Information Security
Information Security
Information and
Computer Security
Definition:
Security
Security is the quality or state of being secure. It can be a freedom
from danger (which is related to safety) or a freedom from fear or
anxiety.
Security also means protection and measures taken to guard against
sabotage, crime, attack or escape.
A painting Computer security is the protection of computer systems
and information from harm, theft and unauthorized use.
There are various types of computer security, which is widely used to
protect personal and organizational valuable information.
Types of Computer Security
Information security: is securing information from unauthorized access,
modification and deletion
Application security: is securing an application by building security features to
prevent from cyber threats.
Mobile and computer security means securing a handheld devices and
standalone machine by keeping it updated and patched.
Network security is done by securing both the software and hardware
technologies.
Cyber security: means protecting computer systems which communicate over the
computer networks
Principals of Computer Security
Computer security is mainly concerned with three main areas. These are
Confidentiality,
Integrity and
Availability,
which are abbreviated as CIA. Sometimes CIA is also called as the security
requirements triad.
Principals of Computer Security
Computer Confidentiality is ensuring that information is available only to the
intended audience. This often means that only authorized users and processes should
be able to access or modify data. In other words, this involves protecting the
information from a third party having unauthorized access. A concept related to this is
privacy, which focuses on protecting personal data.
Integrity means that data can be trusted. It should be maintained in a correct state,
kept so that it may not be wrongly changed and should be correct, authentic and
reliable.
Availability is ensuring that the information is available to authorized users whenever
they require it. This means keeping systems, networks and devices up and running
Computer security threat
Computer security threats can come both from internal and external sources.
or business
Earthquakes,
Computer security threats change their nature and methods with a change in the
technology.
security threats come through the Internet as a platform, i.e. they come through
network connectivity
Denial of services (DoS), phishing, SQL injections and password attacks are
popularized with the dominance of the Internet as a service platform.
Virus: A malicious code that gets into the computer program by replicating
to change its functioning. Melisa virus is a common one that spreads itself
in the system without acknowledging the user. Some people also refer to it
as rootkit.
Key logger: They work by recording the movement on the keyboards and
mostly steal passwords and accounts’ details.
Malware Attacks
Worms: An independent program that infects the computer system through
network devices
Botnets: The word botnet is formed from the words robot and network. Cyber
criminals use special Trojan viruses to breach the security of several users’
computers, take control of each computer and organize all the infected
machines into a network of bots that the criminal can remotely manage
Malware Attacks
Spyware: A secret program that tracks all the movements of the user
secretly and then uses that information against them.
Ransomware: This malware locks the files and data on the system and
threatens to delete them if not paid the ransom.
Denial of Service(DoS)
A denial-of-service (DoS) attack is a security threat that occurs when an
attacker makes it impossible for legitimate users to access computer
systems, network, services or other information technology (IT) resources.
Illegal usage: uses the normal function of the system to achieve the
attacker’s behavior for other purpose. For example, dispatching texts of
videos that promote inter-conflict or inter-religious conflict by using
school internet services is an illegal usage, which can be a criminal act.
Potential Losses Due to Security Attacks
Disclosure of information: This is dissemination of information to
anyone who is not authorized. For example, schools put warning or letter
of appreciation on noticeboard inside the school to make the case known
to the school community.