NIS Microproject 01
NIS Microproject 01
“Computing Security”
1
ABSTRACT
2
INDEX
2) 7
Computer security threats
7) Conclusion 18
3
Introduction
Computer security, cyber security or information technology
security (IT security) is the protection of computer systems and
networks from information disclosure, theft of or damage to their
hardware, software, or electronic data, as well as from the disruption
or misdirection of the services they provide
4
measure is to store a system’s data on a separate device, or medium,
such as magnetic tape or disks, that is normally inaccessible through
the computer system. Finally, data is often encrypted so that it can be
deciphered only by holders of a singular encryption key. (See data
encryption.)
1) Viruses
.
Computer virus is a malicious program which is loaded
into the user’s computer without user’s knowledge. It replicates itself
and infects the files and programs on the user’s PC. The ultimate goal
of a virus is to ensure that the victim’s computer will never be able to
operate properly or even at all.
5
2) ComputerWorm
3) Phishing
6
4) Botnet
5) Rootkit
7
controller of the rootkit will be able to remotely execute files and
change system configurations on the host machine.
6) Keylogger
COMPUTERSECURITY
IMPORTANT?
8
Computers are very essential part of our daily lives andit plays
important roles in our lives. So, the security of a computer is important
because it protects your information and helps to prevent from viruses
and malware. In this post, we will discuss on why is computer security
important of our lives.
Computer security is also known as cyber security or IT security
which mainly used for protection of computer system such as
hardware and software.
9
To prevent from cyber security risk, you have to protect your
personal information. IT security is the first prime issue to protect your
personal and others information. By the way you can keep your
information secure using the following tips:
2. TO PROTECT
ORGANIZA TION
PROPERTIES
It is very important to ensure the organization’s computer data
because every organization has many sensitive assets and information.
So, without computer or IT security you can’t guarantee the security of
organization properties.
10
devices. The most common reasons of data breaches are as follows:
4. TO PREVENT FROM
VIRUSES AND MALWARE
Computer security is also important to protect from computer
viruses and malwares. A computer virus or malware can corrupt or
delete your sensitive data, damage your hard disk and it spreads from
one computer to another using email program and others. So, you have
to protect your computer from viruses and malware using following
these tips:
11
TYPES OF COMPUTER SECURITY
In this post, we will focus on the different types of computer
security such as application security, network security, internet
security, data security, information security and end user security.
1. APPLICATION SECURITY
Application security is the types of cyber security which
developing application by adding security features within applications
to prevent from cyber-attacks. The attacks can be SQL injection,
denial of service (DoS) attacks, data breaches or other cyber-attacks.
There are some applications security tools and techniques such
as firewalls, antivirus software, encryption, and web application
firewall which can help to prevent from
cyber-attacks.
A web application firewall is designed to protect web
applications by filtering and monitoring HTTP harmful traffic. Here
are the most used Web Application Firewalls are:
12
Fortinet Forti Web
Citrix NetScaler App Firewall
F5 Advanced WAF
Redware App Wall
Symantec WAF
Barracuda WAF
Imperva WAF Sophos
XG Firewall
SonicWALL’s
2. INFORMATION SECURITY
Information security (IS) is the types of computer security which
refers to the process and methodology to protect the confidentiality,
integrity and availability of computer system from unauthorized access,
use, modification and destruction.
13
3. NETWORK SECURITY
Network security is other types of IT security which process of
preventing and protecting against unauthorized intrusion into
computer networks.
It is a set of rules and configurations which designed to protect
the confidentiality, integrity and accessibility of computer networks
system and information using both software and hardware
technologies.
14
There are different components or methods to improve network
security. Here, we have mentioned the most common network security
components.
Antivirus Software Application
Security Behavioral Analytics
Data Loss Prevention (DLP)
Email Security
Firewalls
Mobile Device Security
Network Segmentation
Security Information and Event Management (SIEM) Virtual
Private Network (VPN)
Web Security
Wireless Security Network
Access Control (NAC)
15
However, end user has no fault of their own, and mostly due to a
lack of awareness and ICT policy. They can unintentional open the
virtual gates to cyber attackers.
That’s why comprehensive security policies, procedures and
protocols have to be understood in depth by users who accessing the
sensitive information.
Cyber security and its importance Phishing
and Social Engineering attack Password
creation and usages
Device Security
Physical Security
Learn More About Social Engineering Attack
5. INTERNET SECURITY
Internet security is the important types of computer security
which has defined as a process to create set of rules and actions to
protect computers system that are connected to the Internet.
16
CONCLUSION
Now that you have completed this web quest on Computer
Security you are now aware of the possible security treats to computer
systems. Not only that, but you are now better able to protect your
computers as well as recommend security measures to others.
Have you ever heard the terms Computer Virus, worms, Trojans,
Cybercrime, hackers?
Putting your computer in a bank vault with security officers with
shot guns and Rin-tin-tin will not protect your computer’s data.
To protect your data you will have to incorporate the use of
special Data Security software along with the Physical Security
methods you have learned.
Have a look at Computer Security Threats as it relates to data
security.
17