0% found this document useful (0 votes)
80 views

What Is Computer Security

Computer security refers to the safeguarding of our computer systems and data from theft, unauthorized use or any harm for that matter.

Uploaded by

iamvishal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
80 views

What Is Computer Security

Computer security refers to the safeguarding of our computer systems and data from theft, unauthorized use or any harm for that matter.

Uploaded by

iamvishal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Hurry! Try our new Interactive Courses for FREE.

🥳 🚀
Learn
Tests Forum Curious Learn Web Dev Login

Written By:
computersecurity anitivirus phishing
Amundra
5 minute read

What is Computer
Security
Posted in General  

SEPTEMBER 14, 2021

With the advancements in technology, our world is becoming more of a


digitalized space. The use of the Internet is increasing exponentially,
simultaneously making us more vulnerable to cyber-attacks.

Thus, learning about the nature of these cyber-attacks and how to defend
ourselves from them becomes very crucial to reduce the risk of data
breaches and the troubles that they bring along with them.

Computer security refers to the safeguarding of our computer systems


and data from theft, unauthorized use or any harm for that matter. Most
users lack the adequate defenses that keep out intruders, and this is the
opportunity that most cybercriminals set their eyes on. Computer security
protects your computer against these attacks and keeps intact your
system and your data.

Before we dive deeper into computer security, let’s first see a few
reasons why users get attacked.

Why Do Users Get Attacked?


If the various motives behind the attacks are understood, it becomes a
little easier for cybersecurity professionals to secure the systems. These
are some of the major motives why computers are attacked:

1. Disrupting a business’ continuity: Sometimes the motive could just


be to disrupt the continuity of a business, which in turn causes damage
in reputation and losses to the business.

2. Information theft and manipulating data: The confidential


information that is stolen from the organization is then sold to
individuals or groups paying a good amount.

3. Achieving a state’s military objectives: Two or more nations going


against each other keep an eye for the data each one has, thus
employing cybercriminal tactics to steal the military secrets.

4. Propagating religious or political beliefs: Even the promotion of


some religious dogma or a certain political agenda becomes the
motivation for attacking computer systems, mostly to sway voters to
vote a certain way.

Types of Attacks
A dedicated hacker has many kinds of attacks up under his sleeve. Here
we have mentioned three of the most frequent ones:

1. Denial of service (DDoS):

Denial of Service

Using this attack the user’s access to the system resources is restricted by
flooding the server with useless traffic. A resource gets hopelessly jammed
up by the bots as they are commanded to access the resource at the same
time by the botmaster. Now, if someone else genuinely wants to get
access to that resource they cannot, as the resource is all blocked.

2. Malware attack:

Malware attack

It is a program that is created to disrupt and damage the computer. Mainly,


there are four types of malware:

Keylogger: Whatever you type on the targeted keyboard is recorded


on the keylogger. It is used by most hackers to get hold of secret data,
be it the passwords or the other account details.

Virus: A virus replicates as it copies itself to another program or a


document and alters how the computer works. Most viruses are spread
by someone without the knowledge of the system administrator.

Worms: A worm is a standalone program that infects the system


independently. A popular example of a worm is W32 Alcra-F. It
propagates through the network shared devices.

Trojan horse: It is a malicious code that takes over your computer and
damages or steals information from it.

3. Phishing:

phishing

A bait is sent to the victim which is generally in the form of an email by the
attacker. They lure the victim into sharing their details, be it their bank
account, their password, or some other details.

You must always remember banks do not send emails like these.

What to Secure?
There are three principles that initiate the security of an organization:
Confidentiality, Integrity, and Availability. Since the advent of its
mainframes, the CIA has served as the industry standard for computer
security.

CIA triad

Confidentiality: The information and functions can only be accessed by


authorized parties, according to the principles of confidentiality. Ex.
military secrets.

Integrity: Information and functions can be altered, or removed only by


the authorized people, according to the principles of integrity.

Availability: Systems, functions, and data must be available right on-


demand with the agreed-upon parameters based on the levels of
service, according to the principles of availability.

How Do You Secure Your Computer?

How to secure your computer

1. Two-way authentication
Adding an extra layer of security to the process of authentication makes it
harder for attackers to gain access to a person’s devices or online
accounts, this is called Two-way authentication. For instance, before you
make payments online, you have to first enter your CVV then you get the
OTP, and then the transaction happens.

2. Secure passwords
You need to create passwords that are very tough to guess or hack. You
could include in your passwords:

At least 15 characters.

Capital letters.

Special characters. Example: @#$%.

Numbers.

3. Antivirus
A computer program that detects, prevents, and terminates malware is
called an Antivirus. Some of the more famous antiviruses are Quickheal,
K7, Norton, etc.

4. Anti-Phishing Tactics
If you ever get a suspicious email that has no relation to you, just do the
following:

Make sure that you do not click on the email.

Do not share any of your personal files.

Don’t even open the attachments of the mail.

5. Encryption
Encryption is the process of converting simple text into complex
unintelligible forms so that it cannot be understood without decryption.
Encryption is used in:

Banking transactions.

Computer passwords.

E-commerce transactions.

It is very unfortunate that cybercrime is increasing rapidly, if you are not


careful, your data could just be gone by the click of a button. In the past,
as we have been very careful about our possessions, using physical locks
and other utilities to safeguard them, it’s time we do something similar
with our digital possessions.


IF YOU LIKE IT, THEN SHARE IT

RELATED POSTS
No related posts to show

studytonight.com   Learn Coding (for Coding Courses Interview Tests


beginners) Learn HTML Java Interview Tests



Learn CSS Python Interview Tests
 Tutorial Library Learn JavaScript DBMS Interview Tests
About Us
Linux Interview Tests
Testimonials  Interview Tests Resources
Aptitude Tests
Authors C Language
GATE 2022 Tests
 Curious C++/STL
More...
Collaborate
Java
Privacy Policy
 Practice Coding DBMS
Terms Python

Contact Us  Educators Program PHP

Android
Suggest
Game Development
© 2021 Studytonight Technologies
Data Structure & Alog.
Pvt. Ltd.
Operating System
Computer Network

Computer Architecture
More...

You might also like