It is also known as Cyber Security or IT Security, Computer security is a branch of information technology known as information security’, which is intended to protect computers.
There are four primary methods to provide protection to computer such as
1. System Access Control
2. Data Access Control
3. System and Security Administration
4. System Design
Sources of Cyber Attack
The most potent and vulnerable threat of computer users is Virus attacks. A computer virus is a small software program that spreads from one computer to another and that interferes with computer operation. The sources of attack can be : (1)Downloadable Programs, (2) Cracked Software, (3) Email Attachments, (4) Internet, (5) Booting from unknown CD
Malware stands for malicious software. It is a broad term that refers to a variety of malicious programs that are used to
damage computer system, gather sensitive information or gain access to private computer systems.
It includes computer virus, worms, trojan horses, rootkits,spyware, adware. etc.
Some Other Threats to Computer Security
There are some other threats to computer security, such as
It is the technique to access the unauthorised data without concerning to the authorised user.
2. Salami Technique
It diverts small amount of money from a large number accounts maintained by the system.
it is an act of intruding into someone else’s computer or network. A hacker is soe who does hacking process.
It is an act of breaking into comput Creaking tools include password crackers. t virus, war-dialers etc.
It is characterised by attempting to fraudulently acquire sensitive information such as a passwords, credit cards details etc.
It is the abuse of messaging systems to send unsolicited bulk message in the form of E-mails. IE is also called junk E-mails.
It is any software package which automatically renders advertisements in order to generate revenue for its author.
It is a type of malware that is designed to gain administrative level control overa computer system without being detected.
Solutions to Computer Security Threats
Some safeguards to protect a computer system from accidental access are
1. Antivirus Software
It is an application software that is designed to prevent, search for, detect and remove viruses and other malicious softwares. e.g
Avast, McAfee, Quick heal, Avg etc.
2. Digital Certificate
It is the attachment to an electronic message used for security purposes.
3. Digital Signature
It is an electronic form of asignature that can be used to authenticate the identity of the sender of a message.
Its primary objective is to control the incoming and outgoing network traffic by analysing the data packets and determining
whether it should be allowed through or not,
based on a predetermined rules.
A firewall also includes or works with a proxy
server that makes network requests on behalf of workstation users.
It is a secret word or a string of characters used for user authentication to prove identity or access approval to gain access to a resources, which should be kept secret from those who are not allowed to get access.
6. File Access Permission
It refers to privileges that allows a user to read, write or execute a file.