wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

computer security

profile
Khushi Sanghavi
Sep 09, 2024
0 Likes
0 Discussions
95 Reads

computer security refers to protecting and securing computers and their related data, networks, software, hardware from unauthorized access, misuse, theft, information loss, and other security issues. The Internet has made our lives easier and has provided us with lots of advantages but it has also put our system’s security at risk of being infected by a virus, of being hacked, information theft, damage to the system, and much more

Three key objectives that are at the heart of computer security:

1.Confidentiality: Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. A loss of confidentiality is the unauthorized disclosure of information.

2.Integrity: Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity. A loss of integrity is the unauthorized modification or destruction of information

3.Availability: Ensuring timely and reliable access to and use of information. A loss of availability is the disruption of access to or use of information or an information system .Assures that systems work promptly and service is not denied to authorized users.

Types of computer security

Computer security can be classified into four types:

1. Cyber Security: Cyber security means securing our computers, electronic devices, networks , programs, systems from cyber attacks. Cyber attacks are those attacks that happen when our system is connected to the Internet.

2. Information Security: Information security means protecting our system’s information from theft, illegal use and piracy from unauthorized use. Information security has mainly three objectives: confidentiality, integrity, and availability of information.

3. Application Security: Application security means securing our applications and data so that they don’t get hacked and also the databases of the applications remain safe and private to the owner itself so that user’s data remains confidential.

4. Network Security: Network security means securing a network and protecting the user’s information about who is connected through that network. Over the network hackers steal, the packets of data through sniffing and spoofing attacks, man in the middle attack, war driving, etc, and misuse the data for their benefits.

~khushi sanghavi (53003230009).


Comments ()


Sign in

Read Next

Rain bow

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

The New Dr. Frankenstein who will perform first full head transplant

Blog banner

HR Automation : Need of the hour

Blog banner

Routers

Blog banner

Travel Geek ‘The last $50k in Switzerland’

Blog banner

MENDELEY

Blog banner

Mobile Survey

Blog banner

I/O Management and Disk Scheduling

Blog banner

Bulk E-mail software

Blog banner

Pooja Silver

Blog banner

ADD A SPICE TO YOUR LIFE.

Blog banner

Mumbai famous street food

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

Threads

Blog banner

"Mahakali cave"

Blog banner

PERSONALITY DEVELOPMENT

Blog banner

Operating System

Blog banner

Basic Security For SOAP Services

Blog banner

Corporate Discipline.

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

security controls

Blog banner

A BLOG ON MYSQL

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

MySQL

Blog banner

INTRODUCTION TO C#

Blog banner

Building a Better You: Fitness Tips and Inspiration.

Blog banner

Bit Coins

Blog banner

A Brief Review on Cyber Forensics and its Analysis Tool

Blog banner

Explain Multiprocessors

Blog banner

Deadlock in operating system

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

Access management

Blog banner

Which Smartphone Company Has the Largest Market Share in India?

Blog banner

10 Amazing facts about Tokyo Ghoul

Blog banner

The Golden Temple , Amritsar

Blog banner

Gis in agriculture and farming

Blog banner

Digital Forensics Challenges and Tools

Blog banner

Deadlock and Starvation

Blog banner