ComputersSecurity

Modern Computers, Security & Privacy

Due to computerization, more and more information is transferred to the electronic form. Many of these data are confidential. For example, bank accounts , medical history of diseases, etc. For many reasons, the user does not want his information to be accessible to outsiders. Improving the technologies of access to information and their use carries with it additional and illegal opportunities for unauthorized access. As an example, you can call access to a huge amount of data, computer-wide global networks. Organizations, users and their computers , when connected to such networks, are seriously threatened, lost, modified information.
The threat is that it is difficult to find an attacker in these networks, even if the fact of hacking is detected. The security problem is one of the most important tasks that the OS and software (operating system and software) should solve.

The computer system, in terms of security, should solve three main tasks. A little more detail will be considered below.

1. Confidentiality . The data owner decided that they would be provided to the selected circle of persons, then the system should guarantee that access to such data can not be obtained by persons who are not in this circle.

2. Integrity of the data . Indicates that unauthorized users do not have the right to change data. And only with the permission of the owner, in other words, delete or change those or other data.

3. System availability . It carries with it that nobody can bring the system out of order. Today, the most common way to disable Internet sites are attacks and denial of service. By sending a huge number of requests, the node is not able to perform processing and will eventually be unavailable. This is a DDoS attack. To implement this type of attack requires a considerable number of computers and programs specially made for this.

The security system should ideally provide insurmountable difficulties for possible attempts of unauthorized access. In addition, in such systems, flexible access control methods should be provided to facilitate possible tracking and attempts to access illegally. To date, access to information can be obtained without hacking the system itself, and by stealing, stealing the computer to obtain the necessary information by resorting to bribing employees who have access to this data.

As a result, computers with an ideal security system are not physically feasible. The practical construction of security systems is based on economic expediency.

Similar articles

 

 

 

 

Trending Now

 

 

 

 

Newest

Copyright © 2018 en.delachieve.com. Theme powered by WordPress.