Introduction The computer security is also known as cyber security
or IT security, is mainly uses for protection thecomputer system from the damages of their hardwareor software. The defenses of computers against theinstruction and unauthorized use of the resources isknown as desktop security.
Objective of Computer Security
Confidentiality
Integrity
Availability
Authentication
Consequence of Ignoring Computer Security
Loss of Confidential Data
Identity Theft
Compromised Data Integrity
Termination of Employment
Loss In Productivity
unavailability of Access to Data
Types of Computer Security Threats
Interruption
Interception
Modification
Fabrication
Hardware
Software
Data
Interruption Attack on availability
Cutting the communication line
Disabling the file management system
Destruction of hardware
The system become lost and unusable.
Interception
Attack on confidentially
An unauthorized gains access to an assets.
Wiretapping to capture data in a network
Modification
Changing the value in a data file.
Attack on integrity
Modifying the content of messages being transmitted in a network.
Fabrication
Addition of record to a file.
Attack on authenticity
Insertion of a spurious messages in a network.
Data
Involves file
Security concerns for availability, secrecy and integrity
Statistical analysis can lead to determination ofindividuals in formation which threats privacy.
Computer Security Action
Patch, patch, patch
Install security software
Choose the strong password
Use email and the internet safety
Control access to your machine.
Protect sensitive data
Use desktop firewall
Use secure connection
Backup, backup, backup!
For Example:
Wikki Verma is an IT software experts who willprovide the help in various services such as:interception, modification, hardware and data.