0% found this document useful (0 votes)
32 views10 pages

Computer Security

The document discusses computer security, including what it is, its types, threats to computer security, and practices to improve security. Computer security involves protecting computer systems and information from harm and unauthorized access. It outlines common security threats like viruses, worms, phishing and discusses why security is important.

Uploaded by

mhammadnjmaden45
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views10 pages

Computer Security

The document discusses computer security, including what it is, its types, threats to computer security, and practices to improve security. Computer security involves protecting computer systems and information from harm and unauthorized access. It outlines common security threats like viruses, worms, phishing and discusses why security is important.

Uploaded by

mhammadnjmaden45
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Outlines

Introduction
,,

What is computer security Kalar Technical College


What is computer security and its Veterinary
types Department
Components of computer systems
First Stage

Areas of computer security


2021-2022
Computer
Computer security threats

Computer security
The most harmful types of computer security

Why computer security is important

Computer security practices


Prepared by: Supervised by:
Azhin Dara MS: Halala
,
Helin Ahmad
Avin Latif
Eilham Hajy
Introduction

The Internet has transformed our lives in many good ways.


Unfortunately, this vast network and its associated technologies also
have brought in their wake, the increasing number of security threats.
The most effective way to protect yourself from these threats and
attacks is to be aware of standard cybersecurity practices. This article
on “What is Computer Security?” presents an introduction to computer
security and its key concepts.
What is computer security

Computer security involves protecting software, data, hardware, and other


components associated with the computer from cybersecurity threats or damage.
Methods, software, and techniques are applied to enable system security,
safeguard computing resources, allow data to integrity, restrict access to
authorized users, and retain data confidentiality. Antivirus, Firewall, and Internet
security software are some of the efficient security systems available to entitle
users with computer security. Computer security basically is the protection of
computer systems and information from harm, theft, and unauthorized use. It is
the process of preventing and detecting unauthorized use of your computer
system. There are various types of computer security which is widely used to
protect the valuable information of an organization. So, Computer security can be
defined as controls that are put in place to provide confidentiality, integrity, and
availability for all components of computer systems. Let’s elaborate the
definition. In simple language, computer security is making sure information and
computer components are usable but still protected from people or software that
shouldn’t access it or modify it.

What is Computer Security and its types?

One way to ascertain the similarities and differences among Computer Security is
by asking what is being secured. For example,

o Information security is securing information from unauthorized access,


modification & deletion
o Application Security is securing an application by building security
features to prevent from Cyber Threats such as SQL injection, DoS attacks,
data breaches and etc.
o Computer Security means securing a standalone machine by keeping it
updated and patched
o Network Security is by securing both the software and hardware
technologies
o Cybersecurity is defined as protecting computer systems, which
communicate over the computer networks

It’s important to understand the distinction between these words, though


there isn’t necessarily a clear consensus on the meanings and the degree to
which they overlap or are interchangeable.

Components of computer system

The components of a computer system that needs to be protected are:

o Hardware, the physical part of the computer, like the system memory
and disk drive
o Firmware, permanent software that is etched into a hardware device’s
nonvolatile memory and is mostly invisible to the user
o Software, the programming that offers services, like operating system,
word processor, internet browser to the user
Computer security is mainly concerned with three main areas:

o Confidentiality is ensuring that information is available only to the intended


audience
o Integrity is protecting information from being modified by unauthorized
parties
o Availability is protecting information from being modified by unauthorized
parties

Computer security threats

Computer security threats are possible dangers that can possibly hamper the
normal functioning of your computer. In the present age, cyber threats are
constantly increasing as the world is going digital.

The most harmful types of computer security are:


Viruses: A computer virus is a malicious program which is loaded into the user’s
computer without user’s knowledge. It replicates itself and infects the files and
programs on the user’s PC. The ultimate goal of a virus is to ensure that the
victim’s computer will never be able to operate properly or even at all

Computer Worm: A computer worm is a software program that can copy itself
from one computer to another, without human interaction. The potential risk
here is that it will use up your computer hard disk space because a worm can
replicate in great volume and with great speed.

Phishing: Disguising as a trustworthy person or business, phishers attempt to


steal sensitive financial or personal information through fraudulent email or
instant messages. Phishing in unfortunately very easy to execute. You are deluded
into thinking it’s the legitimate mail and you may enter your personal
information.

Botnet: A botnet is a group of computers connected to the internet, that have


been compromised by a hacker using a computer virus. An individual computer is
called ‘zombie computer’. The result of this threat is the victim’s computer, which
is the bot will be used for malicious activities and for a larger scale attack like
DDoS.

Rootkit: A rootkit is a computer program designed to provide continued


privileged access to a computer while actively hiding its presence. Once a rootkit
has been installed, the controller of the rootkit will be able to remotely execute
files and change system configurations on the host machine.

Keylogger: Also known as a keystroke logger, keyloggers can track the real-time
activity of a user on his computer. It keeps a record of all the keystrokes made by
user keyboard. Keylogger is also a very powerful threat to steal people’s login
credential such as username and password.
Why is Computer Security Important?
In this digital era, we all want to keep our computers and our personal
information secure and hence computer security is important to keep our
personal information protected. It is also important to maintain our computer
security and its overall health by preventing viruses and malware which would
impact on the system performance.

Computer Security Practices


Some preventive steps you can take include:
Secure your computer physically by:
- Installing reliable, reputable security and anti-virus software
- Activating your firewall, because a firewall acts as a security guard
between the internet and your local area network

Stay up-to-date on the latest software and news surrounding your devices
and perform software updates as soon as they become available
Avoid clicking on email attachments unless you know the source
Change passwords regularly, using a unique combination of numbers,
letters and case types
Use the internet with caution and ignore pop-ups, drive-by downloads
while surfing
Taking the time to research the basic aspects of computer security and
educate yourself on evolving cyber-threats
Perform daily full system scans and create a periodic system backup
schedule to ensure your data is retrievable should something happen to
your computer.

Apart from these, there are many ways you can protect your computer system.
Aspects such as encryption and computer cleaners can assist in protecting your
computers and its files. Unfortunately, the number of cyber threats are increasing
at a rapid pace and more sophisticated attacks are emerging. So, having a good
foundation in cybersecurity concepts will allow you to protect your computer
against ever-evolving cyber threats.

References

https://www.edureka.co/blog/what-is-computer-security/amp/
https://enterprise.comodo.com/blog/computer-security/
https://www.pandasecurity.com/en/mediacenter/malware/the-biggest-cyber-
attacks-of-2016/
https://www.sawarigroup.com/
%D8%A7%D9%81%D8%A7%D9%82%D9%89/%D8%A7%D9%84%D8%A3%D9%85
%D8%A7%D9%86/

You might also like