wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Computer security techniques

profile
Krishna Johari
Sep 09, 2024
0 Likes
0 Discussions
95 Reads
Computer Security Techniques 
1. Computer Security, also referred to as cybersecurity, is the practice of protecting computer systems, networks, and data from theft, damage, and unauthorized access. 
2. It involves implementing measures that prevent and respond to security threats, ensuring the confidentiality, integrity, and availability of information.
3. Several techniques are used to protect computer systems. 
4. Below are explanations of the key techniques like Authentication, Access Control, Intrusion Detection, Malware Defense, and Buffer Overflow Attack mitigation.
•Authentication :
(I) Authentication is the process of verifying a user's identity before granting access to sensitive data or systems. Common forms include password-based, multi-factor, biometric, and token-based. (II) These methods ensure only authorized individuals can access sensitive data and systems, reducing vulnerability to attacks.
•Access control : 
(I) Access Control is a system mechanism that restricts access to specific resources. It can be discretionary, mandatory, role-based, or access control lists. 
(II) Discretionary Access Control (DAC) determines access and permissions, Mandatory Access Control (MAC) assigns permissions based on security policies, and Role-Based Access Control (RBAC) assigns access based on roles within an organization.
•Intrusion Detection : 
(I) Intrusion Detection Systems (IDS) monitor network traffic to detect unauthorized access or activities. 
(II) They can be Signature-Based, Anomaly-Based, Host-Based, or Network-Based, focusing on incoming and outgoing traffic, log files, configuration changes, and process behavior.
•Malware Defense : 
(I) Malware, including viruses, worms, trojans, and ransomware, infiltrates systems without user knowledge.
(II) Defending against it involves antivirus software, firewalls, sandboxing, and regular updates/patches to prevent malware from affecting systems.
•Dealing with Buffer Overflow Attacks : 
(I) Buffer overflow attacks occur when a program writes more data than it can hold, potentially leading to malicious code execution. 
(II) Defenses include bounds checking, data execution prevention, address space layout randomization, and safe programming practices like using memory-management languages like Java or Python.

Comments ()


Sign in

Read Next

Worms, viruses and Bots

Blog banner

Cloud Computing: Threats and Vulnerabilities

Blog banner

MY FIRST BLOG?

Blog banner

"The Benefits of Using GIS in Agriculture"

Blog banner

Getting into Anime

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

Unlocking Success: Mastering Google Ads Strategies

Blog banner

Concept and definition of m-commerce

Blog banner

From Websites To Super Apps For Digital User Experience

Blog banner

Compromising Mobile Platforms

Blog banner

E-mail security

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner

What is thread and multithreading ?

Blog banner

INTERRUPTS

Blog banner

The Rise of Polo Tourism in the USA: How Travellers Are Blending Luxury Stays with Elite Sports

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Embaded operating system

Blog banner

ADIDAS

Blog banner

Affiliate Marketing V/S Influencer Marketing

Blog banner

How to Find the Right Therapist For Me?

Blog banner

Mendeley (management software)

Blog banner

GIS Bharat Maps

Blog banner

Instagram

Blog banner

ARTICAL ON MANAGEMENT SYSTEM

Blog banner

Can a Water Flosser Replace Manual Flossing? Here’s What Dentists Say

Blog banner

Inventory management software system

Blog banner

Principles of Concurrency

Blog banner

The Evolution of Operating Systems

Blog banner

ADD A SPICE TO YOUR LIFE.

Blog banner

Constrained Management in IT

Blog banner

Why Oak Tree Hotel Is Arcadia’s Hidden Gem?

Blog banner

In the world of Technology...

Blog banner

Partnership in Learning: How Parent Involvement Shapes a Child’s Early Education

Blog banner

Cyber Security Standards

Blog banner

Soak knowledge and level up your intellectual potential!!!

Blog banner

Stephen Hawking : A Remarkable Physicist

Blog banner

What's Better : Supervised or Unsupervised Learning

Blog banner

Platonic Solids

Blog banner

geographic information system (GIS)

Blog banner

Uniprocessor scheduling

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

SmartData Collective: Data Science aur Analytics ki Duniya

Blog banner