wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Computer security techniques

profile
Krishna Johari
Sep 09, 2024
0 Likes
0 Discussions
95 Reads
Computer Security Techniques 
1. Computer Security, also referred to as cybersecurity, is the practice of protecting computer systems, networks, and data from theft, damage, and unauthorized access. 
2. It involves implementing measures that prevent and respond to security threats, ensuring the confidentiality, integrity, and availability of information.
3. Several techniques are used to protect computer systems. 
4. Below are explanations of the key techniques like Authentication, Access Control, Intrusion Detection, Malware Defense, and Buffer Overflow Attack mitigation.
•Authentication :
(I) Authentication is the process of verifying a user's identity before granting access to sensitive data or systems. Common forms include password-based, multi-factor, biometric, and token-based. (II) These methods ensure only authorized individuals can access sensitive data and systems, reducing vulnerability to attacks.
•Access control : 
(I) Access Control is a system mechanism that restricts access to specific resources. It can be discretionary, mandatory, role-based, or access control lists. 
(II) Discretionary Access Control (DAC) determines access and permissions, Mandatory Access Control (MAC) assigns permissions based on security policies, and Role-Based Access Control (RBAC) assigns access based on roles within an organization.
•Intrusion Detection : 
(I) Intrusion Detection Systems (IDS) monitor network traffic to detect unauthorized access or activities. 
(II) They can be Signature-Based, Anomaly-Based, Host-Based, or Network-Based, focusing on incoming and outgoing traffic, log files, configuration changes, and process behavior.
•Malware Defense : 
(I) Malware, including viruses, worms, trojans, and ransomware, infiltrates systems without user knowledge.
(II) Defending against it involves antivirus software, firewalls, sandboxing, and regular updates/patches to prevent malware from affecting systems.
•Dealing with Buffer Overflow Attacks : 
(I) Buffer overflow attacks occur when a program writes more data than it can hold, potentially leading to malicious code execution. 
(II) Defenses include bounds checking, data execution prevention, address space layout randomization, and safe programming practices like using memory-management languages like Java or Python.

Comments ()


Sign in

Read Next

A Statistical Analysis of Player Performance and their Value in cricket

Blog banner

Threads and concurrency

Blog banner

How to make Pancakes

Blog banner

Cache Memory in Operating Systems

Blog banner

Threading

Blog banner

Virtual memory

Blog banner

Goa Trip With Friends

Blog banner

Memory management

Blog banner

Apple

Blog banner

Mobile Security

Blog banner

Deadlock Prevention

Blog banner

Apache Spark :- Powerful Data Processing Tool

Blog banner

Lifestyle of a photographer

Blog banner

Cyber Security Standards

Blog banner

INSTAGRAM

Blog banner

Challenges and risks in service operations

Blog banner

NETWORK SECURITY RISKS

Blog banner

Education: Key to your Prosperity

Blog banner

LinkedIn

Blog banner

Beautiful and stunning natural phenomena worth to see

Blog banner

DNS Cache

Blog banner

How to kiss

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

Memory heirachy (Operating system)

Blog banner

POVERTY:Causes and solutions to problems

Blog banner

12 Principles of Animation

Blog banner

Assignment-3

Blog banner

Twisted world

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

VIRTUAL MEMORY

Blog banner

Fitness

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

Gis in agriculture and farming

Blog banner

The War With Cold On Earth

Blog banner

VIRTUAL MACHINES

Blog banner

Mobile Survey

Blog banner

Importance of Network Security Risk

Blog banner

The khan mehtab transforming the modular switches company

Blog banner

Khau Galli – Vile Parle

Blog banner

Random Forests

Blog banner

Cloud Security: Trends and Innovations

Blog banner

How To Secure Operating Systems ?

Blog banner