wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Computer security techniques

profile
Krishna Johari
Sep 09, 2024
0 Likes
0 Discussions
95 Reads
Computer Security Techniques 
1. Computer Security, also referred to as cybersecurity, is the practice of protecting computer systems, networks, and data from theft, damage, and unauthorized access. 
2. It involves implementing measures that prevent and respond to security threats, ensuring the confidentiality, integrity, and availability of information.
3. Several techniques are used to protect computer systems. 
4. Below are explanations of the key techniques like Authentication, Access Control, Intrusion Detection, Malware Defense, and Buffer Overflow Attack mitigation.
•Authentication :
(I) Authentication is the process of verifying a user's identity before granting access to sensitive data or systems. Common forms include password-based, multi-factor, biometric, and token-based. (II) These methods ensure only authorized individuals can access sensitive data and systems, reducing vulnerability to attacks.
•Access control : 
(I) Access Control is a system mechanism that restricts access to specific resources. It can be discretionary, mandatory, role-based, or access control lists. 
(II) Discretionary Access Control (DAC) determines access and permissions, Mandatory Access Control (MAC) assigns permissions based on security policies, and Role-Based Access Control (RBAC) assigns access based on roles within an organization.
•Intrusion Detection : 
(I) Intrusion Detection Systems (IDS) monitor network traffic to detect unauthorized access or activities. 
(II) They can be Signature-Based, Anomaly-Based, Host-Based, or Network-Based, focusing on incoming and outgoing traffic, log files, configuration changes, and process behavior.
•Malware Defense : 
(I) Malware, including viruses, worms, trojans, and ransomware, infiltrates systems without user knowledge.
(II) Defending against it involves antivirus software, firewalls, sandboxing, and regular updates/patches to prevent malware from affecting systems.
•Dealing with Buffer Overflow Attacks : 
(I) Buffer overflow attacks occur when a program writes more data than it can hold, potentially leading to malicious code execution. 
(II) Defenses include bounds checking, data execution prevention, address space layout randomization, and safe programming practices like using memory-management languages like Java or Python.

Comments ()


Sign in

Read Next

Why is ITSM important in IT organization?

Blog banner

Exploring the Power of Encase Forensic Tools: Unraveling Digital Mysteries

Blog banner

Esri India launches Policy Maps.

Blog banner

Zero-Click Searches: How To Stay Visible In Google’s New Era

Blog banner

Getting into Anime

Blog banner

Craziness of dream 11 and how it impacts on our life

Blog banner

Top 5 Places To Stay And Visit In Berlin, Germany

Blog banner

Deadlock and Starvation

Blog banner

GIS in Mapping and landslide alert in Bangladesh

Blog banner

E-Governance

Blog banner

Linux VServer Architecture

Blog banner

Microsoft powerpoint presentation

Blog banner

Stay Close To Adventure In Arcadia, Florida At Oak Tree Hotel

Blog banner

Loneliness

Blog banner

Vulnerabilities in OnePlus Devices

Blog banner

The Evolution of Operating Systems

Blog banner

?Why Social and Emotional Skills Matter More Than ABCs in Early Years?

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

Busted : Common Web Security Myths

Blog banner

Mental Health

Blog banner

Daycare Centres Help Children Transition into Structured Learning

Blog banner

Hot Mango Pickle (Methiyu)

Blog banner

LinkedIn

Blog banner

Constrains in service design

Blog banner

MY MOST THRILLED TREK ..... BHAIRAVGAD

Blog banner

Types of Threads

Blog banner

Ethical Issues in Data Science and Role of Data Science in Smart Cities

Blog banner

NIKE

Blog banner

Vulnerability Assessment (Vulnerability Analysis)

Blog banner

Starvation

Blog banner

Emotional Suppression: The Hidden Costs Of Unfelt Feelings

Blog banner

Dekkers Algorithm

Blog banner

Student Grade Calculator in LISP

Blog banner

The Real Reason Patola Outfits Come at a Premium Cost

Blog banner

What your Favorite colour says about You?

Blog banner

Dangers of Using Public WiFis

Blog banner

ARTICAL ON MANAGEMENT SYSTEM

Blog banner

Pandas Matrix Applications

Blog banner

Memory Management

Blog banner

5 ways to save money on catering services in Mumbai

Blog banner

The art of being alone

Blog banner

Why we should do reading

Blog banner