wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Os(Computer security threats)

profile
1195 Sumit Thakur 11th J C.R
Jul 04, 2024
1 Like
0 Discussions
36 Reads

Computer security concept :

∆ Computer security is also known as Cybersecurity, involves protecting computer system and network from theft, damage, and unauthorised access .

∆ The goal is to ensure the confidentiality, integrity, and availability of data and systems.

Here are the key components:

Confidentiality: Prevents unauthorized access to sensitive information. Techniques like encryption and access controls are used to ensure that only authorized users can view certain data.

Integrity: Ensures that data and systems are not interface with in an unauthorized manner. Methods such as checksums and digital signatures help verify that information remains unchanged.

Availability: Ensures that systems and data are accessible to authorized users when needed. This involves protecting against disruptions such as hardware failures, cyber attacks, or natural disasters

Additional aspects include:

Authentication: Verifying the identity of users and devices.

Authorization: Granting permissions to users based on their identity and roles.

Auditing: Keeping logs of system activities to detect and respond to security incidents.

Non-repudiation: Ensuring that actions or transactions cannot be denied by the parties involved, often achieved through digital signatures.

Overall, computer security involves a combination of technologies, policies, and practices designed to protect digital assets from various threats.

*** THREATS, ATTACKS, AND ASSETS

Let's cover some examples of this topic :-

 Unauthorized Disclosure

Consequence: Sensitive data is accessed by someone who shouldn't have it.(Apna important data koi aur access karleta hai jiske paas nhi jana chahiye uske paas bhi chala jaata hai )

Threat Actions:

1. Exposure: 

   - Example: A healthcare provider accidentally publishes patient records online without proper security, making them accessible to anyone.

 2. Interception: 

   - Example: A hacker uses a network sniffer to capture data packets traveling over a public Wi-Fi network, gaining access to sensitive information such as login credentials.

3. Inference: 

   - Example: By analyzing patterns of communication between executives, an attacker deduces the timing of a merger announcement, even though the content of the communications was encrypted.

4. Intrusion: 

   - Example: An attacker exploits a vulnerability in a web application to bypass security controls and access a database containing customer personal information.

Usurpation

Consequence: Control of system services or functions is taken over by an unauthorized entity.(Ismei kisi unauthorised person ke paas control chala jata hai system service or functions ka )

Threat Actions:

1. Misappropriation: 

   - Example: An attacker gains control of a company's server and uses it to mine cryptocurrency, consuming resources and potentially exposing sensitive data.

2. Misuse: 

   - Example: A disgruntled employee installs software on a company server to send spam emails, using the organization's resources for malicious purposes and damaging its reputation.

 


Comments ()


Sign in

Read Next

Multicore and multithreading 171

Blog banner

Virtual memory in windows

Blog banner

Memory management

Blog banner

Scala - a programming tool

Blog banner

File Sharing

Blog banner

Introduction to Solidity Programming for Blockchain Development

Blog banner

Veg/Non-veg/Egg Tiffin Meals That Are Nutritious and Filling

Blog banner

Why Meal Maharaj Prioritises Seasonal Vegetables in Every Meal Box

Blog banner

Multiple processor scheduling

Blog banner

HOW CAN SOCIAL MEDIA MAKE YOU HAPPIER?

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

How College Events Build Real-world Skills You Can’t Learn From Textbooks

Blog banner

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner

Objectives and functions of Operating System...

Blog banner

OS assignment 3

Blog banner

When Is the Right Time to Enrol My Toddler Into Preschool? NEP

Blog banner

What are NFT s?

Blog banner

INTRODUCTION TO C#

Blog banner

Concurrency and memory

Blog banner

Privacy in Social Media and Online Services

Blog banner

What is Email? Uses of Emails

Blog banner

Evolution of Operating system

Blog banner

Direct memory access

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

5 Common Faults In Construction Tenders

Blog banner

Population

Blog banner

How to invest in Indian Stock Market ? ~ Tutorial 1

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

Explain DBMS in Brief

Blog banner

Every body is beautiful

Blog banner

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner

How Sleep Impacts Learning and Behaviour for Toddlers?

Blog banner

The Psychology of Diversity, Equity & Inclusion: How Inclusive Workplaces Boost Productivity

Blog banner

bulk email software

Blog banner

OS Assignment 3

Blog banner

Flipkart

Blog banner

Memory Management

Blog banner

IT service level agreement

Blog banner

Deadlock

Blog banner

Cyber Laws In India and Around the World

Blog banner

GraphQL

Blog banner