Logo

Student Corner

Computer Security

Written by: Avarna Shrestha - 23015, Grade XI

Posted on: 22 October, 2021

Computer technology has grown at break-neck speed in recent years. Today, computers are being used for various purposes. You will find computers being used for accomplishing sophisticated tasks, such as managing entire airline and railway systems, operating air missiles, maintaining customer and employee records and bookkeeping. While there is no question that the new wave of computer technology enhances life for many, it raises questions on security that affect us all. What is computer security? Computer security or cyber security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software or electronic data as well as from the disruption or misdirection of the services they provide.

There are three types of computer security: 
1] Information security is a type of computer security which refers to   protecting the confidentiality, integrity and availability of computer systems from unauthorized access, use, modification and destruction.
Information security focuses on the CIA triad model, which ensures confidentiality, integrity and availability of data, without affecting organization productivity.
2] Internet security is an important aspect of computer security which creates a set of rules and actions to protect computer systems that are connected to the internet. It is a branch of computer security that deals specifically with internet based threats such as hacking, computer virus, Denial-of-service attacks and Malware.
3] Network security is another type of computer security that prevents and protects against unauthorized intrusion into computer networks. It is a set of rules and configurations which are designed to protect the confidentiality, integrity and accessibility of computer networks system and information using both software and hardware technologies.
Talking about the origin of computer security, computer security became increasingly important since the late 1960’s, when modems were introduced. The proliferation of personal computers in the 1980’s compounded the problem because they enabled hackers to illegally.