It is refers to techniques for ensuring that data stored in a computer cannot be read or modify by any individuals without authorization. Most of the computer security measures involve data 

Author: Thinesh Vasee


Computer Security

 

What is Computer Security

It is refers to techniques for ensuring that data stored in a computer cannot be read or modify by any individuals without authorization. Most of the computer security measures involve data encryption and passwords.

The purpose of the computer security is prevent the weakness of the system.

 

There are 3 goals in computer security

Confidentiality

It ensures that computer- related assets are accessed only by authorized parties. Confidentiality is sometimes called secrecy or privacy.

Integrity

It means that assets can be modified only by authorized parties or only in authorized ways.

Availability

It means that assets are accessible to authorized party at appropriate times.

 

The main challenge in building a secure system is finding the right balance among the goals , which often conflict.

Vulnerability

Vulnerability is weakness in the security system. weakness can appear in any element of a computer , both in the hardware , operating system, and software. The types of vulnerabilities we might find as they apply to the assets of hardware, software, and data. These three assets and the connections among them are all potential security weak points.

Hardware Vulnerability

It is more visible than software , because it is composed of physical objects. It is rather simple to attack by adding devices, changing them, removing them, intercepting the traffic to them, or flooding them with traffic until they can no longer function.

                     

Software Vulnerability

Software can be replaced , changed, or destroyed maliciously, or it can be modified, deleted, or misplaced accidentally. whether intentional or not , these attacks exploit the software's vulnerability.

Sometimes the attacks are obvious , as when the software no longer runs. more subtle are attacks in which the software has been altered but seems to run normally.

Data Vulnerability

Data attack is more wide spread and serious problem than either a hardware or software attack. data items have greater public value than hardware and software because more people know how to use or interpret data.

 

 

 

Secure the computer

First choose a good secured operating system

 

Choose a web browser based on it's security and vulnerabilities because most malware will come through via your web browser

 

when setting up use strong passwords in your user account, router account etc. Hackers may use dictionary attacks and brute force attacks.

 

When downloading software (including anti virus software) , get it from a trusted source.

 

Install good Anti Virus software because anti virus software is designed to deal with modern malware including viruses, trojans, key loggers, rootkits and worms.

 

Sources and Citations

 

Security in Computing, Fourth EditionBy Charles P. Pfleeger

http://lifehacker.com/5848296/how-do-i-keep-my-computer-secure-at-the-office

http://it.ojp.gov/documents/asp/disciplines/section1-2.htm

http://www.pcpro.co.uk/blogs/2011/01/21/how-to-physically-secure-your-business-hardware/

http://www.us-cert.gov/nav/nt01/

http://blog.chromium.org/2008/10/new-approach-to-browser-security-google.html

http://www.avast.com

http://www.trendsecure.com

http://www.lavasoft.com

http://www.zonealarm.com

http://www.personalfirewall.comodo.com/

http://www.remote-exploit.org/backtrack.html

http://www.grc.com/securitynow.htm

http://www.hackerhighschool.org/

 

http://www.symantec.com/norton/products/library/article.jsp?aid=internet_iq

THANK YOU  

HAVE A SECURED WORLD




Views: 815
Register for more exciting articles

Comments

Please login or register to post a comment.


There are currently no comments.