Search Header Logo
Computer Security

Computer Security

Assessment

Presentation

Computers

University

Hard

Created by

Muhammad Sadiq

FREE Resource

13 Slides • 0 Questions

1

media

COMPUTER SECURITY

2

media

COMPUTERSECURITYISACRITICALASPECTOF

MODERNTECHNOLOGYTHATFOCUSESONPROTECTING

COMPUTERSYSTEMS, NETWORKS, ANDDATAFROM

UNAUTHORIZEDACCESS, DAMAGE, ORDISRUPTION.

CIA, IN THE CONTEXT OF COMPUTER SECURITY,

STANDS FOR CONFIDENTIALITY, INTEGRITY, AND
AVAILABILITY.

DEFINITION

3

media

CIA, IN THE CONTEXT OF COMPUTER SECURITY,

STANDS

FOR CONFIDENTIALITY, INTEGRITY,
AND

AVAILABILITY. IT IS A FOUNDATIONAL CONCEPT THAT

HELPS ORGANIZATIONS IDENTIFY AND IMPLEMENT

APPROPRIATE

SECURITY

CONTROLS

TO

PROTECT

AGAINST UNAUTHORIZED ACCESS, DATA BREACHES,

UNAUTHORIZED

MODIFICATIONS,
AND

SERVICE

DISRUPTIONS.

ITS MAIN ELEMENTS ARE:

DEFINITION OF CIA

4

media

CONFIDENTIALITY

Confidentiality focuses on keeping sensitive or

classified information private and accessible only
to authorized individuals or entities.

Ensures that information remains confidential

and is not disclosed to unauthorized parties.

Encryption, access controls, user authentication,

and

secure

communication

protocols

are

commonly employed to maintain confidentiality.

5

media

INTEGRITY

Integrity ensures the trustworthiness, accuracy, and

guarantees that data remains unaltered and retains its
intended state and meaning.

Data

integrity

measures

focus

on

preventing

unauthorized modifications, deletions, or corruption
of data.

Techniques such as checksums, hashing algorithms,

digital signatures, and access controls are used to
ensure data integrity.

6

media

AVAILABILITY

Availability ensures that computer systems, resources,

and services are accessible when needed even if there is
a security breach.

Availability

measures

include

redundancy,

fault

tolerance, backup and recovery mechanisms, and disaster
recovery plans.

These measures ensure that systems can recover quickly

from failures or incidents, allowing users to access
resources and perform their tasks without interruptions

7

media

TYPES OF COMPUTER SECURITY

Here are a few types of computer security tactics
that are used widely for the protection of software,
hardware, electronic data, and network in computer
systems.
Application Security
Information Security
Network Security
Endpoint Security
Internet Security

8

media

APPLICATION SECURITY

Application security is the introduction of security
features in applications during their development
process.

Some examples of application security tools are
antivirus software, firewalls, web application
firewalls, encryption, etc.

9

media

INFORMATION SECURITY

Information security is a set of practices that aim to
protect the confidentiality, integrity, and availability
(known as the CIA triad) of data from unauthorized
access and misuse.

10

media

NETWORK SECURITY

Network security is any activity that aims to
protect the integrity and usability of a network and
data. It consists of both hardware and software
technologies that are specifically designed to
prevent unauthorized intrusion into computer
systems and networks

11

media

ENDPOINT SECURITY

Endpoint security, like endpoint detection and
response, is the process of protecting devices like
workstations, servers, and other devices (that can
accept a security client) from malicious threats
and cyberattacks.

12

media

INTERNET SECURITY

Internet security is one of the most important types of
computer security that come with a set of rules and
protocols that focus on specific threats and activities
that happen online. It provides protection against
hacking, DoS attacks, computer viruses, and malware.

13

media

BENEFITS

Computer security provides numerous benefits that
are essential for individuals, organizations, and
society as a whole. Here are some key benefits of
computer security:
Data protection
Preventing unauthorized access
Preventing cyber attacks
Promoting a safer digital environment

media

COMPUTER SECURITY

Show answer

Auto Play

Slide 1 / 13

SLIDE