0% found this document useful (0 votes)
14 views10 pages

NIS MP

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views10 pages

NIS MP

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Introduction

Computer security, cyber security or information technology security (IT security)


is the protection of computer systems and networks from information disclosure,
theft of or damage to their hardware, software, or electronic data, as well as from
the disruption or misdirection of the services they provide

The field is becoming increasingly significant due to the increased reliance on


computer systems, the Internet and wireless network standards such as Bluetooth
and Wi-Fi, and due to the growth of "smart" devices, including smartphones,
televisions, and the various devices that constitute the "Internet of things". Owing
to its complexity, both in terms of politics and technology, cyber security is also
one of the major challenges in the contemporary world.

Computer security, the protection of computer systems and information from harm,
theft, and unauthorized use. Computer hardware is typically protected by the same
means used to protect other valuable or sensitive equipment, namely, serial
numbers, doors and locks, and alarms. The protection of information and system
access, on the other hand, is achieved through other tactics, some of them quite
complex. The security precautions related to computer information and access
address four major threats:

(1) Theft of data, such as that of military secrets from government computers;

(2) Vandalism, including the destruction of data by a computer virus;

(3) Fraud, such as employees at a bank channeling funds into their own accounts;
and

4) Invasion of privacy, such as the illegal accessing of protected personal financial


or medical data from a large database. The most basic means of protecting a
computer system against theft, invasion of privacy, and other is to electronically
track and record the access to, and activities of, the various users of a computer
system. This is commonly done by assigning an individual password to each
person who has access to a system. The computer can then automatically track the
use of these passwords, such data as which files were accessed under particular
passwords and so on. Another security measure is to store a system’s data on a
separate device, or medium, such as magnetic tape or disks, that is normally
inaccessible through the computer system. Finally, data is often encrypted so that it
can be deciphered only by holders of a singular encryption key.

Computer security threats


Computer security threats are possible dangers that can possible hamper the
normal functioning of your computer. In the present age, cyber threats are
constantly increasing as the world is going digital. The most harmful types of
computer security are:

1) Virus:

Virus is a malicious program which is loaded into the user’s computer without
user’s knowledge. It replicates itself and infects the files and programs on the
user’s PC. The ultimate goal of a virus is to ensure that the victim’s computer will
never be able to operate properly or even at all.
2) Computer Worm

Computer worm is a software program that can copy itself from one computer to
another, without human interaction. The potential risk here is that it will use up
your computer hard-disk space because a worm can replicate in great volume and
with great speed.
3) Phishing

Disguising as a trustworthy person or business, phishers attempt to steal sensitive


financial or personal information through fraudulent email or instant messages.
Phishing in unfortunately very easy to execute. You are deluded into

4) Botnet

Botnet is a group of computers connected to the internet, that have been


compromised by a hacker using a computer virus. An individual computer is called
‘zombie computer’. The result of this threat is the victim’s computer, which is the
bot will be used for malicious activities and for a larger scale attack like DDoS.
IS COMPUTER SECURITY IMPORTANT?
Computers are very essential part of our daily lives and it plays important roles in
our lives. So, the security of a computer is important because it protects your
information and helps to prevent from viruses and malware. In this post, we will
discuss on why is computer security important of our lives. Computer security is
also known as cyber security or IT security which mainly used for protection of
computer system such as hardware and software.

WHY IS COMPUTER SECURITY IMPORTANT?


The main purpose of the security is the preventing and detecting unauthorized
access of computer system. It guarantees to safe processing and storage of
business, healthcare and sensitive information. Cyber security provides the
Confidentiality, Integrity and Availability for all components of a computer
system. Here are the some reasons why is computer security important:

1. TO PROTECT PERSONAL INFORMATION

To prevent from cyber security risk you have to protect your personal information.
IT security is the first prime issue to protect your personal and others information.
By the way you can keep your information secure using the following tips:

 Use antivirus Software


 Update operating system
 Use strong password
 Backup your data
 Lock your computer
 Avoid Phishing Emails
 protect your personal information

2. TO PROTECT ORGANIZATION PROPERTIES

It is very important to ensure the organization’s computer data because every


organization has many sensitive assets and information. So, without computer or
IT security you can’t guarantee the security of organization properties.
3. TO PREVENTION FROM DATA THEFT

Data theft is act of stealing sensitive information such as bank account details,
credit card information, passwords, and documents which stored on computers,
servers, or other devices. The most common reasons of data breaches are as
follows:

● Weak and stolen credentials

● Malicious insiders

● Application vulnerabilities

● Human Error

So, prevent from data theft you have to ensure your device security by using
endpoint security, lock down your computer, Identify critical data and use
authentication.

