wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Computer security techniques

profile
Krishna Johari
Sep 09, 2024
0 Likes
0 Discussions
95 Reads
Computer Security Techniques 
1. Computer Security, also referred to as cybersecurity, is the practice of protecting computer systems, networks, and data from theft, damage, and unauthorized access. 
2. It involves implementing measures that prevent and respond to security threats, ensuring the confidentiality, integrity, and availability of information.
3. Several techniques are used to protect computer systems. 
4. Below are explanations of the key techniques like Authentication, Access Control, Intrusion Detection, Malware Defense, and Buffer Overflow Attack mitigation.
•Authentication :
(I) Authentication is the process of verifying a user's identity before granting access to sensitive data or systems. Common forms include password-based, multi-factor, biometric, and token-based. (II) These methods ensure only authorized individuals can access sensitive data and systems, reducing vulnerability to attacks.
•Access control : 
(I) Access Control is a system mechanism that restricts access to specific resources. It can be discretionary, mandatory, role-based, or access control lists. 
(II) Discretionary Access Control (DAC) determines access and permissions, Mandatory Access Control (MAC) assigns permissions based on security policies, and Role-Based Access Control (RBAC) assigns access based on roles within an organization.
•Intrusion Detection : 
(I) Intrusion Detection Systems (IDS) monitor network traffic to detect unauthorized access or activities. 
(II) They can be Signature-Based, Anomaly-Based, Host-Based, or Network-Based, focusing on incoming and outgoing traffic, log files, configuration changes, and process behavior.
•Malware Defense : 
(I) Malware, including viruses, worms, trojans, and ransomware, infiltrates systems without user knowledge.
(II) Defending against it involves antivirus software, firewalls, sandboxing, and regular updates/patches to prevent malware from affecting systems.
•Dealing with Buffer Overflow Attacks : 
(I) Buffer overflow attacks occur when a program writes more data than it can hold, potentially leading to malicious code execution. 
(II) Defenses include bounds checking, data execution prevention, address space layout randomization, and safe programming practices like using memory-management languages like Java or Python.

Comments ()


Sign in

Read Next

ADIDAS

Blog banner

Assignment 2

Blog banner

Cache Memory

Blog banner

Hash password! Is it really secured?

Blog banner

Interrupts in OS

Blog banner

Cache memory

Blog banner

Cyber Security in Data Breaching

Blog banner

Steganography

Blog banner

Virtual Memory

Blog banner

I/O Management and Disk Scheduling

Blog banner

Smartsheet

Blog banner

What is time ? The term which has astonished Scientists

Blog banner

Dangers of Using Public WiFis

Blog banner

Modern operating system

Blog banner

Blockchain

Blog banner

Deadlock and Starvation

Blog banner

A MODERN OPERATING SYSTEM

Blog banner

Why Soft Skills Matter as Much as Grades?

Blog banner

Why You Should Not Use Free VPNs

Blog banner

'C', 'C++' and 'Java': Head-to-Head

Blog banner

Google classroom

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

Starvation

Blog banner

Threads

Blog banner

Digital Balance: Keeping Children Mindful in the Screen Age

Blog banner

PERSONAL STORIES

Blog banner

Health and fitness in technology

Blog banner

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner

Does School Infrastructure Really Matter For Learning?

Blog banner

A BLOG ON MYSQL

Blog banner

Regression Analysis

Blog banner

Data Security must be your Priority!

Blog banner

Modern Teaching Methods: Why Inquiry-based & Experiential Learning Works Best

Blog banner

File management In Operating System

Blog banner

Microsoft Windows Overview

Blog banner

"Life as a Part-time Student"

Blog banner

38_Exploring The Honeynet Project

Blog banner

Indian Food

Blog banner

GUIDE TO GIS

Blog banner

Answer

Blog banner

MailChimp

Blog banner

Deadlocks in operating system

Blog banner