarms. The protection of information and system access, on the other hand, is achieved through other tactics, some of them quite complex.




Also called: cybersecurity

Related Topics: computer security and protection system password VPN

The security precautions related to computer information and access address four major threats: (1) theft of data, such as that of military secrets from government computers; (2) vandalism, including the destruction of data by a computer virus; (3) fraud, such as employees at a bank channeling funds into their own accounts; and (4) invasion of privacy, such as the illegal accessing of protected personal financial or medical data from a large database. The most basic means of protecting a computer system against theft, vandalism, invasion of privacy, and other irresponsible behaviours is to electronically track and record the access to, and activities of, the various users of a computer system. This is commonly done by assigning an individual password to each person who has access to a system. The computer system itself can then automatically track the use of these passwords, recording such data as which files were accessed under particular passwords and so on. Another security measure is to store a system’s data on a separate device or medium that is normally inaccessible through the computer system. Finally, data is often encrypted so that it can be deciphered only by holders of a singular encryption key. (See data encryption.)




Computer security has become increasingly important since the late 1960s, when modems (devices that allow computers to communicate over telephone lines) were introduced. The proliferation of personal computers in the 1980s compounded the problem because they enabled hackers (irresponsible computerphiles) to illegally access major computer systems from the privacy of their homes. With the tremendous growth of the Internet in the late 20th and early 21st centuries, computer security became a widespread concern. The development of advanced security techniques aims to diminish such threats, though concurrent refinements in the methods of computer crime pose ongoing hazards.


Comments ()


Sign in

Read Next

CSI and Organizational Change

Blog banner

Modern operating system

Blog banner

SNAPCHAT

Blog banner

Shoulders

Blog banner

10 Interesting Facts about Death Note

Blog banner

What is process

Blog banner

From Websites To Super Apps For Digital User Experience

Blog banner

Khau Galli – Vile Parle

Blog banner

Deadlocks in Operating System

Blog banner

Go Daddy

Blog banner

Different memory allocation strategies

Blog banner

differentiate thinking humanly and rationally

Blog banner

Why Kanye West (Now Ye) is the GOAT: A Legacy Beyond Music

Blog banner

GIS Bharat Maps

Blog banner

Instagram Features in 2023 That Will Leave You Stunned!

Blog banner

Have You Explored India Yet?

Blog banner

Cherish the Craft — Essential Tips to Maintain Your Patola Collection

Blog banner

Digital marketing spotlight “Dove’s Real Beauty Campaign”

Blog banner

Scala - a programming tool

Blog banner

Gis in agriculture and farming

Blog banner

Evolution of Operating Sytems

Blog banner

Social Media.

Blog banner

Deadlock and Starvation

Blog banner

The Future of Patola Weaving in a Sustainable Fashion World

Blog banner

Operating system

Blog banner

WINDOWS I/ O

Blog banner

DBMS and various career options related to it.

Blog banner

Twisted world

Blog banner

Education: Key to your Prosperity

Blog banner

Linux Virtual Machine Process Scheduling

Blog banner

Landslide Hazard

Blog banner

TEAMWORK

Blog banner

Data Lake

Blog banner

Smartsheet

Blog banner

Nature’s Brush on Silk: The Secret Behind Patola Colours

Blog banner

You Get Everyone, But No One Gets You: The Lonely Side of High Emotional Intelligence

Blog banner

PPC Advertising and its Impressive Benefits

Blog banner

The Real Reason Patola Outfits Come at a Premium Cost

Blog banner

Not anti-social, but pro-solitude

Blog banner

Modern Operating System - Suren Kotian

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

Getting to Kashmir: Alternative to the Jammu-Srinagar highway

Blog banner