4. TO PREVENT FROM VIRUSES AND MALWARE

Computer security is also important to protect from computer viruses and


malware’s. A computer virus or malware can corrupt or delete your sensitive
data, damage your hard disk and it spreads from one computer to another using
email program and others. So, you have to protect your computer from viruses
and malware using following these tips:

● Keep your software up to date

● Use free antivirus software

● Use a strong password

● Don’t click on links within emails

● Back up your computer

● Use a pop-up blocker


TYPES OF COMPUTER SECURITY
In this post, we will focus on the different types of computer security such as
application security, network security, internet security, data security,
information security and end user security.

1. APPLICATION SECURITY

Application security is the types of cyber security which developing application by


adding security features within applications to prevent from cyber attacks. The
attacks can be SQL injection, denial of service (DoS) attacks, data breaches or
other cyber-attacks. There are some application security tools and techniques
such as firewalls, antivirus software, encryption, and web application firewall
which can help to prevent from cyber-attacks. A web application firewall is
designed to protect web applications by filtering and monitoring HTTP harmful
traffic. Here are the most used Web Application Firewalls are :

Fortinet Forti WebCitrix NetScaler App FirewallF5 Advanced WAF Radware AppWall
2. INFORMATION SECURITY

Information security (IS) is the types of computer security which refers to the
process and methodology to protect the confidentiality, integrity and availability
of computer system from unauthorized access, use, modification and destruction.
Information security focuses on the CIA triad model, which ensure confidentiality,
integrity, and availability of data, without affecting organization productivity.

3. NETWORK SECURITY

Network security is other types of IT security which process of preventing and


protecting against unauthorized intrusion into computer networks. It is a set of
rules and configurations which designed to protect the confidentiality, integrity
and accessibility of computer networks system and information using both
software and hardware technologies.

NETWORK SECURITY METHODS

There are different components or methods to improve network security. Here,


we have mentioned the most common network security components.

 Antivirus Software
 Application Security
 Behavioral Analytics
 Data Loss Prevention (DLP)
 Email Security
 Firewalls
 Mobile Device Security
 Network Segmentation
 Security Information and Event Management (SIEM)
 Virtual Private Network (VPN)
 Web Security
4. ENDPOINT SECURITY

Human error is a major weak point which is easily exploited by cyber criminals. End
users are becoming the largest security risk in any organizations. However, end
user has no fault of their own, and mostly due to a lack of awareness and ICT
policy. They can unintentional open the virtual gates to cyber attackers. That’s
why comprehensive security policies, procedures and protocols have to be
understood in depth by users who accessing the sensitive information .It is better
to providing security awareness training program to them and should cover the
following topics:

 Cyber security and its importance


 Phishing and Social Engineering attack
 Password creation and usages
 Device Security
 Physical Security
 Learn More About Social Engineering Attack

5. INTERNET SECURITY

Internet security is the important types of computer security which has defined as a
process to create set of rules and actions to protect computers system that are
connected to the Internet.
CONCLUSION
Now that you have completed this web request on Computer Security you are
now aware of the possible security treats to computer systems. Not only that, but
you are now better able to protect your computers as well as recommend
security measures to others. Have you ever heard the terms Computer Virus,
worms, Trojans, Cybercrime, hackers? Putting your computer in a bank vault with
security officers with shot guns and Rin-tin-tin will not protect your computer’s
data. To protect your data you will have to incorporate the use of special Data
Security software along with the Physical Security methods you have learned.
Have a look at Computer Security Threats as it relates to data security.

Referance:
 https://www.google.co.in/
 https://www.geeksforgeeks.org/
 https://www.tpointtech.com/

You might also like