wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Security in Operating Systems

profile
Maxson Yee
Sep 09, 2024
0 Likes
0 Discussions
101 Reads

Core Principles of Computer Security


The core principles of computer security are the basic ideas that help keep computers and data safe. They are often remembered by the acronym CIA, which stands for Confidentiality, Integrity, and Availability.


1. Confidentiality

Confidentiality is about keeping information private. Only the right people should be able to see or use certain data. For example, your personal files should only be accessible to you, not anyone else. Passwords and encryption are ways to protect confidentiality.


2. Integrity

Integrity makes sure that the information is accurate and hasn't been changed without permission. It ensures that no one can mess with or alter the data. This is important because you want to trust that the information you're using is correct and reliable.


3. Availability

Availability means making sure that the system and data are ready to be used when needed. For example, when you try to access a website or file, it should be there and not blocked or unavailable due to an attack or failure.



Types of Computer Security


There are many types of computer security in an operating system. Here are some of them:


1. Cloud Security

Cloud security protects the data and services stored on the internet, like in Google Drive or Dropbox. Many people store their information in the cloud, so it’s important to keep it safe from unauthorized access or cyberattacks. Cloud security uses tools like encryption and two-factor authentication to secure your data.


2. Physical Security

Physical security means protecting the actual hardware, like your computer or servers, from theft, damage, or tampering. This could be something as simple as locking up your computer or using security cameras in a server room. If someone steals or damages your physical equipment, it can lead to major security problems.


3. Information Security

Information security is about keeping your data safe. It makes sure that only the right people can access, use, or change information. Passwords, encryption, and secure storage are used to protect sensitive data. This is important for things like personal information, bank details, or business documents.


4. Endpoint Security

Endpoint security protects devices like computers, phones, or tablets that connect to a network. These devices are called "endpoints", and securing them prevents hackers from using them as a way to get into a larger network. Installing antivirus software and keeping devices updated are examples of endpoint security.


5. Application Security

Application security focuses on protecting the software or apps that run on your computer. Sometimes, apps have flaws that hackers can use to break in. By fixing these flaws and keeping software up to date, application security ensures your apps work safely and don’t become a way for hackers to harm your system.


Comments ()


Sign in

Read Next

Why You Should Not Use Free VPNs

Blog banner

Threads in OS

Blog banner

What is a Malware ?

Blog banner

Evolution of Operating System

Blog banner

Drawing tips for a beginner

Blog banner

Game Theory in Blockchain

Blog banner

Power of words

Blog banner

Reclaim Your Bite and Beauty: All About Dental Restorative Treatments

Blog banner

SQL Injection

Blog banner

Segmentation and paging concept

Blog banner

Understanding the 'Ambiverts'

Blog banner

FRIENDSHIP

Blog banner

Clarizen

Blog banner

Uber

Blog banner

Service Catalogue Management

Blog banner

Data Exfiltration

Blog banner

Web Site

Blog banner

Social Media Sentiment Analysis

Blog banner

Dos (Denial of service) Attack

Blog banner

CYBERBULLYING: Negative comments!

Blog banner

Answer

Blog banner

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

Blog banner

LinkedIn: Watch out for these 7 upcoming updates in 2023

Blog banner

Save Environment

Blog banner

The Bold Digital Marketing Moves That Made Durex India’s Second-Largest Condom Brand

Blog banner

Linux 94

Blog banner

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner

Preparing Students for Higher Education: How International Schools Shape Future Success

Blog banner

DIGITAL ECONOMY

Blog banner

Veg/Non-veg/Egg Tiffin Meals That Are Nutritious and Filling

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

Digital marketing spotlight “Dove’s Real Beauty Campaign”

Blog banner

The Difference Between Plaque and Tartar Explained Simply

Blog banner

LIFEHACKER

Blog banner

What is Network Security?

Blog banner

Deadlock

Blog banner

Service Operations Principles

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

Disk scheduling

Blog banner

FILE SHARING

Blog banner

Heart Fulness Meditation

Blog banner

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner