Computer Security
Essay Preview: Computer Security
Report this essay
OUTLINE
INTRODUCTION
What is computer security?
Why buy security?
What are the threats to security?
What should users do?
SYSTEM SECURITY AND ACCESS CONTROLS
System Security
Logging in
VIRUSES
What is a virus?
Who writes viruses?
Worms and Trojans
ESTABLISHING A SECURITY POLICY
Administrative Security
Day to Day Administration
Separation of Duties
COMMUNICATIONS SECURITY
Encryption
5.1.1
History
5.1.2
What is encryption?
Network Security
PHYSICAL SECURITY AND BIOMETRICS
Physical Security
Biometrics
CONCLUSION
REFERENCES
ABSTRACT
Computer security is essential in any organization in order for information not to be disclosed to unauthorized persons. For example, in highly secure government systems, secrecy ensures that users access only information that they are allowed. In businesses computer security is essential through the protection of private information such as payroll data as well as sensitive corporate data (such as internal memos and competitive strategy documents). This paper will present an overview of Computer Security and its basics which can be applied at individual level or organizational level. It will cover the essentials of Computer Security as well as Network Security.
INTRODUCTION
What is computer security?
Computer security is the process of preventing and detecting unauthorized access of your computer.
According to Wikipedia, computer security is also defined as a branch of computer technology known as information security as applied to computers and networks.
Computer security deals with the technologies employed to maintain security within a computer system, says Golman Dieter.
The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users.
Computer system security means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively.
Computer and network security are built on the pillars, commonly referred to by the CIA acronym.
Confidentiality
Integrity
Availability
Data is confidential if it stays obscure to all but those authorized to use it. Data has integrity as long as it remains identical to its state when the last authorized user finished with it. Data is available when it is accessible by authorized users in a convenient format and within a reasonable time.
Computer security and network security are part of a larger undertaking that protects your computer and everything associated with it. Thats why computer security is often called information security.
Why buy security?
Computer security is vital for protecting the confidentiality, integrity, and availability of computer systems, resources, and data. Without confidentiality, trade secrets or personally identifying information can be lost. Without integrity, we can not be sure that the data we have is the same data that was initially sent (ie, altered data). Without availability, we may be denied access to computing resources (ie, a virus that disables your keyboard and mouse).
What are the threats to security?
They are grouped into three:
Vulnerabilities, threats and countermeasures
Vulnerability is a point where a system is susceptible to attack.
Types of vulnerabilities:
Physical Vulnerabilities:
Intruders can sabotage and vandalize your network equipment or they can steal backup media or obtain information that will allow them to more easily hack their way in at a later time.
Natural Vulnerabilities:
Disasters such as fire, floods, earthquakes, lightning, and power loss can wreck your computer and destroy your data. Dust, humidity and uneven temperature conditions can also do damage.
Human Vulnerabilities:
The people who administer and use your computer system represent the greatest vulnerability of all. If your administrator is poorly trained, or decides to take a life of crime, your network is in grave danger. Ordinary computer users, operators, and other people on your staff can also be bribed or coerced into giving away passwords, opening doors, or otherwise jeopardizing security in your system.
Threats
A threat is defined as a possible danger to the system. Threats fall into three main categories: natural, unintentional, and intentional.
Natural threats
They include fires, floods and other disasters. You can plan for a disaster by backing up critical data off-site and by arranging for the use of a backup system that can be used if an emergency does occur.
Unintentional threats
Ignorance creates danger. For example a system administrator who hasnt been trained properly may delete a file, or change a password on critical system software, therefore