Username: Save?
Password:
Home Forum Links Search Login Register*
    News: Keep The TechnoWorldInc.com Community Clean: Read Guidelines Here.
Recent Updates
[October 17, 2024, 05:05:06 PM]

[October 17, 2024, 04:53:18 PM]

[October 17, 2024, 04:53:18 PM]

[October 17, 2024, 04:53:18 PM]

[October 17, 2024, 04:53:18 PM]

[September 09, 2024, 12:27:25 PM]

[September 09, 2024, 12:27:25 PM]

[September 09, 2024, 12:27:25 PM]

[September 09, 2024, 12:27:25 PM]

[August 10, 2024, 12:34:30 PM]

[August 10, 2024, 12:34:30 PM]

[August 10, 2024, 12:34:30 PM]

[August 10, 2024, 12:34:30 PM]
Subscriptions
Get Latest Tech Updates For Free!
Resources
   Travelikers
   Funistan
   PrettyGalz
   Techlap
   FreeThemes
   Videsta
   Glamistan
   BachatMela
   GlamGalz
   Techzug
   Vidsage
   Funzug
   WorldHostInc
   Funfani
   FilmyMama
   Uploaded.Tech
   MegaPixelShop
   Netens
   Funotic
   FreeJobsInc
   FilesPark
Participate in the fastest growing Technical Encyclopedia! This website is 100% Free. Please register or login using the login box above if you have already registered. You will need to be logged in to reply, make new topics and to access all the areas. Registration is free! Click Here To Register.
+ Techno World Inc - The Best Technical Encyclopedia Online! » Forum » THE TECHNO CLUB [ TECHNOWORLDINC.COM ] » Techno Articles » Internet
 Computer Security - What Exactly Is It?
Pages: [1]   Go Down
  Print  
Author Topic: Computer Security - What Exactly Is It?  (Read 569 times)
Shawn Tracer
TWI Hero
**********


Karma: 2
Offline Offline

Posts: 16072


View Profile
Computer Security - What Exactly Is It?
« Posted: February 26, 2008, 12:06:45 PM »


Computer Security - What Exactly Is It?
 by: Ciontescu Molie

Although the term 'computer security' is used a lot, the content of a computer is actually vulnerable to only a few risks unless the computer is connected to others on a network. As the use of computer networks (especially the Internet) has increased dramatically during the past few years, the term computer security is now used to describe issues referring to the networked use of computers and their resources.

The major technical areas of computer security are confidentiality, integrity and authentication/availability.

    * Confidentiality, also known as secrecy or privacy, means that the information you own cannot be accessed by unauthorized parties. Breaches of confidentiality range from the embarrassing to the disastrous.

    * Integrity means that your information is protected against unauthorized changes that are undetectable to authorized users. The integrity of databases and other resources are usually compromised through hacking.

    * Authentication means that an user is who he claims to be.

    * Availability means that the resources are accessible by authorized parties. Examples of availability attacks are the 'denial of service' attacks.

Other important things that the computer security professionals are concerned about are access control and nonrepudiation. Access control refer not only to the fact that users can only access the resources and services they are entitled to, but also to the fact that they can't be denied to access the resources they legitimately expect. Nonrepudiation means that a person who sends a message cannot deny he sent it and vice versa.

In addition to these technical aspects, the concept of computer security is very large. Computer security's roots are drawn from disciplines like ethics and risk analysis and the major topics that are concerning it are computer crime (tries to prevent, detect and remedy attacks) and identity/anonymity in cyberspace.

Although confidentiality, integrity and authenticity are the most important things when it comes to computer security in general, for everyday internet users, privacy is the most important one, because many people think that they have nothing to hide or the information they give doesn't seem sensitive when they register with an internet service/site.

But remember that, on the internet, information is very easily shared among companies and small pieces of related information from different sources can be linked together to form something alot more complex about a person. Because of this, nowadays, the ability to maintain control over what information is collected about them, who may use it and how it can be used is extremely important.

About The Author

Ciontescu Molie

For information and resources on network, computer security, hackers, vulnerabilities, patches, advisories, and more visit http://www.itfreaks.com

[email protected]

Logged

Pages: [1]   Go Up
  Print  
 
Jump to:  

Copyright © 2006-2023 TechnoWorldInc.com. All Rights Reserved. Privacy Policy | Disclaimer
Page created in 0.178 seconds with 24 queries.