Computer security, also known as cybersecurity, involves protecting computing systems and data from theft, damage, and unauthorized use. It is essential for safeguarding sensitive information, supporting critical business processes, and ensuring the integrity and availability of data. The CIA model—confidentiality, integrity, and availability—guides security policies, while non-repudiation ensures the authenticity of information exchanged.
Download as KEY, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
6 views
fundamentals of CS
Computer security, also known as cybersecurity, involves protecting computing systems and data from theft, damage, and unauthorized use. It is essential for safeguarding sensitive information, supporting critical business processes, and ensuring the integrity and availability of data. The CIA model—confidentiality, integrity, and availability—guides security policies, while non-repudiation ensures the authenticity of information exchanged.
Download as KEY, PDF, TXT or read online on Scribd
You are on page 1/ 18
COMPUTER SECURITY
LEARNING OUTCOMES : 1) What is Computer security?
2) Need of computer security
3) Importance of Computer Security
4) Security Problems in cyber field
5) Computer security objectives
Computer Security Computer Security is the protection of computing systems and the data that they store or access. Computer Security, also called cybersecurity, the protection of computer systems and information from harm, theft, and unauthorized use Need of computer security Computer security is necessary because it helps in securing data from theft, such as data theft or misuse, also safeguards your system from viruses. It also deals with natural disaster like fire,floods,accidents etc.. Importance of computer security
Enabling people to carry out their
jobs, education, and research activities Supporting critical business processes Protecting personal and sensitive information CYBER SECURITY Cyber security is the body of technologies, processes, and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. The term cyber security refers to techniques and practices designed to protect digital data. The data that is stored, transmitted or used on an information system. After all, that is what criminal wants, data. The network, servers, computers are just mechanisms to get to the data. Effective cyber security reduces the risk of cyber-attacks and protects organizations and individuals from the unauthorized exploitation of systems, networks, and technologies. Computer SECURITY CIA MODEL Confidentiality, integrity, and availability, also known as the CIA triad, is a model designed to guide companies and organizations to form their security policies.
Technically, cyber security means
protecting information from unauthorized access, unauthorized modification, and unauthorized deletion in order to provide confidentiality, integrity, and availability. CONFIDENTIALITY Confidentiality is about preventing the disclosure of data to unauthorized parties. It also means trying to keep the identity of authorized parties involved in sharing and holding data private and anonymous. Often confidentiality is compromised by cracking poorly encrypted data, Man-in-the- middle(MITM) attacks, disclosing sensitive data. Confidentiality makes sure that only authorized personnel are given access or permission to modify data. Example in real life − Good example of confidentiality is the personal information of e-commerce customers. Sensitive information like credit card details, contact information, shipping details, or other personal information needs to be secured to prevent unauthorized access and exposure. CONFIDENTIALITY Standard measures to establish confidentiality include: Data encryption Two-factor authentication Biometric verification Security tokens Integrity Integrity refers to protecting information from being modified by unauthorized parties. It is a requirement that information and programs are changed only in a specified and authorized manner. Challenges that could endanger integrity include turning a machine into a “zombie computer”, embedding malware into web pages. Example in real life − For example, in e-commerce, customers expect products, pricing, and other related details to be accurate and that it will not be altered once the order is placed. Similarly, in banking, a sense of trust regarding banking information and account balances has to be established by ensuring that these details are authentic and have not been tampered with. Integrity Standard measures to guarantee integrity include: Cryptographic checksums Using file permissions Uninterrupted power supplies Data backups Availability Availability is making sure that authorized parties are able to access the information when needed. Data only has value if the right people can access it at the right time. Information unavailability can occur due to security incidents such as DDoS attacks, hardware failures, programming errors, human errors. Standard measures to guarantee availability include: Backing up data to external drives Implementing firewalls Having backup power supplies Data redundancy Example of CIA Triad consider an ATM that allows users to access bank balances and other information. An ATM incorporates measures to cover the principles of the triad: The two-factor authentication (debit card with the PIN code) provides confidentiality before authorizing access to sensitive data. The ATM and bank software ensure data integrity by maintaining all transfer and withdrawal records made via the ATM in the user’s bank accounting. The ATM provides availability as it is for public use and is accessible at all times. Non repudiation Non repudiation refers to the concept of ensuring that a message or other information is genuine. In cyber security, information received must be verified as coming from the actual sending source indicated. It is also important that neither sender nor receiver can later deny that they sent or received the information. Non repudiation is implemented through digital signatures and transactional logs.