You are on page 1of 1
ccertteasecure Computer User eam ini Jntrogucton to Gata Security Authenticity Authenticity refers to the truthfulness of the origin of data. It ensures the claimed source of data is actually the origin of that data and that the data has mot been tampered with since its creation. For instance, an email claiming to contain your bank account statement as an attachment, can only come from your bank. A bank statement coming from any other source, even though claiming to be your bank, cannat be considered authentic. Integrity Integrity is ensuring that the information is accurate, complete, reliable, and is in its original form, Incomplete or corrupted data can do more harm than good. Imagine what can happen if ‘an organization transfers an employee's salary to an incorrect account owing to corruption of the database holding all emplayee account numbers. Availability Availability ensures that once the user captures the data in a computer system, it must make ‘the data available to the users when they request it. The availability of data to the authorized users, at any paint of time, is one of the most important purposes of a computer. Availability is also applicable to the computer hosting the data or the services as well. The computing resources need to be available to the users whenever needed. Nonrepudiation Nonrepudliation is the process that ensures accuracy of the sender and receiver of a message. It also ensures that the sender of message cannot deny having sent the message and also the recipient cannot deny having received it. Potential Losses Due to Security Attacks Computer security is essential for industries and organizations that directly or indirectly depend fon latest communication or other technologies, as well as for homes that use various computing devices. Possible lasses that users or organizations may suffer due to security ‘attacks include: "Financial loss An organization may lose huge amounts of money if attackers make the systems stop working all of a sudden. Security attack may result in loss of sensitive data worth millions of dollars. Even users using 2 system at home may lose money if attackers compromise their systems to gain access to their bank accounts and credit card information. + Unavailability of resources Security attacks on @ computer may deplete the system's resources (such as hard drive spaCe, Memory, oF the speed of the processor), making the system sluggish. * Identity theft and identity fraud Identity theft refers to the process of stealing someone's personal information with the intention of using ft for illegal activities. Identity fraud refers to the actual usage of the Mocks 0 Page Cert Scare Computer User Copyright © oy E-Caunell ‘Al Spas Rezeves. Resreaumie Si Promtes

You might also like