wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

computer security

profile
Khushi Sanghavi
Sep 09, 2024
0 Likes
0 Discussions
95 Reads

computer security refers to protecting and securing computers and their related data, networks, software, hardware from unauthorized access, misuse, theft, information loss, and other security issues. The Internet has made our lives easier and has provided us with lots of advantages but it has also put our system’s security at risk of being infected by a virus, of being hacked, information theft, damage to the system, and much more

Three key objectives that are at the heart of computer security:

1.Confidentiality: Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. A loss of confidentiality is the unauthorized disclosure of information.

2.Integrity: Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity. A loss of integrity is the unauthorized modification or destruction of information

3.Availability: Ensuring timely and reliable access to and use of information. A loss of availability is the disruption of access to or use of information or an information system .Assures that systems work promptly and service is not denied to authorized users.

Types of computer security

Computer security can be classified into four types:

1. Cyber Security: Cyber security means securing our computers, electronic devices, networks , programs, systems from cyber attacks. Cyber attacks are those attacks that happen when our system is connected to the Internet.

2. Information Security: Information security means protecting our system’s information from theft, illegal use and piracy from unauthorized use. Information security has mainly three objectives: confidentiality, integrity, and availability of information.

3. Application Security: Application security means securing our applications and data so that they don’t get hacked and also the databases of the applications remain safe and private to the owner itself so that user’s data remains confidential.

4. Network Security: Network security means securing a network and protecting the user’s information about who is connected through that network. Over the network hackers steal, the packets of data through sniffing and spoofing attacks, man in the middle attack, war driving, etc, and misuse the data for their benefits.

~khushi sanghavi (53003230009).


Comments ()


Sign in

Read Next

Dangers of Using Public WiFis

Blog banner

Android Flashlight Application

Blog banner

Best Time to Visit Arcadia, Florida & Why Oak Tree Hotel Is Always Ready

Blog banner

"Games and the future"

Blog banner

Virtual Machine

Blog banner

Understanding Gen Z: A Generation Facing Crisis and Potential

Blog banner

10 Things To Do On Valentine's Day If You're Single

Blog banner

Data Science in Predictive Analytics: Transforming Business Decision-Making

Blog banner

Top 10 Logos and their meanings

Blog banner

A Tourist’s Guide To Florida’s Rodeo Culture: What To Expect At The Arcadia Championship Rodeo

Blog banner

Respondo Launches Revolutionary Video Discussion App

Blog banner

Balance

Blog banner

note taker app

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

Types of email

Blog banner

WHAT IS SNAPCHAT AND HOW DOES IT WORK?

Blog banner

Fault Tolerance

Blog banner

What is a Dumpster Diving Attack?

Blog banner

MENDELEY

Blog banner

How I use google in my daily life

Blog banner

Cherish the Craft — Essential Tips to Maintain Your Patola Collection

Blog banner

Odoo

Blog banner

Memory management

Blog banner

Memory heirchy

Blog banner

File management in os

Blog banner

Service stratergy principles

Blog banner

You'll get to know about Pankaj Negi

Blog banner

MoSCoW METHOD IN DATA SCIENCE

Blog banner

Wedding photographer

Blog banner

Bots and Cyber Security

Blog banner

Education?

Blog banner

Os(Computer security threats)

Blog banner

E-Governance

Blog banner

Best password managers: Reviews of the top products

Blog banner

Expert System In AI

Blog banner

Evolution of the Microprocessor ~ Aditya Pai

Blog banner

Student Grade Calculator in LISP

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

Tableau

Blog banner

How covid-19 impacted Social media ad spend forecast globally

Blog banner

Linux

Blog banner

Malware Detection Techniques for Mobile Devices

Blog banner