×
☰ Menu

Computer System Security

Technology is growing every day and as it grows, it transforms our digital world. Internet use is increasing exponentially, making us correspondingly more vulnerable to cyber-attacks. By learning how cybercriminals attack and how to secure our systems and data from those attacks, you will be able to minimize the risk of data breaches and the devastation they bring. We can understand the terms below:

Computer

A computer is a machine or device that does tasks, calculations, and operations based on instructions from a software or hardware program. It can take in data (inputs), process them, and then give out outputs. Computers can also store data for later use in the right places, and they can get that data back when they need to. The English word "compute" comes from the Latin word "computer," which means "math, accounting." The computer is used to follow a set of instructions quickly and correctly. The keyboard, mouse, joystick, scanner, and other input devices like these are used to send digitized data to the computer. It works based on the instructions in the program to give output.

System

In general, a system is a well-organized group of parts (called subsystems) that work well together to reach a larger goal. The system has different inputs that go through different processes to make different outputs. Together, these outputs help the system reach its overall goal. It is a set of components that work together to collect, store, and process data, as well as provide information, knowledge, and digital products. There are a lot of different kinds of systems. For example, the information system, biological systems (like the heart), mechanical systems (like a thermostat), human/mechanical systems (like riding a bike), ecological systems (like predator/prey), and social systems (like a family) are all examples of systems (for example, groups, supply and demand and also friendship).

Security

Security is the state of not being in danger or being threatened. IT security refers to the methods, tools, and people that an organization uses to protect its digital assets. The goal of IT security is to keep unauthorized users, also called "threat actors," from messing with, stealing, or using these assets, devices, and services.

 

The security measures for computer information and access are meant to protect against four major risks:

  1. Theft of data, such as military secrets from government computers;
  2. Vandalism, such as the destruction of data by a computer virus;
  3. Fraud, such as bank employees putting money into their own accounts;
  4. Invasion of privacy, such as the illegal accessing of protected personal financial or medical data from a large database.

 

The security of a system can be threatened via two violations:

Threat: A program that has the potential to cause serious damage to the system.
Attack: An attempt to break security and make unauthorized use of an asset.