wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

computer security

profile
Khushi Sanghavi
Sep 09, 2024
0 Likes
0 Discussions
95 Reads

computer security refers to protecting and securing computers and their related data, networks, software, hardware from unauthorized access, misuse, theft, information loss, and other security issues. The Internet has made our lives easier and has provided us with lots of advantages but it has also put our system’s security at risk of being infected by a virus, of being hacked, information theft, damage to the system, and much more

Three key objectives that are at the heart of computer security:

1.Confidentiality: Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. A loss of confidentiality is the unauthorized disclosure of information.

2.Integrity: Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity. A loss of integrity is the unauthorized modification or destruction of information

3.Availability: Ensuring timely and reliable access to and use of information. A loss of availability is the disruption of access to or use of information or an information system .Assures that systems work promptly and service is not denied to authorized users.

Types of computer security

Computer security can be classified into four types:

1. Cyber Security: Cyber security means securing our computers, electronic devices, networks , programs, systems from cyber attacks. Cyber attacks are those attacks that happen when our system is connected to the Internet.

2. Information Security: Information security means protecting our system’s information from theft, illegal use and piracy from unauthorized use. Information security has mainly three objectives: confidentiality, integrity, and availability of information.

3. Application Security: Application security means securing our applications and data so that they don’t get hacked and also the databases of the applications remain safe and private to the owner itself so that user’s data remains confidential.

4. Network Security: Network security means securing a network and protecting the user’s information about who is connected through that network. Over the network hackers steal, the packets of data through sniffing and spoofing attacks, man in the middle attack, war driving, etc, and misuse the data for their benefits.

~khushi sanghavi (53003230009).


Comments ()


Sign in

Read Next

Juveniles, Internet and Computer Crime

Blog banner

Virtual Memory

Blog banner

The “High” of ‘likes’, ‘follows’, and ‘views’ – and how I decided to respond to them myself.

Blog banner

Information of meesho company

Blog banner

Sagar Parikrama

Blog banner

Virtual Memory

Blog banner

Importance Of Yoga.

Blog banner

How Social Media Algorithms Will Work in 2026?

Blog banner

AI & Data Science in Healthcare – Predicting diseases, medical imaging analysis

Blog banner

AOL Mail

Blog banner

Google classroom

Blog banner

Data Science in Mental Health Prediction

Blog banner

Major achievement

Blog banner

Kafka - A Framework

Blog banner

Memory Management

Blog banner

M commerce

Blog banner

Time Series Analysis

Blog banner

Functions Of Operating Systems

Blog banner

PERSONALITY DEVELOPMENT

Blog banner

What is OS and its overview

Blog banner

Asana

Blog banner

Water Resources are about to exhaust...

Blog banner

Busted : Common Web Security Myths

Blog banner

Is Pursuing a Dance Career in India Worth it?

Blog banner

Bulk E-mail software

Blog banner

FAMILY WHERE LIFE BEGINS....

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

Drawing tips for a beginner

Blog banner

Challenges and risks in service operations

Blog banner

Dudhasagar waterfall ?

Blog banner

Cyber Forensics in Healthcare: Protecting Patient Data and Preventing Breaches

Blog banner

Social engineering in cyber security

Blog banner

AutoML: The Future of Automated Data Science

Blog banner

IP ADDRESS

Blog banner

Man is free by the birth .

Blog banner

World’s rarest passport owned by 500 people.

Blog banner

Technical SEO : Total Guide

Blog banner

Network Footprinting in Cybersecurity

Blog banner

Logical and physical address

Blog banner

ASANA- A Management System.

Blog banner

Boxing

Blog banner

What are Virtual Machines

Blog banner