WHAT IS COMPUTER SYSTEM SECURITY ?

WHAT IS COMPUTER SECURITY?

As you probably are aware security intends to offer insurance to our PC framework.

Basically the work of system security is to provide protection to our sensitive data and protect from, threads and unauthorized persons.

PC security additionally give assurance to our information which is put away in memory for sometime later.

WHY WE NEED COMPUTER SYSTEM SECURITY?

In today’s world everyone want to keep their data save and private through which no one can steal their data and personal information like your personal photographs ,password ,information ,identity,etc.

And what will happen if anyone is watching your all the activity?

That’s why we need computer system security.

HOW WE CAN PROTECT OUR PRIVACY THROUGH SYSTEM SECURITY?

  • It protects our personal data and important information from unauthorized user and hacker.
  • It also protect our computer system from viruses which is harmful for our system and data which is stored in memory for future use.
  • It protects our system and allow user to run programs in quicker and smoother way.
  • It maintain our computer system health.

WHAT ARE GOALS OF SYSTEM SECURITY?

1.Confidentiality

When two system is connected with one another and one system sends message to other system without accessing this message from an unauthorized person. This process is known as confidentiality.

In this process,  when a user send message to other at this time this message is access by only those who are allowed by the user to see this and who are disallowed by the user to see the message not able to see this and read the content of this message.

Data encryption is good example of confidentiality. By this process user also prevent our data from reaching to wrong people while making sure that the right people can get it or not.

TOOLS FOR CONFIDENTIALITY

1.Encryption

2.Access Control

3.Authentication

4.Authorization

2.Integrity

When one system send a message to another system and this message reached to another system and this message reached to another system with no adjustment in their content.This procedure is known as uprightness.

TOOL FOR INTEGRITY

1.Backups

2.Checksums

3.Availability

4.Data Correcting Codes

3.Availability

In this process, data is always present in a system for authorized user for accessing this data and do their work on the system

WHAT ARE ATTACKS IN COMPUTER SYSTEM SECURITY?

An assault is a data security danger that includes an endeavor to acquire, modify, devastate, expel, embed or uncover data without approved access or consent. It happens to the two people and associations. There are a wide range of sorts of assaults, including yet not restricted to aloof, dynamic, directed, click jacking, brand jacking, botnet, phishing, spamming, inside and outside.

TYPES OF ATTACK IN COMPUTER SYSTEM SECURITY

1.Active Attack

2.Passive Attack

ACTIVE ATTACK

In this attack, a person read your message, change your message and also sent your message to other.

This attack alter or change system resource or effect operations. Active attack involve modification of data stream or creation of false statement.

TYPES OF ACTIVE ATTACK

1.Masquerade:- Sending message to other after changing your identity.

2.Replay:– Sending old message to other by programmer over and over. 3.Modification of message:- Changing the originality of message comes under modification of message

PASSIVE ATTACK

In this attack, a person only read your message and nothing else.

This assault may learn or utilize message and information from the framework however not impact the framework assets.

TYPES OF PASSIVE ATTACK

1.Release of message content:- In this, content of message only after hacking our password.

2.Traffic analysis:- In this, length of message being checked and analyze from where the message is sent.

CRYPTOGRAPHY in System Security

What is CRYPTOGRAPHY?

Crypt means “hidden” and graphy means “writing”.

When a person (R1) send a message to another person (R2) then this message is not read by thir person (R3),for this we have to send message in encrypted form to person (R2) and when message reached to person (R3) it is decrypted by read this content of message. This process is known as cryptography.

And it is also a method of protecting the content of message and information by using suitable codes so those only those person read the content of message and information to which user want to send the message and information.

TYPES OF CRYPTOGRAPHY

1.Symmetric Key Cryptography

In this cryptography only one key is used in decryption as well as in encryption part and this key is known as secret key. That is the reason symmetric key cryptography otherwise called mystery key cryptography.Symmetric key is a kind of key wherein the single regular key is utilized by both sender and the collector with the end goal of encryption and unscrambling of a message.

2.Asymmetric Key Cryptography

In this cryptography two key is used in encryption as well as in decryption. Open key is utilized in encryption part and private key is utilized in unscrambling part. Kinds of lopsided key cryptography are RSA, PKCs, Curve methods.

3.Hashing

Hashing is generating a value or values from a string of text using a mathematical function.

Hashing is one way to enable security during the process of message transmission when the message is intended for a particular receiptent only.

It is also a method of sorting key values in a database table in an efficient manner.

CRYPTOLOGY

Cryptology is the combination of cryptography and cryptanalysis. Cryptology is like a subject in which two topic is include that is cryptography and cryptanalysis.

The art of secure message that is cryptography and breaking them is cryptanalysis is collectively known as cryptology.

CRYPTANALYSIS

The craftsmanship or procedure of unscrambling of coded message without being told the key is known as cryptanalysis.

Thank you!

1
Leave a Reply

avatar
1 Comment threads
0 Thread replies
0 Followers
 
Most reacted comment
Hottest comment thread
0 Comment authors
Recent comment authors
  Subscribe  
newest oldest most voted
Notify of
trackback

[…] System Security […]