wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

computer security

profile
Khushi Sanghavi
Sep 09, 2024
0 Likes
0 Discussions
95 Reads

computer security refers to protecting and securing computers and their related data, networks, software, hardware from unauthorized access, misuse, theft, information loss, and other security issues. The Internet has made our lives easier and has provided us with lots of advantages but it has also put our system’s security at risk of being infected by a virus, of being hacked, information theft, damage to the system, and much more

Three key objectives that are at the heart of computer security:

1.Confidentiality: Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. A loss of confidentiality is the unauthorized disclosure of information.

2.Integrity: Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity. A loss of integrity is the unauthorized modification or destruction of information

3.Availability: Ensuring timely and reliable access to and use of information. A loss of availability is the disruption of access to or use of information or an information system .Assures that systems work promptly and service is not denied to authorized users.

Types of computer security

Computer security can be classified into four types:

1. Cyber Security: Cyber security means securing our computers, electronic devices, networks , programs, systems from cyber attacks. Cyber attacks are those attacks that happen when our system is connected to the Internet.

2. Information Security: Information security means protecting our system’s information from theft, illegal use and piracy from unauthorized use. Information security has mainly three objectives: confidentiality, integrity, and availability of information.

3. Application Security: Application security means securing our applications and data so that they don’t get hacked and also the databases of the applications remain safe and private to the owner itself so that user’s data remains confidential.

4. Network Security: Network security means securing a network and protecting the user’s information about who is connected through that network. Over the network hackers steal, the packets of data through sniffing and spoofing attacks, man in the middle attack, war driving, etc, and misuse the data for their benefits.

~khushi sanghavi (53003230009).


Comments ()


Sign in

Read Next

Operating system evolution

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

Modern operating system

Blog banner

Multiprocessor and Multicore Organization

Blog banner

THE LEGAL ISSUES OF COMPUTER FORENSICS IN INDIA

Blog banner

operating system

Blog banner

bulk email software

Blog banner

Mumbai Metro 3

Blog banner

Operating system

Blog banner

Modern Operating system

Blog banner

Points to consider if you're planning to visit Florida in 2026

Blog banner

ITIL Version 3 and 4 differenciation?

Blog banner

Social Engineering Deceptions and Defenses

Blog banner

Top 4 Places To Stay In Copenhagen

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Kafka - A Framework

Blog banner

Reconnaissance

Blog banner

operating system

Blog banner

Virtual Memory

Blog banner

OS Evolution Achievements

Blog banner

Cache Memory

Blog banner

Linux Memory Management

Blog banner

History of Money

Blog banner

Cache memory

Blog banner

Outlook.com

Blog banner

Evolution of the Microprocesor

Blog banner

Fitness

Blog banner

Linker

Blog banner

How Cyber Forensics help prevent Crimes

Blog banner

Buffer overflow

Blog banner

Microsoft Word

Blog banner

PPC Advertising and its Impressive Benefits

Blog banner

Service design process in ITSM

Blog banner

38_Exploring The Honeynet Project

Blog banner

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner

MORDERN UNIX SYSTEM

Blog banner

Tomato Butter Sauce with Bucatini

Blog banner

FRIENDSHIP

Blog banner

Lucidchart

Blog banner

AI and Cyber Security

Blog banner

My favourite food

Blog banner

Threats To Computer System

Blog banner