Tuesday, December 24, 2019

What Is Computer Security - 936 Words

WHAT IS COMPUTER SECURITY? The process of preventing and detecting the use of data in the computer by any individuals without authorization is referred to as Computer Security. It is also known as cybersecurity or IT security. It involves the process of protecting computer resources from intruders for their own gains. Anti-virus, firewalls, data encryption, password protection are the main measures that encompass the computer security. It is mainly concerned with four main areas: 1. Confidentiality: It refers to as only authorized users can access the data in the computer. 2. Integrity: It refers to only authorized users should be able to modify the data. 3. Availability: It refers to the data should be available to users when needed. 4. Authentication: It refers to the process by which a system verifies the identity of a user who wishes to access it. WHY IS COMPUTER SECURITY SO IMPORTANT? Since many of our day to day works depends on the computer, we use them for everything like banking, shopping, chatting, emailing, etc. Although you may not want to maintain your communications top secret, you probably do not want strangers accessing and using your computer. Data present in the computer can be misused by unauthorized intrusions. An intruder can send a forged email, can change the program source code, examine personal information, and attack other computers by using your computer. Malicious intents can also be a factor in computer security. Intruders use your computerShow MoreRelatedThe Basic Internet And Its Security1420 Words   |  6 Pages4th hour April 8, 2015 The Basic Internet and Its Security What is the basic internet and how do you make it safe? Most people in the world have a computer but do not know what makes a computer a computer. Most people do not even know what device would qualify as a computer. The computer is an important part of the twenty-first century. The responsibility of computer users goes beyond internet access. The computer has basic internet and security that is needed to be followed. The internet guaranteesRead MoreThe International Telecommunication Union ( Itu ) Defines Cyber Security1551 Words   |  7 Pagesincreasingly more advanced so does the ability to steal information from these systems. Cyber Security is one of the biggest threats our nation faces as we become more dependent on the use of technology in our day to day lives. What is Cyber Security? The International Telecommunication Union (ITU) defines Cyber Security as â€Å"Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assuranceRead MoreThe International Telecommunication Union ( Itu ) Defines Cyber Security1547 Words   |  7 Pagesincreasingly more advanced so does the ability to steal information from these systems. Cyber Security is one of the biggest threats our nation faces as we become more dependent on the use of technology in our day to day lives. What is Cyber Security? The International Telecommunication Union (ITU) defines Cyber Security as â€Å"Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assuranceRead MoreComputer Security Essay1039 Words   |  5 PagesComputer Security Would you be interested in a career where you could make fifty thousand dollars a year right out of college? Would you like to have an extremely secure job? Would you like to create a company as successful as Microsoft or Facebook? If so, a career in computer security may be the field for you. As a high school student, you might be wondering what it would be like to work in the field of networking or database security, as well as compare them to similar fields. Today I willRead MoreWhat Is Information Security?1022 Words   |  4 PagesWhat is Information Security? The definition of Information Security can be put in simple and understandable words; it is a system or a process that people may use in order to ensure the safety of their information or many other properties. Specialized measures, for example, passwords, biometrics, and firewalls alone are not sufficient in relieving dangers to data. A mixture of measures is obliged to secure frameworks and ensure data against mischief. Confidentiality, integrity and availability areRead MorePrinciples of Security 5th Edition Chapter 1 Review Questions814 Words   |  4 PagesReview Questions 1. What is the difference between a threat agent and a threat? A threat agent is a specific component that represents a danger to an organization’s assets. And a threat is an object, person or entity that represents a constant danger. 2. What is the difference between vulnerability and exposure? Vulnerability is a weakness is a system that leaves the system open to attacks. Exposure is the known vulnerabilities that make a system weak and open to attacks without protectionRead MoreA Project On Capstone Project1039 Words   |  5 Pagespower of technology and computers and all of the applications came from? Well there are a lot of computer applications like local security applications, protocols, well I am going to explain some security applications to you. There are many kinds of different security applications. I am going to explain two of different applications Linux and security policy settings. Now what are security policies? Security policy settings in Microsoft could be used as part of all of our security implementation to makeRead MoreComputer security is very essential to proyect against the threats caused to computing system which800 Words   |  4 PagesComputer security is very essential to proyect against the threats caused to computing system which happen because of its vulnerability. Threat to computing security takes place by a person, event or circumstance may be intentionally for sake of finance or unintentionally by deleting some of the important data. A threat agent depends on method, opportunity and motivation. Method is a knowledge to attack , oppurtinity to access the necessary information and motive behind the aatack. In olden daysRead MoreA Research Project On Cyber Security1230 Words   |  5 Pages Cyber Security Introduction: - for my research project, I would like to explore about the cyber security measures. Cybersecurity covers the fundamental concepts underlying the construction of secure systems from the hardware to the software to the human computer interface, with the use of cryptography to secure interactions. These concepts are easily augmented with hands-on exercises involving relevant tools and techniques. We have different types of computer related crimes, cybercrimesRead MoreSecurity Of Computer And Internet Crimes1628 Words   |  7 PagesL. Keaton Paper #1 Security to Stop Computer and Internet Crimes Introduction The computer and the Internet are important tools used by many people all around the world. Usually the computer and internet are used for information. In today’s society it is being used for unlawful activities. It is being used to distribute child pornography, money laundering, credit card fraud; identify theft, and all other types of crimes. Hackers are people who use their computer skills to harm society

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.