COMPUTER SECURITY: TYPE AND PREVENTION
- Get link
- Other Apps
Before describing the different types of computer security, it is essential to define the concept of computer security.
This concept refers to the areas of development and research
in infrastructure computing, safe for storing information on computers and
during transmission over networks.
Due to the immensity of risks that Internet connections entail,
security has become a concept that not only implies the quality of the systems
and services, but also the prestige of the companies that provide them.
The objective is to prevent communications from being
unprotected against possible loss or interception of data.
Computer security will always be in development and threats to
them proliferate day by day
Currently, practically all organizations depend to a greater
or lesser extent on computer systems. Therefore, the development of security is
carried out constantly. The different types of computer security are:
Hardware
security
This type of security has to do with the devices that are used
to scan a system or to control the traffic of a network. Examples include
hardware firewalls and proxy servers.
But you can also find hardware security modules. Which serve
to supply encrypted keys and intended for critical level functions such as
encryption, decryption and authentication for various types of systems.
Of all the types of computer security, security systems of
this type are those that provide the highest and most robust levels of
protection. In addition, they can also serve as an additional layer of security
for critical systems.
The objective is to prevent communications from being
unprotected against possible loss or interception of data.
Hardware security, however, also refers to the applications
with which computers and devices can be protected from any type of damage.
If it is necessary to evaluate the security of a computer's
hardware, it is essential to have the vulnerabilities that appear since its
manufacture, and to evaluate other potential sources of risk. For example, the
characteristics of the code that run in the programs on the hardware and for
the information input and output devices that connect to the network.
Software
security
This type of security is the one that is put into practice to
protect programs and applications and programs against attacks by computer
criminals and other types of risks, so that any type of software continues to
function correctly and efficiently despite to the existence of such risks.
It is necessary to guarantee data integrity, authentication of
the same and its constant availability. It is a field of computer security that
is considered new. Well, the first documents and academic classes that were
held on the subject appeared from the year 2001.
In other words, developers, program and application
architects, and computer scientists have been working on secure software
development methods for relatively recently.
Software problems involve several ramifications in the study
of security. Such as errors in implementation, buffer overflows, design defects
or poor response to possible errors, among other problems.
Too often malicious intruders try to break into computer
systems using precisely the vulnerabilities described in the software.
Despite everything, malicious intruders try to break into
computer systems using precisely the vulnerabilities described in the software.
Therefore, any application that has an Internet connection outlet presents
added risks, which imply the adoption of higher security levels.
Security gaps for software are more common in such cases, and
the problem continues to grow with the increase in users and computer
criminals.
Security for software seeks to take advantage of development
engineering practices and the implementation of protection measures, from the
beginning of the life cycles for any program or application.
Network
security
This area of computer security refers to any activity whose
purpose is the protection of a network. This is to promote ease of use,
increase reliability, preserve integrity and maintain security for the
transmission of all data.
An effective network security model is directed against a
number of threats and against the methods by which connected devices are
introduced or spread.
Threat Types
There are many types of threats to networks, and most of them
spread from the Internet. Among the most common are:
· Viruses,
worms and Trojan horse programs.
· Attacks
by computer criminals or hackers.
· Invasive
propaganda and spyware.
· Zero-day
or zero-hour attacks.
· Theft of
data or interception of the same in communications.
· Denial of
service attacks.
· Theft of
personal data and identity.
There are no one-size-fits-all solutions for various types of
threats, so multiple levels of security are always required when dealing with
networks. In this way, if one of the security levels is breached, the others
can stop the threat.
For this, it is recommended that the software is constantly
updated, to ensure that it protects itself from any innovation in computer
threats.
Typically, network security mechanisms are made up of a
multitude of components, and the ideal scenario is one in which they all work
synergistically to minimize maintenance and keep protection levels high.
Computer Security Components
They correspond to the following types:
· Programs antivirus and
antispyware.
· Firewalls
or firewall, which block unauthorized access to a network.
· Intrusion
Prevention Models or IPS, which identify fast-spreading threats, such as
zero-day or zero-hour attacks.
· Design of
virtual private networks or VPN, which provide a remote and secure access
system for local systems.
· The types
of computer security will always be kept in development. Because the innovation
in technology of the equipment and its connection to the Internet are constant,
and the threats to them proliferate day by day.
- Get link
- Other Apps
Comments
Post a Comment