What is Computer Security | Information Security
What is Computer Security:
The meaning of the term computer security has evolved in recent years. Before the problem of data security became widely publicized in the media, most peoples idea of computer security focused on the physical machine. Traditionally, computer facilities have been physically protected for three reasons: To prevent theft of damage to the hardware, information and services. Computer security of IT security is the protection of computer system form theft or damage to there hardware, software or electronic data as well as form disruption or misdirection of the services they provide. It is something referred to as “cyber security” or “IT security”, through these terms generally does not refer to physical security.
Computer Security is the process of preventing and detecting unauthorized use of your computer. It involves the process of safeguarding against intermeddler from using your computer resources for malicious intentions or for their own gains (or even gaining access to them accidentally). Computer security is a branch of Information Security and is often used interchangeably with the term. It encompasses several security measures such as software programs like anti-virus suites, firewalls, and user dependent measures such as activating deactivating certain software features like Java scripts, ActiveX and being vigilant in using the computer and the network resources or the Internet.
What is Information Security:
The term information security can be defined as: Information is a knowledge obtained from investigation, study, instruction, news or facts. Security is freedom from danger, safety, and freedom from fear. Information security means protecting information and information system from unauthorized access, use, disclosure, disruption, modification, or denial of use of knowledge, facts, data or capability.
Information security’s primary focus is the balanced protection of the Confidentiality, Integrity and Availability of data (also known as the CIA triad) while maintaining a focus on efficient policy implementation, all without hampering organization productivity.
High dependence on information as a contributing factor of success or failure, created the need for information security and control. The role of computer networks as an integral part of daily life makes information security critical for individuals and organizations. The amount of personal and corporate information stored on networks, and the variety of threats to that information, combine to form a pressing need for increased protection of that information.
Information Security is concerned with four main areas:
Confidentiality: – It specifies that only authorized user’s sender and the intended recipient should be able to access the content of the message or information.
Integrity: – Only authorized users should be able to modify the data when needed. The confidential information sent by A to B which is accessed by C without the permission or knowledge of A and B.
Availability: – Data should be available to users when needed. Authentication: It helps in establishing proof of identification which you really communicating with whom you think you are communicating with.
more notes for BICT 6th semester click here