wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

computer security

profile
Khushi Sanghavi
Sep 09, 2024
0 Likes
0 Discussions
95 Reads

computer security refers to protecting and securing computers and their related data, networks, software, hardware from unauthorized access, misuse, theft, information loss, and other security issues. The Internet has made our lives easier and has provided us with lots of advantages but it has also put our system’s security at risk of being infected by a virus, of being hacked, information theft, damage to the system, and much more

Three key objectives that are at the heart of computer security:

1.Confidentiality: Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. A loss of confidentiality is the unauthorized disclosure of information.

2.Integrity: Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity. A loss of integrity is the unauthorized modification or destruction of information

3.Availability: Ensuring timely and reliable access to and use of information. A loss of availability is the disruption of access to or use of information or an information system .Assures that systems work promptly and service is not denied to authorized users.

Types of computer security

Computer security can be classified into four types:

1. Cyber Security: Cyber security means securing our computers, electronic devices, networks , programs, systems from cyber attacks. Cyber attacks are those attacks that happen when our system is connected to the Internet.

2. Information Security: Information security means protecting our system’s information from theft, illegal use and piracy from unauthorized use. Information security has mainly three objectives: confidentiality, integrity, and availability of information.

3. Application Security: Application security means securing our applications and data so that they don’t get hacked and also the databases of the applications remain safe and private to the owner itself so that user’s data remains confidential.

4. Network Security: Network security means securing a network and protecting the user’s information about who is connected through that network. Over the network hackers steal, the packets of data through sniffing and spoofing attacks, man in the middle attack, war driving, etc, and misuse the data for their benefits.

~khushi sanghavi (53003230009).


Comments ()


Sign in

Read Next

Virtual Machine

Blog banner

Whatsapp Messenger

Blog banner

Have You Explored India Yet?

Blog banner

Memory Partitioning

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

Memory management

Blog banner

Deadlock

Blog banner

Why Should You Schedule Tweets on Twitter?

Blog banner

IO Buffers

Blog banner

URL vs Domain

Blog banner

Street foods

Blog banner

Cyber Crime Investigation In The Era Of Big Data

Blog banner

Threading

Blog banner

memory management

Blog banner

Severe landslides continue to cause concern in Joshimath, Uttarakhand

Blog banner

Buffering

Blog banner

Memory management

Blog banner

Concurrency and memory

Blog banner

Getting started with Android Studio

Blog banner

SWEET SHREDDED MANGO CHUNDA (MANGO CHUNDA)

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

Artical on FreshBooks

Blog banner

Satellite Based Positioning

Blog banner

SQL Injection Techniques

Blog banner

AI & Data Science in Healthcare – Predicting diseases, medical imaging analysis

Blog banner

Principles of Concurrency

Blog banner

Famous Indian dishes that where misunderstood to be Indian

Blog banner

Swiggi

Blog banner

Measuring IT Risk

Blog banner

Network Forensics

Blog banner

Service Operation

Blog banner

Types of Malware in Cyber Security

Blog banner

Capacity management in ITSM

Blog banner

Service Design Principles

Blog banner

VPN

Blog banner

Game Theory in Blockchain

Blog banner

ART AND CULTURE OF VRINDAVAN

Blog banner

CYBER FORENCIS: PAST, PRESENT AND FUTURE.

Blog banner

Some web vulnerabilities

Blog banner

Concurrency management in operating systems

Blog banner

Subnet Masking

Blog banner