This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

Powered By Blogger

Translate

Showing posts with label Computer securities. Show all posts
Showing posts with label Computer securities. Show all posts

Sunday, July 2, 2023

Computer Security

Computer Security
Computer security is information security as applied to computers and 
computer networks.
NIST Computer Security Handbook defines the term computer security as
“The protection afforded to an automated information system in order to 
attain the applicable objectives of preserving the integrity, availability, and 
confidentiality of information system resources (includes hardware, 
software, firmware, information/ data, and telecommunications).”
The three important objectives of computer security are:
i) Confidentiality: Confidentiality can be in terms of data and privacy. 
Data confidentiality means that the confidential information is not 
disclosed to unauthorized individuals or not made available to public.
Privacy is about assuring individuals control or influence as what 
information is to be collected and stored and by whom and to whom
that information is to be disclosed