Computer Security And Security Threats

866 Words2 Pages

Computer Security Computer security is an important issue and threats to the computer must be countered through various access controls and safety measures. Authorized accesses, avoidance of malicious software, prevention of applications from hackers are the steps that make a system secure. The fundamentals of computer security include an understanding of security policy stating laws, practices and regulations to manage and protect sensitive information. Enforcing a devised security policy and assurance of policy implementation are other important aspects of computer security. Computer security has various characterizations. First comes the information technology (IT) security based on three key points: Confidentiality, Integrity, and Availability. …show more content…

The security threats, policies, and appropriate security mechanisms are discussed to understand the threat. The paper discusses the background of security threats and then details some of the procedures and security mechanisms for personal computers. Security Threats There are four kinds of security threats, Interception, Interruption, Modification, and Fabrication. Interception Interception is an unauthorized access to data. Interception occurs when someone else who is not supposed to listen to that conversation intercepts communication between two entities. The interception in case of computer systems is the illegal access to data communication or breaking into the private directory of the personal computer’s file system (Paulauskas and Garsva, 85). Interruption Interruption is the situation when a computer or a system’s data or services become unavailable, destroyed or corrupted and unusable. An example of interruption is the DoS (Denial of Service) attacks by malicious software that make a service or a system unavailable (Paulauskas and Garsva, 85). …show more content…

(usa.kaspersky.com) Security Policy All the four classifications of security threats are data falsification techniques that can be protected by building a secure system. In order to protect the system completely, a robust security policy must be in place. The security policy describes that which all entities are accessible and those that are prohibited. The defined entities in a security policy include users, data, file paths, services, and if on a network then machines. After constituting a policy, it becomes easy to focus on the security mechanism for enforcing the policy (Yost, 7). Security Mechanism Encryption Encryption is the basic element of computer security. Encryption process transforms data into a form that becomes unreadable for an unauthorized person or program. Encryption ensures confidentiality and integrity. Encryption is also secured against data modification. Cryptography is an encryption technique for securing data and systems so that only authorized persons can access those. An example of encryption technique includes Symmetric key-based Advanced Encryption Standard (AES) algorithm (Bishop).

Open Document