Computer Security

It is the protection of the computing systems and the information stored in it against theft or damage. Once a system is connected to a network it is vulnerable to intruders’ breaches. Some of the types of invasion include:

#Backdoor: it is unauthorized access to the computer via programs or debugging features by avoiding normal authentication.

#Denial-of-service attack: Though it does not necessarily access data on other computers, its main purpose is to slow down the processes, especially blocking the users from using internet.

#Direct-access attack: it is an unauthorized remote access using Key loggers/computer worms, and can download huge amount of sensitive data.

#Eavesdropping: using tools like network snifflers help hackers to retrieve password and other confidential paperwork.

#Spoofing: Gaining unauthorised access to a computer by sending message from an IP address that seems trusted.

#Tampering: unauthorized access to a computer to intentionally delete or modify data in it.

#Privilege escalation: exploiting a bug or a flaw in a program or operation to have unauthorized access to resources that are usually not made available to users.

#Phishing: acquiring sensitive personal information from users by asking them directly, often under the pretence of a reputed company via the web.

#Social Engineering and Trojans: Trojans are malwares that cannot replicate itself and can only access user’s computers via Internet. Trojans are usually in the guise of “good” harmless software and it is very hard to determine a particular Trojan’s underlying purpose from the exterior.

To ensure computers are safe from the above attacks, it is important to be aware of the future of Computer Security and its limitations. And therefore we need to look at how Computer Security helps us remove the bugs from our computers.

Some common forms of computer protection include:

#Reducing vulnerabilities: Users can keep all software updated, secure browsers and use strong passwords.

#Security by design: this measure is usually taken by the developers by ensuring the utmost protection in the design of hardware and software through good programming practices, continuous checking and authentication safeguards

#Security architecture

#Hardware protection mechanisms: prevents tampering and unauthorized access of data

#Secure Operating systems

#Secure coding : Developing software in such a way that it can protect the program from security risks

#Capabilities and access control lists

#Response to breaches

Questions

#What aspect of CS is applied to security by design and architecture?

#To what extent can a user control the possibility of getting breaches in the system?

#How can we make our own security architecture?

Useful links below:

Knowing more about the different types of psychological factors>

How veracode establishes computer security

How to make Computers Secure?