The system needs to be secured from various perspectives :
- Hardware and software of the system needs to be secured from unauthorized access. Illegal use of processors, main memory and storage devices lead to loss or destruction of data Software need to be protected so that programs are not manipulated and the data can retain its confidentiality and integrity.
- System needs to be secured from malicious programs like virus, worms.
- Unauthorized persons or attackers can crack the system security by hacking.
Let us now examine the various angles that need special attention in terms of security –
- Hardware Vs Software
- Unauthorized use Vs Denial of Service.
1. Hardware Vs Software :
- Computer System uses various hardware and software resource.
- Security needs to be ensured for various hardware resources like processors, main memory and secondary storage device.
- Illegal access to main memory or secondary storage can lead to loss or unwanted change of data.
- Data contained in files, programs and various system components such as page table, stack, queues can be read, modified, leaked or destroyed.
2. Unauthorized use Vs Denial of Service (DoS) :
From user point of view, security problems may be classified into two types –
- Unauthorized use of service : when any person who has no authority or right to use a resource is called unauthorized use.
- It includes activities such as using another person’s computer to check mails, using another person’s account to gain access to the system, making copies of copyright software etc.
- In Denial of service authorized user is unable to use its own resources. It may include preventing access to the system, slowing down the system with unwanted process or messages, bringing down the network etc.
- DoS attacks usually do not aim at crack of security. Rather, they are focused on making services unavailable to genuine users resulting in loss of time and money.
Attention reader! Don’t stop learning now. Get hold of all the important CS Theory concepts for SDE interviews with the CS Theory Course at a student-friendly price and become industry ready.
- Difference between Network Security and Cyber Security
- Difference between Information Security and Network Security
- Difference between Cyber Security and Information Security
- Principal of Information System Security : Security System Development Life Cycle
- Network Security
- Cryptography and Network Security Principles
- Information Security and Computer Forensics
- Computer Security and its Challenges
- CAINE Forensic Environment
- Access Control in Computer Network
- Authentication in Computer Network
- What is Information Security?
- Active and Passive attacks in Information Security
- Threats to Information Security
- Risk Management for Information Security | Set-1
- Risk Management for Information Security | Set-2
- System Security
- Privacy and Security in online social media
- Futuristic Solution to Privacy and Security in online social media
- Information System and Security
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to firstname.lastname@example.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.