Computer Security
Computer Security
Computer security is the protection that is set up for computer systems and
keeps critical information from unauthorized access, theft, or misuse. There are
various practices in place that are widely in use, mainly for the protection of
computer systems and networks and preventing potential malicious activities.
While computer hardware is secured in the same way that sensitive equipment
such as lockers and doors are protected, critical information and system access
and authorization, on the other hand, are protected through complex security
tactics and practices.
That’s all for computer security definition. Let’s move on to the section of
security threats and issues.
Viruses
Computer Worm
A computer worm is a software program that can undergo replication from one
computer system to another without the need for human interaction. Computer
worms use up all of the hard disk space owing to their replication capability and
the speed of replication, which can wreak havoc on the system’s resources.
They can even modify or delete files and introduce other malicious programs
into the system. Computer worms are also capable of stealing information and
introducing a backdoor for hackers to gain unauthorized access and control to
the system.
Importance of Computer Security
If a computer security system is not put in place until a problem arises, it could
lead to major issues and concerns, and it will be too late to resolve them.
Especially in a data-driven world, it is imperative to keep all kinds of
information from malicious hackers and prevent vital information from falling
into the wrong hands for misuse.
Computer security helps keep valuable information protected and maintain the
health of a computer with no disruptive behaviour in its performance caused by
viruses and malware.
That’s all for the importance and need of computer security. Read on to learn
about different categories of computer security.
Application Security
Network Security
Network security is any activity that aims to protect the integrity and usability
of a network and data. It consists of both hardware and software technologies
that are specifically designed to prevent unauthorized intrusion into computer
systems and networks.
Endpoint Security
Internet Security
Internet security is one of the most important types of computer security that
come with a set of rules and protocols that focus on specific threats and
activities that happen online. It provides protection against hacking, DoS
attacks, computer viruses, and malware.
What is cryptography?
Cryptography is a method of protecting information and communications
through the use of codes, so that only those for whom the information is
intended can read and process it.
In computer science, cryptography refers to secure information and
communication techniques derived from mathematical concepts and a set of
rule-based calculations called algorithms, to transform messages in ways that
are hard to decipher. These deterministic algorithms are used for cryptographic
key generation, digital signing, verification to protect data privacy, web
browsing on the internet and confidential communications such as credit card
transactions and email.
Saves time
you no longer have to wait for your manager to return from a holiday or
conference for that signature. Digital signatures ensure that businesses save on
cost and time with documents and contracts signed off with a click of a button.
There are huge savings in cost and time especially when the person required to
sign is in a geographically different area. Documents can be signed off almost
instantly, from anywhere. Be it a tablet, phone or computer, digital signatures
can seamlessly ensure this otherwise tedious task is wrapped up in minutes.
Cost savings
many companies also see significant cost savings, with little or no expense in
ink, paper, printing, scanning, shipping/delivery, or travel expenses. There are
also savings in other indirect costs such as filing, rekeying data, archiving, or
tracking.
Workflow efficiency
with lesser delays, digital signatures ensure better efficiency in workflow.
Managing and tracking documents are made easier, with lesser effort and time
involved. Many features of digital signatures help speed up the work process.
For instance, email notifications help remind the person to sign, while status
tracking, help to know at which stage the document is at.
Security
when it comes to signatures, authenticity, and security are a priority. Digital
signatures reduce the risk of duplication or alteration of the document itself.
Digital signatures ensure that signatures are verified, authentic and legitimate.
Signers are provided with PINs, passwords, and codes that can authenticate and
verify their identity and approve their signatures. Time stamping provides the
date and time of the signature and thus provides a track of the document,
minimizing any risk of tampering or fraud. Security features embedded in
digital signatures ensure that documents have not been altered without
authorization.
Legal validity
Digital signatures provide authenticity and ensure that the signature is verified.
This can stand in any court of law like any other signed paper document. Time
stamping and the ability to track and easily archive documents improve and
simplify audit and compliance.
Types of Policies
In this section we will see the most important types of policies.
Permissive Policy
Prudent Policy
Acceptance User Policy
User Account Policy
Information Protection Policy
Remote Access
Firewall Management
Special Access Policy
Network Policy
Email Usage Policy
Software Security Policy