Clever Geek Handbook
📜 ⬆️ ⬇️

Computer security

Computer security is a section of information security that characterizes the impossibility of computer damage exceeding the amount of acceptable damage to it from all identified and studied sources of its failures in certain working conditions and for a given time interval.

Cybersecurity is the information security section, within which they study the processes of formation, functioning and evolution of cyberobjects, to identify the sources of cybersecurity resulting from this, to determine their characteristics, as well as their classification and the formation of regulatory documents, the implementation of which should guarantee the protection of cyberobjects from all identified and studied sources of cyber danger.

ATM - an object that needs to be protected by a computer network

Computer security - security measures used to protect computing devices (computers, smartphones and others), as well as computer networks (private and public networks, including the Internet ). The field of activity of system administrators covers all processes and mechanisms by which digital equipment, information field and services are protected from accidental or unauthorized access, modification or destruction of data, and is becoming increasingly important due to the growing dependence on computer systems in a developed community [1 ] .

Cybersecurity is the process of using security measures to ensure the confidentiality, integrity and availability of data. The system administrator provides protection of assets, including data on the local network of computers and servers. In addition, the buildings and, most importantly, the personnel are taken under direct protection. The goal of ensuring cybersecurity is to protect data (both during transmission and / or exchange and in storage). In order to ensure data security, countermeasures can also be applied. Some of these measures include (but are not limited to) access control, staff training, auditing and reporting, probable risk assessment, penetration testing, and authorization requirements [2] .

Now, in some countries, cybersecurity training is planned from the school bench. So, in the UK, schoolchildren are offered cybersecurity lessons in which they will learn skills to ensure the safety of British companies and organizations from network attacks by hackers. The curriculum is developed by the UK Department of Culture, Media and Sports. The lessons are planned to be implemented both in the online form and in the form of extracurricular activities, which will be held four times a week and conducted by expert teachers. Students will look at the real issues of cybersecurity and how to solve them. The program is aimed at students aged 14 to 18 years. The first trial classes are scheduled for September 2017. [3]

Content

Computer Protection

The “security” state of a computer is a conceptual ideal achieved by using three processes: threat prevention, detection, and response. These processes are based on various policies and system components, which include the following:

  • User account access controls and cryptography can protect system files and data, respectively.
  • Today, firewalls are the most common preventive systems in terms of network security, because they can (if properly configured) protect access to internal network services and block certain types of attacks through packet filtering. Firewalls can be either hardware or software.
  • Intrusion Detection Systems (IDS) are designed to detect network attacks during the development process and assist in forensics after an attack, while audit trails perform a similar function for individual systems. A “response” is necessarily determined by the assessed security requirements of a particular system and can range from a simple security update to legal notice. In some special cases, it is best to destroy a compromised system, as it may happen that not all vulnerable resources are discovered.

Cybersecurity Tips

  • carefully check the address bar so as not to get to the attacker's site
  • use antivirus software and regularly update software
  • beware of phishing (a type of online fraud whose purpose is to gain access to confidential user data - logins and passwords.)
  • identify vulnerable applications and disable them

See also

  • Information Security

Notes

  1. ↑ “Reliance spells end of road for ICT amateurs”, May 07, 2013, The Australian
  2. ↑ Cybersecurity: Understanding the Online Threat
  3. ↑ British high school students will be taught cybersecurity , TheUK.one .

Links

  • Top: Computers: Security
Source - https://ru.wikipedia.org/w/index.php?title= Computer Security&oldid = 97061023


More articles:

  • The Battle of Assinar
  • De Villalonga, Jose Luis
  • Roc Nation
  • Lydian-Miletus War
  • Gilliam Seth
  • Ge, Petr Nikolaevich
  • Spassky, Alexey Andreevich
  • Soltau, Wilfried
  • Haunstoft Finn
  • Deunter Johan Henrik

All articles

Clever Geek | 2019