What is Computer Security? Components of Computer Security?

Definition Of Computer Security :-

Let's understand first what is computer security:-
Computer security is also known as cyber security. Computer security is a branch of information technology known as information security which is intended to protect computers. It is the protection of computing systems and the data that they store or access.

Computer security is the protection of computer systems and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same means used to protect other valuable or sensitive equipment, namely, serial numbers, doors and locks, and alarms. 

Methods to Provide Protection:-

There are four primary methods to provide protection:-

1.System Access Control:-
It ensures that unauthorised users do not get into the system by encouraging authorised users to be security conscious.

2.Data Access Control:-
It monitors who can access the data, and for what purpose. Your system might support mandatory access controls with these. The system determines access rules based on the security levels of the people, the files and the other objects in your  system.

3.System and Security Administration:-
It performs offline procedures that makes or break secure system.

4.System Design:-
It takes advantages of basic hardware and software security characteristics.

computer virus protection
computer virus


Components of Computer Security:-

Computer security is associated with many core areas.

Basic components of computer security system are as follows:-
1.Confidentialy:-
It ensures that data is not accessed by any unauthorised person.

2.Integrity:-
It ensures that information is not altered by any unauthorised person in such a way that it is not detectable by authorised users.

3.Authentication:-
It ensures that users are the persons they claim to be.

4.Access Control:-
It ensures that users access only those resources that they are allowed to access.

5.Non-Repudiation:-
It ensures that originators of messages cannot deny they are not sender of the message.

6.Availability:-
It ensures that systems work promptly and service is not denied to authorised users.

7.Privacy:-
It ensures that individual has the right to use information and allows another to use that information.

8.Stenography:-
It is an art of hiding the existence of a message. It aids confidentially and integrity of the data.

9.Cryptography:-
It is the science of writing information in a 'hidden' or 'secret' form and an ancient art. It protects the data in transmit and also the data stored on the disk.

Some terms commonly used in cryptography are as follows:-

i. Plain Text:- It is the original message that is an input.

ii. Cipher:-  It is a bit-by-bit or character transformation without regard to the meaning of the messages.
iii. Cipher Text:- It is the coded message or the encrypted data.

iv. Encryption:- It is the process of converting  plain text to cipher text, using an encryption algorithm.

v. Decryption:- It is the reverse of encryption, i.e. converting cipher text to plain text.

Sources of Cyber Attack:-

The most potent and vulnerable threat of computer users is virus attacks. a computer virus is a small software program that spreads from one computer to another computer and that interferes with computer operation. It is imperative  for every computers users to be aware about the software and its program that can help to protect the personal computers from attacks.

The sources of attack can be follow:-

1.Downloadable Programs:-
Downloadable files are one of the best possible sources of virus. Any text of executable like games, screen saver are one of the major sources. If you want to download programs from the Internet then it is necessary to scan every program before downloading them.

2.Cracked Software:-
These software are another source of virus attacks. Such cracked forms of illegal files contain virus and bugs that are difficult to detect as well as to remove.
Hence, it is always a preferable option to download software from the appropriate source.

3.E-mail Attachments:-
These attachments are the most common sources of viruses. You must handle E-mail attachments with extreme care, especially if the E-mail comes from an unknown sender.

4.Internet:-
Majority of all computer users are unaware as when viruses attack computer system. Almost all computer users click or download everything that comes their way and hence unknowingly invites the possibility of virus attacks.

5.Booting from an Unknown CD:-
When the computer system is not working, it is good practice to remove the CD. If you do not remove the CD, it may start to boot automatically from the disk which enhances the possibility of virus attacks.

Lets understand what is Malware?

Malware stands for malicious software. It is a broad term that refers to a variety of malicious programs that are used to damage computer system, gather sensitive information or gain access to private computer systems. It includes computer viruses, worms, trojan horses, rootkits, spyware, adware.

Malware is the collective name for a number of malicious software variants, including viruses, ransomware and spyware. Shorthand for malicious software, malware typically consists of code developed by cyber attackers, designed to cause extensive damage to data and systems or to gain unauthorized access to a network.

Some of them are described below:-

Virus:-

VIRUS stands for Vital Information Resources Under Siege. Computer viruses or perverse software's are small programs that can negatively affects the computer. It obtains control of a PC and directs it to perform unusual and often destructive actions. Viruses are copied itself and programs which further spread the infection. The virus can affect or attack any part of the computer software such as the boot block, operating system, system areas, files and application programs. The first computer virus Creeper created in 1971.

Types Of Virus:-

Some common types of viruses are as follows:-

1.Resident Virus:- It fixes themselves into the system's memory and get activated whenever the operating system runs and infects all the files that are opened. It hides in the RAM and stays there even after the malicious code is executed.
e.g. Randex, Meve etc.

2.Direct Action Virus:- It comes into action when the file containing the virus is executed. It infects files in the folder that are specified in the AUTOEXEC.bat file path. 
e.g. Vienna virus etc.

3.Overwrite Virus:- It deletes the information contained in the files that it infects , rendering them partially or totally useless, once they have been infected.
e.g. Way, Trj.Reboot etc.

4.Boot Sector Virus:- It is also called Master Boot Sector virus or Master Boot Record virus. This type of virus attack the boot sector of a hard disk. Brain was the first PC boot sector virus created in 1986.
e.g. Polyboot.B, AntiEXE etc.

5.Macro Virus:- It infects file that are created using certain applications or programs that contain macros like .doc, .xls, .ppt etc.

6.File System Virus:- It is also called Cluster virus or Directory virus. It infects the directory of the computer by changing the path that indicates the location of the file.
e.g. Dir-2 virus etc.

7.Polymorphic Virus:- It encrypts or encodes itself in a encrypted way , every time it infects a system. This virus then goes on to create a large number of copies.
e.g. Elkern, tuareg etc.

8.FAT Virus:- It is used to store all the information about the location of files, unusable space, etc
e.g. Link virus etc.

9.Multipartite Virus:- It may spread in multiple ways such as the operating system installed or the existence of certain files.
e.g. Flip etc.

10.Web Scripting Virus:- Many websites execute complex code in order to provide interesting content. These sites are sometimes created with with purposely infected code.
e.g. JS Fortnight etc.

Some common viruses are tabulated below:-  

Year      Name  

1971      Creeper

1982      Elk Cloner

1988      The Morris Internet Worm

1999       Melissa

2000       I Love You

2001       Code Red

2003       SQL Slammer

2003       Blaster

2004       Sasser

2010       Stuxnet

2011       Trojan

2012       Rootkit

2014       Generic PUP

2014       Net Worm

2 Comments

If you have any doubts regarding tech or computer related please let me know I will help you