You are on page 1of 5

www.byjusexamprep.

com

1
www.byjusexamprep.com

Computer Security
Computer security is the protection of computer systems and networks from the theft of or
damage to their hardware, software, or electronic data, as well as from the disruption or
misdirection of the services they provide.

• Information security: is securing information from unauthorized access,


modification & deletion

• Computer Security: means securing a standalone machine by keeping it updated


and patched

• Cybersecurity: is defined as protecting computer systems, which communicate over


the computer networks.

Computer security can be defined as controls that are put in place to provide
confidentiality, integrity, and availability for all components of computer systems.

components of a computer system:

• Hardware: the physical part of the computer, like the system memory and disk
drive

• Firmware: permanent software that is etched into a hardware device’s nonvolatile


memory and is mostly invisible to the user

• Software: the programming that offers services, like operating system, word
processor, internet browser to the user.

Computer security is mainly concerned with four main areas:

• Confidentiality is ensuring that information is available only to the intended


audience

• Integrity is protecting information from being modified by unauthorized parties

• Availability is protecting information from being modified by unauthorized parties


2
www.byjusexamprep.com

• Authentication: are you really communicating with whom you think you are
communicating with

Why is computer security important?

• Prevention of data theft such as bank account numbers, credit card information,
passwords, work related documents or sheets, etc. is essential in today’s
communications since many of our day to day actions depend on the security of the
data paths.

• Data present in a computer can also be misused by unauthorized intrusions. An


intruder can modify and change the program source codes and can also use your
pictures or email accounts to create derogatory content such as pornographic images,
fake misleading and offensive social accounts.

• Malicious intents can also be a factor in computer security. Intruders often use your
computers for attacking other computers or websites or networks for creating havoc.
Vengeful hackers might crash someone’s computer system to create data loss. DDOS
attacks can be made to prevent access to websites by crashing the server.

• Above factors imply that your data should remain safe and confidential. Therefore, it
is necessary to protect your computer and hence the need for Computer Security
arises.

What is firewall?

A firewalls a security-conscious piece of hardware or soft-ware that sits between the Internet
and your network with a single-minded task: preventing them from getting to us. The
firewall acts as a security guard between the Internet and your local area network (LAN). All
network traffic into and out of the LAN must pass through the firewall, which prevents
unauthorized access to the network.

What are the types of firewalls?

1. Packet-filtering firewall examines each packet that crosses the firewall and tests
the packet according to a set of rules that you set up. If the packet passes the test,
it’s allowed to pass. If the packet doesn’t pass, it’s rejected. Packet filters are the
least expensive type of firewall. As a result, packet-filtering firewalls are very
common.

2. Stateful packet inspection (SPI) is a step up in intelligence from simple packet


filtering . A firewall with stateful packet inspection looks at packets in groups rather
than individually. It keeps track of which packets have passed through the firewall
and can detect patterns that indicate unauthorized access.

3. Deep packet inspection (DPI) is the actual content of the packets is inspected so
viruses, spam, and other harmful content can be blocked. DPI also allows practices,
such as data mining, eavesdropping, and content censorship, which make its use a
controversial subject.

3
www.byjusexamprep.com

Computer security threats:

Computer security threats are possible dangers that can possibly hamper the normal
functioning of your computer. In the present age, cyber threats are constantly increasing as
the world is going digital.

Types of Computer Security Threats

There are several types of computer security threats such as Trojans, Virus, Adware,
Malware, Rootkit, hackers and much more. Check some of the most harmful types of
computer Security Threats.

1. Computer Virus

• A Computer Virus is a malicious program, which replicates itself and infects the
files and programs of your PC and can make them non-functional.

2. Computer Worms

• A self-replicating computer program that spreads malicious codes, computer


worms make use of the network to send copies of the original codes to other PCS.

• It can also go to the extent of sending transferring documents utilizing the email of
the user

3. Scareware

• Scareware is a malware that tricks victims to buy software by displaying fake


virus alerts.

• A scareware infected PC may get pop-ups of fake malware threats and to get
rid of those, users are prompted to purchase a fake anti-malware software.

4. Keyloggers

• Keyloggers can track the real-time activity of a user on his computer.

• Keylogger runs in the background and records all keystrokes made by a user
and passes the information to the hacker with the motive to steal password and
banking details.

5. Rootkit

• A rootkit is considered extremely dangerous as they appear to be legitimate


files and deceives the computer user.

• Rootkit masks viruses and worms and makes them appear as necessary files.
These are very difficult to remove and only an antivirus with the anti-rootkit
feature can remove a rootkit.

Tips for Best Computer Security

4
www.byjusexamprep.com

For best computer security, you must follow certain guidelines, which are also called
computer best practices.

1. Use the best antivirus software, which not only provides protection to your PC but also
internet protection and guards against cyber threats.

2. Do not download untrusted email attachments and these may carry harmful malware.

3. Never download software from unreliable sites as they may come with a virus that
may infect your system as soon as you install the software.

You might also like