wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Computer security techniques

profile
Krishna Johari
Sep 09, 2024
0 Likes
0 Discussions
95 Reads
Computer Security Techniques 
1. Computer Security, also referred to as cybersecurity, is the practice of protecting computer systems, networks, and data from theft, damage, and unauthorized access. 
2. It involves implementing measures that prevent and respond to security threats, ensuring the confidentiality, integrity, and availability of information.
3. Several techniques are used to protect computer systems. 
4. Below are explanations of the key techniques like Authentication, Access Control, Intrusion Detection, Malware Defense, and Buffer Overflow Attack mitigation.
•Authentication :
(I) Authentication is the process of verifying a user's identity before granting access to sensitive data or systems. Common forms include password-based, multi-factor, biometric, and token-based. (II) These methods ensure only authorized individuals can access sensitive data and systems, reducing vulnerability to attacks.
•Access control : 
(I) Access Control is a system mechanism that restricts access to specific resources. It can be discretionary, mandatory, role-based, or access control lists. 
(II) Discretionary Access Control (DAC) determines access and permissions, Mandatory Access Control (MAC) assigns permissions based on security policies, and Role-Based Access Control (RBAC) assigns access based on roles within an organization.
•Intrusion Detection : 
(I) Intrusion Detection Systems (IDS) monitor network traffic to detect unauthorized access or activities. 
(II) They can be Signature-Based, Anomaly-Based, Host-Based, or Network-Based, focusing on incoming and outgoing traffic, log files, configuration changes, and process behavior.
•Malware Defense : 
(I) Malware, including viruses, worms, trojans, and ransomware, infiltrates systems without user knowledge.
(II) Defending against it involves antivirus software, firewalls, sandboxing, and regular updates/patches to prevent malware from affecting systems.
•Dealing with Buffer Overflow Attacks : 
(I) Buffer overflow attacks occur when a program writes more data than it can hold, potentially leading to malicious code execution. 
(II) Defenses include bounds checking, data execution prevention, address space layout randomization, and safe programming practices like using memory-management languages like Java or Python.

Comments ()


Sign in

Read Next

Security in Cloud Computing

Blog banner

Cyber Forensic in the Banking sector

Blog banner

Virtual memory

Blog banner

TECHNOLOGY : BOON OR CURSE ?

Blog banner

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

Blog banner

How To Setup DVWA Using XAMPP on Windows

Blog banner

Exploring Florida Beyond the Obvious Tourist Trails

Blog banner

12 Principles of Animation

Blog banner

Worms, viruses and Bots

Blog banner

Tomato Butter Sauce with Bucatini

Blog banner

LTE Technology

Blog banner

Heart Fulness Meditation

Blog banner

Supervised and Unsupervised Learning

Blog banner

Virtual memory

Blog banner

Fun Christmas Activities For Toddlers & Kids

Blog banner

LIMITED EDITION

Blog banner

Short-Form Video Marketing: Why It's Dominating the Internet

Blog banner

Why am I never satisfied with my Life?

Blog banner

Multicore and Multithreading

Blog banner

Cloud Security: Trends and Innovations

Blog banner

Animal’s have my heart

Blog banner

Ransomware

Blog banner

Simple Ways to Grow Your Brand Online

Blog banner

Fault Tolerance in an Operating System

Blog banner

Firewall in Computer Network

Blog banner

Senseless Teeths

Blog banner

Uniprocessor scheduling

Blog banner

Points to consider if you're planning to visit Florida in 2026

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

**THE MUJAWARR: Transforming the Logistics Industry**

Blog banner

The Power of Cyber Forensic in Solving Crimes

Blog banner

OS Assignment-3

Blog banner

Policies for Service Transition

Blog banner

Evolution of Operating system.

Blog banner

Water Resources are about to exhaust...

Blog banner

Cyber Forensics in a Ransomware Attack Recovery

Blog banner

Microsoft Windows Overview

Blog banner

Operation system

Blog banner

Satellite Based Positioning

Blog banner

Memory Management

Blog banner

A Short History of GIS

Blog banner

Blog name

Blog banner