Computer security refers to protecting our Computer from unauthorized access by any intruder to our data and information well computer security is not just an IT problem it is everyone’s responsibility this means that everyone who uses a computer or mobile device needs to understand how to keep the computer devices and data secure
so here’s what computer security is all about computer security or IT security is the protection of computer systems from the theft or damage to their hardware software or electronic data as well as from disruption or misdirection of the service they provide so computer security can be defined as controls that are put in place to provide confidentiality integrity and availability for all components of computer systems
these components include data hardware and software hardware is the physical part of the computer like the system memory and firmware, on the other hand, the permanent software that runs the process of the computer and is mostly invisible to the user like the start of functions that make elements of the hardware work together and suffer is the programming that offers service to the user and administrator the operating system word processor computer games and internet browser are all examples of software commonly found on a computer so learning about these components tell you that what hardware software and firmware you have to protect in your system
Goals of Computer Security
so following are the goals of computer security and to protect your system you must adhere to these rules so the fire rules are confidentiality data integrity availability control and audit so let’s take a moment to discuss these one by one.
Confidentiality: Keep your Secrets first is confidentiality so for confidentiality you will have to ensure that information is available only to the intended audience confidentiality includes the privacy of information that may be personal or sensitive then comes data integrity.
Data Integrity: Prevent people from Modifying Data and protecting data integrity is also a concern the company needs certainty that information does not become inaccurate because of unintended changes in its availability so you’ll have to work with the IT manager to protect the data as availability or the ability for a loud person to access the computer and its information whenever necessary then controls so the protection comes from any intruder.
Control: Regulate your System Usage controls or technical physical and procedural choices that limit access to the computer components you’ll have to choose controls for computer security carefully to align the necessary user access with a minimum amount of unnecessary ability last but not least is audit so you need to monitor log files and you should typically have regular audits to ensure the smooth working of the systems so that you can find out what’s wrong in the system and practically undo it now the protection of these qualities should be the top goal as a security manager, let’s talk about the types.
Types of Computer Security
INFORMATION SECURITY
Information security is securing information from unauthorized access, modification, and deletion by using different means Information security protects sensitive information from unauthorized access, including inspection, modification, recording, and any disruption or destruction. The goal is to ensure the safety and privacy of critical data such as customer account details, financial data, or personal information. Software for using to Protect our information are
- Antivirus
- Wireshark
- firewall
Application Security
Application security process of developing, adding, and testing security features within applications to prevent security vulnerabilities against threats such as unauthorized access and modification. Application security is securing an application by building security features to prevent cyber threats Such as SQL injection, DOS attacks, data breaches, etc. Some examples of software that performs application security are
- Burp Suite
- Dash Tools
- Fortify
Computer Security
Computer Security is securing stand-alone machines by keeping them uploaded and patched. Computer security refers to taking security measures and controls that ensure the integrity, and availability of the information processed and stored by a computer. This includes everything from protecting physical information assets to data security and computer safety practices. Names of some software used in computer security are
- New Relic
- Malware bytes
- Dyna trace
Network Security
Network Security is securing both hardware and software technologies Network security is protection of the underlying networking infrastructure from unauthorized access or theft. It involves creating a secure infrastructure for devices, applications, users, and applications to work securely. Name of some software commonly used in network security
- Solar Winds
- IPS (Intrusion Prevent System)
Cybersecurity
Cybersecurity is defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It’s also known as information technology security or electronic information security. cyber security is defined as protecting computer systems that communicate over the computer network. Software commonly used for cybersecurity are
- Nikto
- Crowd strike
- Life Locks