wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Computer security techniques

profile
Krishna Johari
Sep 09, 2024
0 Likes
0 Discussions
95 Reads
Computer Security Techniques 
1. Computer Security, also referred to as cybersecurity, is the practice of protecting computer systems, networks, and data from theft, damage, and unauthorized access. 
2. It involves implementing measures that prevent and respond to security threats, ensuring the confidentiality, integrity, and availability of information.
3. Several techniques are used to protect computer systems. 
4. Below are explanations of the key techniques like Authentication, Access Control, Intrusion Detection, Malware Defense, and Buffer Overflow Attack mitigation.
•Authentication :
(I) Authentication is the process of verifying a user's identity before granting access to sensitive data or systems. Common forms include password-based, multi-factor, biometric, and token-based. (II) These methods ensure only authorized individuals can access sensitive data and systems, reducing vulnerability to attacks.
•Access control : 
(I) Access Control is a system mechanism that restricts access to specific resources. It can be discretionary, mandatory, role-based, or access control lists. 
(II) Discretionary Access Control (DAC) determines access and permissions, Mandatory Access Control (MAC) assigns permissions based on security policies, and Role-Based Access Control (RBAC) assigns access based on roles within an organization.
•Intrusion Detection : 
(I) Intrusion Detection Systems (IDS) monitor network traffic to detect unauthorized access or activities. 
(II) They can be Signature-Based, Anomaly-Based, Host-Based, or Network-Based, focusing on incoming and outgoing traffic, log files, configuration changes, and process behavior.
•Malware Defense : 
(I) Malware, including viruses, worms, trojans, and ransomware, infiltrates systems without user knowledge.
(II) Defending against it involves antivirus software, firewalls, sandboxing, and regular updates/patches to prevent malware from affecting systems.
•Dealing with Buffer Overflow Attacks : 
(I) Buffer overflow attacks occur when a program writes more data than it can hold, potentially leading to malicious code execution. 
(II) Defenses include bounds checking, data execution prevention, address space layout randomization, and safe programming practices like using memory-management languages like Java or Python.

Comments ()


Sign in

Read Next

Mango Raisin Chutney (sweet mango raisin spread)

Blog banner

operating system

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Types of threads

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

Digital Forensics Challenges and Tools

Blog banner

virtual machine

Blog banner

Article on different management system

Blog banner

Importance of modern technology era

Blog banner

The evolution of OS

Blog banner

OS Assignment 3

Blog banner

A small world of Sockets

Blog banner

Multicore and Multithreading

Blog banner

Note on Process, Process creation and Process termination

Blog banner

1 Dentist in Maroubra, Sydney and her 10 obsessions

Blog banner

Royal enfield

Blog banner

Modern Operating system

Blog banner

Threads

Blog banner

Explain Kernel in OS

Blog banner

Operating system

Blog banner

Deadlock

Blog banner

Should you be using a mouthwash? Know from the experts

Blog banner

BIRYANI ! The history you never knew about

Blog banner

Uniprocessor Scheduling

Blog banner

Mariana Trench: The deepest depths

Blog banner

Virtual memory in windows

Blog banner

GIS info about Bermuda Triangle

Blog banner

Cache memory

Blog banner

Linker

Blog banner

I/O Buffering

Blog banner

26/11 The Black Day Of Mumbai

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

internet email and it's applications

Blog banner

Concept and definition of m-commerce

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

Kernel in Operating System

Blog banner

The Truth Behind Viral DIY Dental Hacks

Blog banner

Virtual Machine

Blog banner

Service Design Model

Blog banner

Memory Management

Blog banner

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner

SWEET SHREDDED MANGO CHUNDA (MANGO CHUNDA)

Blog banner