Skip to content
Related Articles

Related Articles

Improve Article
Computer Security and its Challenges
  • Last Updated : 10 Jul, 2020

There are three main objectives of computer security, which are also referred has CIA triads.

  1. Confidentiality
  2. Integrity
  3. Availability

1. Confidentiality :

  • Data confidentiality –
    It is a property which ensures that any private information that can be harmful if it is disclosed to any unauthorised person should only be disclosed to a legit authorization so that no one can take advantage of someone’s personal information.
  • Privacy –
    It is the property of the digital world that ensures that one can have the right that any information which is related to them should be stored by whomsoever they want and no other person should look through their information of share their without their consent. If information is shared without the consent it is a breach of privacy which is a punishable offence.

2. Integrity :

  • Data integrity –
    It ensures that the system and information is changed in the way that user want and it is not breached by any third party with an intent to harm.
  • System integrity –
    This ensures that the system should work in the manner as it is designed to perform and its performance is not manipulated by anyone else, that is any third party which manipulated the system to work according to their wishes rather than the users.

3. Availability :
This ensures that system should work fine and should denied access to an authorized user.

Computer Security Challenges :

  1. Security is not simple it requires a lot of research and mone.y
  2. Potential attacks on the security features need to be considered.
  3. Procedures used to provide particular services are often counter-intuitive.
  4. It is necessary to decide where to use the various security mechanisms.
  5. Requires constant monitoring.
  6. Security mechanisms typically involve more than a particular algorithm or protocol.
  7. Security is essentially a battle of wits between a perpetrator and the designer.
  8. Little benefit from security investment is perceived until a security failure occurs.
  9. Strong security is often viewed as an impediment to efficient and user-friendly operation.

Attention reader! Don’t stop learning now. Get hold of all the important CS Theory concepts for SDE interviews with the CS Theory Course at a student-friendly price and become industry ready.


My Personal Notes arrow_drop_up
Recommended Articles
Page :