computer security
computer security
Computer security is a measure of protection against accidental damage or loss, alteration or leakage of an unwanted person's confidentiality of the information used. Two types of security measures are required: administrative and technical.

Types

There are two forms of computer security systems; external security and internal security.

  • External security: It is said that external security measures protect the computer from damage outside hardware and software such as fire , flood, riot, theft, etc.
  • Internal Security: Intrusion control, data flow control, interference control and communication control are all important aspects of internal security.

Procedure

Confidential information is stored separately in the safety kernel or essential part of the computer 's vast database and management system for security purposes.

Statisticians often collect personal data from a significant number of people and use aggregate reports generated by computers. This is done , for example, during census. Keeping personal information secret is very difficult in those cases. Protecting privacy can be done by storing various information through secret codes.

firewall in computer network

Firewalls are a combination of hardware and software to protect one or more computers from external attacks. The most common use of firewalls is in the case of local area networks. It's also part of their job to protect information security.

A firewall is a special security system which controls data flow from one network to the next. This firewall is somewhere between the two networks. So if any data is being transmitted from one network to another, the firewall must pass through it. The firewall scans the data according to its rules, and allows it to go if it sees the data being allowed to go to that destination. Otherwise, it may be stuck or abandoned there. The Cisco vccv router now has a Cisco ios fir built in firewall.

Cryptocurrency

Cryptography is a branch of computer science that studies the different ways information can be hidden. Intelligence is the practice and discussion of secure methods of communication in a third party 's presence (English: adversary). Procedures are created and analyzed to block access of this lore by third parties. There is noticeable presence of modern intelligence in various fields of mathematics , computer science, and electrical engineering. Practical intelligence applications include ATM cards, computer passwords, electronic commerce, or e-commerce.

The English term cryptography comes from the Greek word "secret" (pronounced cryptocurrency) and "writing" (pronounced graphic)

Post a Comment

Previous Post Next Post