It is refers to techniques for ensuring that data stored in a computer cannot be read or modify by any individuals without authorization. Most of the computer security measures involve data
Author: Thinesh Vasee
It is refers to techniques for ensuring that data stored in a computer cannot be read or modify by any individuals without authorization. Most of the computer security measures involve data Author: Thinesh Vasee
Author: Thinesh Vasee
What is Computer Security
It is refers to techniques for ensuring that data stored in a computer cannot be read or modify by any individuals without authorization. Most of the computer security measures involve data encryption and passwords.
The purpose of the computer security is prevent the weakness of the system.
There are 3 goals in computer security
It ensures that computer- related assets are accessed only by authorized parties. Confidentiality is sometimes called secrecy or privacy.
It means that assets can be modified only by authorized parties or only in authorized ways.
It means that assets are accessible to authorized party at appropriate times.
The main challenge in building a secure system is finding the right balance among the goals , which often conflict.
Vulnerability is weakness in the security system. weakness can appear in any element of a computer , both in the hardware , operating system, and software. The types of vulnerabilities we might find as they apply to the assets of hardware, software, and data. These three assets and the connections among them are all potential security weak points.
It is more visible than software , because it is composed of physical objects. It is rather simple to attack by adding devices, changing them, removing them, intercepting the traffic to them, or flooding them with traffic until they can no longer function.
Software can be replaced , changed, or destroyed maliciously, or it can be modified, deleted, or misplaced accidentally. whether intentional or not , these attacks exploit the software's vulnerability.
Sometimes the attacks are obvious , as when the software no longer runs. more subtle are attacks in which the software has been altered but seems to run normally.
Data attack is more wide spread and serious problem than either a hardware or software attack. data items have greater public value than hardware and software because more people know how to use or interpret data.
First choose a good secured operating system
Choose a web browser based on it's security and vulnerabilities because most malware will come through via your web browser
when setting up use strong passwords in your user account, router account etc. Hackers may use dictionary attacks and brute force attacks.
When downloading software (including anti virus software) , get it from a trusted source.
Install good Anti Virus software because anti virus software is designed to deal with modern malware including viruses, trojans, key loggers, rootkits and worms.
HAVE A SECURED WORLD
Spring Security OAuth2 Multi Tenant Aware Token Store. Read More
RSocket Authentication/Authorization using Spring Security 5.2.0.RC1. Read More
Java 13 Pattern Matching Feature Explained. Read More