Skip to main content

COMPUTER SECURITY

Our lives have been positively changed by the internet in various ways. Unfortunately, the expansion of security concerns has also been a side effect of this massive network and the technologies it is connected to. Being knowledgeable about accepted cybersecurity procedures is the best method to defend oneself against these risks and attacks.

Computer security, cybersecurity, or information technology security (IT security) is the defence of computer systems and networks against malicious actors who may attack them in order to reveal confidential information, steal or damage hardware, software, or data, or disrupt or reroute the services they offer.


                                                            TYPES

1.Cybersecurity

Protecting our computers, electronic devices, networks, software, and systems from cyberattacks is known as cyber security. assaults that take place while our machine is connected to the Internet are referred to as cyber assaults.

2. Information Security

Information security refers to safeguarding our system's data from theft, unauthorised use, and illegal use. Confidentiality, information integrity, and accessibility are the main goals of information security.

3. Application Security

Ensuring that our applications and data are protected from hacking and that the databases of those applications stay secure and private to the owner only ensures that user information is kept private.

4. Network Security

Network security is the process of securing a network and safeguarding the data of users.

THREATS

1.Viruses

 A malicious programme that is secretly installed on a user's computer is known as a computer virus. It multiplies and contaminates the user's PC's programmes and files. The main objective of a virus is to prevent the victim's computer from ever functioning correctly.

 2. Computer worm

 A computer worm is a piece of software that can autonomously copy itself from one computer to another. Due to a worm's ability to replicate in large quantities and quickly, there is a chance that this will consume all available hard disc space on your computer.

 3. Phishing

 Phishers seek to steal important financial or personal information through phoney email or instant chats by posing as a reliable person or company. Unfortunately, it's incredibly simple to commit phishing. You may enter your personal information since you are led to believe that it is the real mail.

 4. Rootkit

 A rootkit is a type of computer programme that actively conceals its existence while continuing to grant privileged access to a machine. Once a rootkit has been installed, its controller will have access to the host machine's system configurations and the ability to remotely execute files.

 

 FUTURE SCOPE

Today, more than ever, we conduct both our personal and professional lives online, making computer security a crucial concern. Knowing what computer security's future holds will help you use your resources wisely and be safe not only today but also tomorrow. Because of the industry's ongoing evolution in reaction to the changing tactics used by cybercriminals and the fresh threats they create, the future of computer security is difficult to foresee. For instance, the rise in global ransomware hacks (opens in new tab) between 2018 and 2019 led cybersecurity experts and companies to design new tools to buck the trend.

CONCLUSION

Security dangers cannot be eliminated, but you can be aware of them and remain vigilant. To secure people's data and information, many cyber security standards have been developed. These standards also offer some procedures via which people can seek redress if they have been subjected to any kind of cyber security threat.

As cybercrime and computer security risks rise, new defences against them are constantly needed. There is always a need for new techniques to counteract these security problems. It's critical to comprehend how to detect dangerous software on your computer and how to handle it.

 

 

 

Comments

Popular posts from this blog

Pegasus Spyware: Flying Through The Air

 Hundreds of millions of people can't imagine life without their smartphones. Almost every aspect of their daily lives, from the most mundane to the most intimate, is within easy reach and hearing distance of their smartphones. Only few people realize that their phones may be used as surveillance devices, with someone hundreds of miles away secretly extracting their messages, photographs, and location while also activating their microphone and recording them in real time. Such capabilities are present in Pegasus, a spyware produced by NSO Group, an Israeli maker of mass surveillance weapons. What is Pegasus? Pegasus is a hacking software – or spyware – that is developed, marketed and licensed to governments around the world by the Israeli company NSO Group. It has the capability to infect billions of phones using either iOS or Android operating systems. The spyware is named after Pegasus, the white winged horse from Greek mythology. It is named so because it "flies through the...

8 TECH SUPPORT STORIES. A MUST READ!

MOVE THE MOUSE! I asked a user to move her mouse all the way to the right. They picked up the mouse physically and put it on the right side of her desk. RIGHT CLICK! I told the user to right click on the desktop to select properties. She replied that nothing was happening. I asked her again to do the same. She replied with the same answer. When I went to her desk, she had written the word CLICK on a paper on her desk. LAPTOP NOT WORKING! A user was once shouting at me that her laptop was not working even though she hit the keys and tried the touch pad. I run down to her, she shows her laptop still shouting that I wasn’t working properly and couldn’t do my job etc. I look at her laptop, switch it on, turn around and leave the room. OUTAGE PROBLEM! A user once asked if they could download “download the Internet” in case there was a power outage and they could still use it. COMPUTER WON’T TURN ON! Once, a user said that her computer won’t turn on. I asked her to check ...

HOW TO SEE INCOGNITO HISTORY AND DELETE IT

We have heard about private or incognito browsing. It’s the mode that doesn’t store anything in history. While it does store cookies, but are deleted after the session is exited. This mode is known as Incognito browsing in Google Chrome, Private Browsing in Mozilla Firefox, and InPrivate Browsing in Internet Explorer. Whatever we may want to call it, the mode works the same in all browsers. However, sometimes we might want to go back to a page that you previously opened. The question is – can you check your incognito history? Problem is, there is no easy way to go back to that page. So all are search queries we saw is effectively lost. Unless you can Google it up and it shows again. But if it’s not there on the first page of Google, it’s gone forever. But we can still get to know about the websites that have been browsed under the incognito mode. Yes, the private browsing mode has a loophole. You can see the browsing history of someone using incognito mode but only if you h...