What Is Computer Security
What Is Computer Security
🥳 🚀
Learn
Tests Forum Curious Learn Web Dev Login
Written By:
computersecurity anitivirus phishing
Amundra
5 minute read
What is Computer
Security
Posted in General
SEPTEMBER 14, 2021
Thus, learning about the nature of these cyber-attacks and how to defend
ourselves from them becomes very crucial to reduce the risk of data
breaches and the troubles that they bring along with them.
Before we dive deeper into computer security, let’s first see a few
reasons why users get attacked.
Types of Attacks
A dedicated hacker has many kinds of attacks up under his sleeve. Here
we have mentioned three of the most frequent ones:
Denial of Service
Using this attack the user’s access to the system resources is restricted by
flooding the server with useless traffic. A resource gets hopelessly jammed
up by the bots as they are commanded to access the resource at the same
time by the botmaster. Now, if someone else genuinely wants to get
access to that resource they cannot, as the resource is all blocked.
2. Malware attack:
Malware attack
Trojan horse: It is a malicious code that takes over your computer and
damages or steals information from it.
3. Phishing:
phishing
A bait is sent to the victim which is generally in the form of an email by the
attacker. They lure the victim into sharing their details, be it their bank
account, their password, or some other details.
You must always remember banks do not send emails like these.
What to Secure?
There are three principles that initiate the security of an organization:
Confidentiality, Integrity, and Availability. Since the advent of its
mainframes, the CIA has served as the industry standard for computer
security.
CIA triad
1. Two-way authentication
Adding an extra layer of security to the process of authentication makes it
harder for attackers to gain access to a person’s devices or online
accounts, this is called Two-way authentication. For instance, before you
make payments online, you have to first enter your CVV then you get the
OTP, and then the transaction happens.
2. Secure passwords
You need to create passwords that are very tough to guess or hack. You
could include in your passwords:
At least 15 characters.
Capital letters.
Numbers.
3. Antivirus
A computer program that detects, prevents, and terminates malware is
called an Antivirus. Some of the more famous antiviruses are Quickheal,
K7, Norton, etc.
4. Anti-Phishing Tactics
If you ever get a suspicious email that has no relation to you, just do the
following:
5. Encryption
Encryption is the process of converting simple text into complex
unintelligible forms so that it cannot be understood without decryption.
Encryption is used in:
Banking transactions.
Computer passwords.
E-commerce transactions.
IF YOU LIKE IT, THEN SHARE IT
RELATED POSTS
No related posts to show
Android
Suggest
Game Development
© 2021 Studytonight Technologies
Data Structure & Alog.
Pvt. Ltd.
Operating System
Computer Network
Computer Architecture
More...