ARTICLES

urplus Computers and Discount Computers Are New...

  After the best sourced advice relating to...

 Digital Cameras Are Fun

 You may have found the best assistance with ref...

 COMPUTER BACKUPS

 Computer Accessories We All Want For Our New Co...

 Computer Hardware Preventive Maintenance Softwa...

 Advice about the best sourced advice relating t...

 Computer Rental: Worth Your Money?

 What is a refurbished computer?

  Advice about the most informative opinion...

 Computer Rentals: The Best Classroom Computer T...

 Are you in search of the most up-to-date assist...

 Have you been looking for the most up-to-date a...

 Finding Cheap Computer Deals to Upgrade Your Co...

 Looking for the latest opinion regarding comput...

  You may have found the latest advice pert...

 When To Rent A Laptop Computer

  If you are chasing the latest help in re...

  You may have found the best sourced opini...

 What You Should Know Before Buying Computer Equ...

 Seeking the most informative advice pertaining ...

  Seeking the best assistance in relation t...

  Looking for the best sourced help regardi...

 What Is Adware?

 Advice about the latest and accurate help conce...

 A Guide To Basic Computer Terminology

 Choosing the best computer model

 You may have found the latest and accurate help...

 Buying a computer

 Top 10 Ways To Protect Yourself From Computer V...

 Building Cheap Computers in 3 Easy Steps

  Have you been looking for the best assist...

 Why Do I Need Anti Virus Software For My Computer?

 Buying a Personal Computer

 Why You Need To Clean Your Windows Registry?

 3 Simple Ways To Save A Bunch Of Money When Buy...

 What are Rackmount Computers? -

 Searching for the latest and accurate help rela...

 Decide On A PC Monitor Before You Buy Your New ...

 Computer Components for Idiots

 5 Sure-Fire Tips for Buying a New Computer

 Advice about the most up-to-date advice with re...

 Three Things You Can Do to Keep Your Computer R...

 The Need for Rackmount Computer Cases -

 A Basic Introduction To Spyware

 Zone Labs vs. Windows XP Service Pack 2 Firewall

 Barebones Systems: Alternatives to Buying Disco...

 Hateful and annoying spywares. Have they infect...

 PC Maintenance and Improving Performance

 Rackmount Computer Keyboards -

 Use A Spyware Remover Now

 Computer Security - What Exactly Is It?

 Three Basic Types Of Computer Mouse

 How to Increase Your Computer Speed Fast

 So You've Never Used A Computer Mouse Before?

 Do The Media Spread Computer Viruses?

 Tips for Buying a First Computer

 The Difference Between Spyware and Viruses

 Do You Know How To Remove Spyware From Your Com...

 Keeping it Clean: Virus Removal Basics

 Notebook or Desktop Computer -- Which Should Yo...

 You Need a Spyware Remover!

 3 Summer Computer Tips

 Ever Used A Computer Mouse Before?

 Computers Are Not Scary

 Build Your Own Computer or Buy?

 Data-Recovery: What You Need

 Advancement in Computer Technology

 Network Security 101

Traditional Antivirus Programs Useless Against ...

 Computer Learning Center for Kids is Committed ...

 Looking after your Computer

 The ABCs Of Computer Memory

 Spyware Programs Are Out To Get You

 Access Your PC From The Road

 What kind of processor do you need on your new ...

 Registry Cleaners: Why do you need one?

 Are They Watching You Online?

 Crash Course In Getting A #1 Google Ranking

 Understanding the Components of a Home Network

 Eliminate computer viruses forever!

 Is Spyware Slowing Your Computer Down To A Crawl?

 Computer Network Installation

 Protect Your Computer And Your Personal Informa...

 Spyware and Adware – Are You Protected?

 How to Avoid Getting Ripped-Off Online

 Getting The Most Out Of A Tablet PC

 How To Remove Winfixer 2005 Plus Unwanted Spywa...

 Guide to buying the perfect PC

 Internet Security Basics 101

 Why Hide Your IP Address?

 Wireless Networks: How Do They Work?

 How Spyware Blaster Can Protect Your Computer F...

 All About Computer Viruses

 Do you need computer training?

 Malware Quiz


Computer Security - What Exactly Is It?
by: Ciontescu Molie
Although the term 'computer security' is used a lot, the content of a computer is actually vulnerable to only a few risks unless the computer is connected to others on a network. As the use of computer networks (especially the Internet) has increased dramatically during the past few years, the term computer security is now used to describe issues referring to the networked use of computers and their resources.

The major technical areas of computer security are confidentiality, integrity and authentication/availability.
- Confidentiality, also known as secrecy or privacy, means that the information you own cannot be accessed by unauthorized parties. Breaches of confidentiality range from the embarrassing to the disastrous.
- Integrity means that your information is protected against unauthorized changes that are undetectable to authorized users. The integrity of databases and other resources are usually compromised through hacking.
- Authentication means that an user is who he claims to be.
- Availability means that the resources are accessible by authorized parties. Examples of availability attacks are the 'denial of service' attacks.

Other important things that the computer security professionals are concerned about are access control and nonrepudiation. Access control refer not only to the fact that users can only access the resources and services they are entitled to, but also to the fact that they can't be denied to access the resources they legitimately expect. Nonrepudiation means that a person who sends a message cannot deny he sent it and vice versa.

In addition to these technical aspects, the concept of computer security is very large. Computer security's roots are drawn from disciplines like ethics and risk analysis and the major topics that are concerning it are computer crime (tries to prevent, detect and remedy attacks) and identity/anonymity in cyberspace.

Although confidentiality, integrity and authenticity are the most important things when it comes to computer security in general, for everyday internet users, privacy is the most important one, because many people think that they have nothing to hide or the information they give doesn't seem sensitive when they register with an internet service/site.

But remember that, on the internet, information is very easily shared among companies and small pieces of related information from different sources can be linked together to form something alot more complex about a person. Because of this, nowadays, the ability to maintain control over what information is collected about them, who may use it and how it can be used is extremely important.

About the author:

For information and resources on network, computer security, hackers, vulnerabilities, patches, advisories, and more visit http://www.itfreaks.com


Circulated by Article Emporium

 

Google

DISCLAIMER: The content of the site is not produced be me. These are articles i have got from the internet from the various websites. These articles are under GPL license. So I have used these articles without modification

. However, I am NOT responsible for any damages arising due to use of information from this website.
In case you find some incorrect information, then please report that immediately at pctipsntricks@gmail.com