Types of computer security


 Computer security can be classified into four types 

 

 1. Cyber Security Cyber security means securing our computers, electronic bias, networks, programs, systems from cyber attacks. Cyber attacks are those attacks that be when our system is connected to the Internet. 


 2. Information Security Information security means guarding our system’s information from theft, illegal use and pirating from unauthorized use. Information security has substantially three objects confidentiality, integrity, and vacuity of information. 

 

 3. Application Security Application security means securing our operations and data so that they do n’t get addressed and also the databases of the operations remain safe and private to the proprietor itself so that stoner’s data remains nonpublic. 


 4. Network Security Network security means securing a network and guarding the stoner’s information about who's connected through that network. Over the network hackers steal, the packets of data through Denial of Service, man in the middle attack, war driving, etc, and misuse the data for their benefits. 

 


 Types of cyber attack 

1. Denial of service attack or DOS A denial of service attack is a kind of cyber attack in which the bushwhackers disrupt the services of the particular network by transferring horizonless requests and temporary or permanently making the network or machine coffers unapproachable to the intended followership. 

 

 2. Backdoor In a backdoor attack, malware, trojan steed or contagion gets installed in our system and start affecting it’s security along with the main train. Consider an illustration suppose you're installing free software from a certain website on the Internet. Now, intentionally, along with this software, a vicious train also gets installed, and as soon as you execute the installed software that train’s malware gets affected and starts affecting your computer security. This is known as a backdoor. 

3. Wiretapping Wiretapping refers to intimately harkening to someone’s talk without their authorization or knowledge. Attacks try to steal, manipulate, modify, hack information or systems by passively harkening to network communication, knowing watchwords etc. A physical illustration would be, suppose if you're talking to another person of your association and if a third person listens to your private addresses also he/ she's said to overhear on your discussion. Also, your discussion on the internet perhaps eavesdrops by bushwhackers harkening to your private discussion by connecting to your network if it's unsecure. 

 

 4. Phishing Phishing is pronounced as “ fishing” and working functioning is also analogous. While fishing, we catch fish by soliciting them with bait. Also, in phishing, a stoner is tricked by the bushwhacker who gains the trust of the stoner or acts as if he's a genuine person and also steals the information by jilting. Not only bushwhackers but some certain websites that feel to be genuine, but actually they're fraud spots. These spots trick the druggies and they end up giving their particular information similar as login details or bank details or card number etc. Phishing is of numerous types Voice phishing, textbook phishing etc. 

5. Burlesquing Spoofing is the act of masquerading as a valid reality through falsification of data ( similar as an IP address or username), in order to gain access to information or coffers that one is else unauthorized to gain. Spoofing is of several types- dispatch spoofing, IP address spoofing, MAC spoofing, biometric spoofingetc. 

 

 6. Malware Malware is made up of two terms Vicious Software = Malware. Malware intrudes into the system and is designed to damage our computers. Different types of malware are adware, spyware, ransomware, Trojan steed, etc. 

7. Social engineering Social engineering attack involves manipulating druggies psychologically and rooting nonpublic or sensitive data from them by gaining their trust. The bushwhacker generally exploits the trust of people or druggies by counting on their cognitive base. 

 

 8. Polymorphic Attacks Poly means “ numerous” and transubstantiate means “ form”, polymorphic attacks are those in which bushwhacker adopts multiple forms and changes them so that they aren't honored fluently. These kinds of attacks are delicate to descry due to their changing forms. 


Steps to insure computer security :

 In order to cover our system from the below- mentioned attacks, druggies should take certain way to insure system security.

 1. Always keep your Operating System up to date. Keeping it up to date reduces the threat of their getting attacked by malware, contagions, etc. 


 2. Always use a secure network connection. One should always connect to a secure network. Public wi-fi’s and relaxed networks should be avoided as they're at threat of being attacked by the bushwhacker. 

 

 3. Always install an Antivirus and keep it up to date. An antivirus is software that scans your PC against contagions and isolates the infected train from other system lines so that they do n’t get affected. Also, we should try to go for paid antiviruses as they're more secure. 


 4. Enable firewall. A firewall is a system designed to help unauthorized access to/ from a computer or indeed to a private network of computers. A firewall can be either in tackle, software or a combination of both. 

 

 5. Use strong watchwords. Always make strong watchwords and different watchwords for all social media accounts so that they can not be crucial logged, brute forced or detected fluently using wordbook attacks. A strong word is one that has 16 characters which are a combination of upper case and lower case rudiments, figures and special characters. Also, keep changing your watchwords regularly. 


 6. Do n’t trust someone fluently. You noway know someone’s intention, so do n’t trust someone fluently and end up giving your particular information to them. You do n’t know how they're going to use your information. 

 

 7. Keep your particular information hidden. Do n’t post all your particular information on social media. You noway know who's observing on you. As in the real world, we try to avoid talking to nonnatives and participating anything with them. Also, social media also have people whom you do n’t know and if you partake all your information on it you may end up disquieting yourself. 


 8. Do n’t download attachments that come on withe-mails unless and until you know thate-mail is from a genuine source. Substantially, these attachments contain malware which, upon prosecution infect or harms your system. 

 

 9. Do n’t buy effects online from anywhere. Make sure whenever you're shopping online you're doing so from a well- known website. There are multiple fraud websites that may steal your card information as soon as you checkout and you may get void by them. 


 10. Learn about computer security and ethics. You should be well apprehensive of the safe computing and ethics of the computing world. Gaining applicable knowledge is always helpful in reducing cybercrime. 

 

 11. Still, incontinently inform the cyber cell so that they may take applicable action and also cover others from getting attacked by the same person, If you're attacked. Do n’t vacillate to complain just because you suppose people may make your fun. 


 12. Do n’t use appropriated content. Frequently, people try to download appropriated pictures, vids or web series in order to get them for free. These appropriated content are at major threat of being infected with contagions, worms, or malware, and when you download them you end up compromising your system security. 


Comments