Computer

Cyber Security With Protection And Impact

Cyber Security

Cyber Security With Protection And Impact-:Computer security is also known as Cyber Security or IT security. Computer security is a branch of information technology known as Information Security. Which is intended to protect computers. It is the protection of computing systems and the data that they store or access. 

Due to the wide spread use of PCs and developments in networks connecting PCs to company’s Mainframe computers, there has been an increase in the chances of feeding undesirable data deliberately by outsiders. A person with a PC at a remote place can use a phone line and illegally collect information without leaving any clues. Individual users can copy confidential data from a company’s computer or other details from a remote station connected via a communication network. 

The collection of tools designed to protect data thwart hackers is known as computer security

Cyber security involves protecting information and systems from major cyber threats, such as cyber terrorism, cyber warfare and cyber espionage. 

Ensuring cyber security requires coordinated efforts throughout the information system. 

The cyber security specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to software to the human computer interface, with the use of cryptography to secure interactions. 

Methods to Provide Protection 

There are four primary methods to provide protection 

  1. System Access Control It ensures that unauthorized users to be cyber security conscious. 
  2. Data Access Control It monitors who can access what data, and for what purpose. Your systems might support mandatory access control with these. The system determines access rules based on the security levels of the people, the files, and the other objects in your systems. 
  3. System and Security Administration It performs offline procedures that makes or breaks secure security. 
  4. System Design It takes advantage of basic hardware and software security characteristics. 

Need of Cyber Security 

The classic model for information security defines three objective of security:These objective are:

Confidentiality 
Confidentiality

It refers to protecting information from being accessed by unauthorized parties. In other words, only the people who are authorised to do so can gain access to sensitive data. 

Integrity
Integrity

It refers to ensuring the authenticity of information that is not altered and source of the information is genuine. 

Sensitive data should not be altered in transit and security measures such as file permissions and user access controls, should be taken to make sure that it cannot be modified by unauthorized users. 

Availability 
availability

It is the guarantee of reliable and constant access to your sensitive data by authorized people. 

It is best guaranteed by properly maintaining all hardwares and software necessary to ensure the availability of sensitive data. It is also important to keep up with system upgrades. 

Privacy 
Privacy

It ensures that individual has the right to use the Information and allows another to use that information. 

Stenography 
Stenography

It is an art of hiding the existence of a message. It aids confidentiality and integrity of the data. 

Cryptography
Cryptography

It is the science of writing information in a ‘hidden ‘ or ‘secret’ form and is an ancient art. It protects the data in transmit and also the data stored on the disk. 

Types of Computer Virus

  1. Trojan Virus 
  2. Worms Virus 
  3. Boot sector Virus 
  4. Macro Virus 
  5. Memory Resident Viruses 
  6. Root kit Virus 
  7. Polymorphic Virus 
  8. Logic Bombs / Time Bombs 
  9. File system Virus
  10. FAT Virus 
  11. Overwrite Virus 
  12. Direct action Virus
  13. Resident Virus 
  14. Web Scripting Virus 
  15. Multipartite Virus 

Effect of Computer Virus

There are many different effect that viruses can have on your computer depending on the types of virus some virus can.

  1. Monitor what you are doing.
  2. Slow down your computer performance.
  3. Destroy all data on your local disk.
  4. Effect on computer network and the connection to internet.
  5. Increase or decrease memory size.
  6. Display different types of error message.
  7. Decrease partition size.
  8. Alter PC setting.
  9. Display arrays of annoying advertising.
  10. Extend boot Times.
  11. Create more than one partition

Some popular Antivirus Software:-

  1. Avast 
  2. K7
  3. Trend Micro 
  4. Symantec
  5. McAfee
  6. Avg 
  7. Kaspersky
  8. Quick Heal 
  9. Nortan

Password protect your software and blocks your device:- Most web connected software that you can install on your system require login credential the most important thing there is not to use the same password across all application this makes it far to easy for someone to hack into all of your account and possibly still your identity if your device or lost or stolen they can grant other access to sensitive data hackers can even turn your own hardware into a liabilities so you can secure your device with strong security password use upper case lower case and numerical character for a more secure password fix something unexpected that makes and to you but nobody else that will make it nearly impossible to guess.

File Access Permission 

  1. Read Permission If you have read permission of a file, you can only see the contents. 
  2. Write Permission If you have write a permission of a file, you can only modify or remove the contents of a file. 
  3. Execute Permission If you have execute permission of a file, you can only execute a file 
Terms Related to security
  1. Eavesdropping The attacker monitors transmissions for message content. 
  2. Masquerading The attacker impersonates an authorised user and thereby gain certain unauthorized privilege. 
  3. Patches It is a piece of software designed to fix problems with a computer program or it’s supporting data. 
  4. Logic Bomb It is a piece of code intentionally inserted into a computer memory that will set off a malicious function when specified conditions are met. 
  5. Time bomb It is a piece of software, that is used to the explode at a particular time. 
  6. Application Gateway The applies security mechanisms to specific applications such as File Transfer Protocol (FTP). 
  7. Proxy Server It can act as a firewall by responding to inputs packets in a manners of an application while blocking other packets. 

You can also join us at QUORA

About the author

Pooja Rastogi

Leave a Comment