Computer and Network Security

Thebestindonesia.com – Network security is a broad term that includes many technologies, devices, and processes. In simplest terms, a network security system recognizes and prevents unauthorized users or persons from entering or accessing a network. The purpose of network security is to anticipate the risk of threats which can be in the form of physical damage to computers or data theft.

Many people try to harm your internet-connected computer, violate your privacy, and steal your data. Given the frequency and variety of existing attacks and the threat of new, more destructive attacks, computer and network security systems have become a central topic. Implementing network security measures enables computers, users, and programs to function in a secure environment.

Network security also ensures the system’s ability to run without any obstacles. However, simply understanding that you need proactive network security support is not enough. Various consequences are your responsibility in the aftermath of a computer network security system breach. This is why computer security on the network is very necessary.

Read also : Communication Network

Devices needed to support computer and network security include:

  • Secrecy Information residing in the computer can only be accessed by parties who have authorization only. The types of access referred to here include printing, displaying, and various exposure forms, including showing the presence of an object.
  • Integrity: Computer system assets can only be modified by authorized parties. The modifications referred to include: writing, changing content, changing status, deleting, and making.
  • Availability: Computer system assets are only made available to authorized parties.

Threat Type

Types of threats to the security of a computer system or computer network can be well characterized by looking at the function of the computer system used to provide information. In general, it can be said that there is a flow of information from information sources in the form of files or certain parts of memory to targets such as other files or certain users. Under normal conditions in the flow of information.

The rest of the figure shows the different categories of threats to the flow of information:

  • Interruption Asset system is damaged, lost, or unusable by the party receiving the information. This is a form of threat to availability. Forms of threats may include the destruction of hardware parts, termination of communication channels, or failure of the file management system.
  • Interception: Unauthorized parties gain access to assets. This is a form of threat to secrecy. The parties that do not have the authority in question can be a particular person, program, or computer.
  • Modifications. Unauthorized parties not only gain access but also change the assets of a system. This is a form of threat to integrity. For example: changing the value of a data file, changing the program so that it changes its function, and modifying the contents of a message sent over the network.
  • Fabrication. Parties who do not have the authority to insert objects that are not allowed into the system. This is also a threat to integrity. For example infiltration of wrong information into the network or adding records to a file.

Computer System Assets

Computer systems can be categorized into hardware, software, data and communication lines, and computer networks. The following are various threats commonly faced by each asset category:

1. Hardware

The main threat to hardware is in the area of availability. Hardware is vulnerable to tampering and is weakest and not easily controlled automatically. Threats that arise against these assets include intentional or accidental device damage, as well as theft. Mass use of PCs, workstations, and computer networks increase the potential for this loss of access. Physical and administrative security measures are required to address these threats.

2. Software

Operating systems, utilities, and application programs are various tools that make computer system hardware useful for both business and individual needs. Some specific threats include removing application programs, changing application functions (including viruses), and illegally copying applications.

3. Data

If software and hardware are more in the interests of computer experts, then data security is more in the interests of users, individuals, groups, and business organizations.

Concerning availability, data security has a lot to do with the problem of destroying data files, whether planned or not. Meanwhile, with secrecy, security issues are mainly related to the problem of reading data files or databases by illegal parties. Included as a threat, in this case, is a statistical analysis by certain foreign parties against a certain amount of data from a very large public database to obtain information regarding the statistical data of certain individuals or parties. For example, if in one database you find data on the total wealth of several respondents A, B, C, and D, and in other data, you find data on the total wealth of respondents A, B, C, D, and E, using these two data you can E.’s wealth can easily be known. Of course, this is a form of threat to the confidentiality of personal data.

Read also : Handling of Signals and Messages in Computer Network 

Computer Networks and Communication Lines Security threats to communication lines and networks can be divided into two general parts: passive and active threats.

The passive threat is a kind of eavesdropping or monitoring the transmission of an organization. The purpose of an eavesdropper is to obtain the information being transmitted. Threats arising from this process are leakage of message content and data analysis traffic.

Leakage of message contents can occur during telephone conversations, sending messages via electronic mail, or data files that contain important information.

Tinggalkan Balasan

Alamat email Anda tidak akan dipublikasikan. Ruas yang wajib ditandai *