User talk:Leopk01

Basic Security terminology:

The term hacking has been used frequently in the media. A hacker was once considered an individual who understood the technical aspects of computer operating system and networks. Today, as a result of the media, the term is used more often to refer to individuals who attempt to gain unauthorized access to computer systems or networks. While some would prefer to use the terms cracker or cracking when referring to this nefarious type of activity, the terminology generally accepted by the public is that of hacker and hacking.

Security Basics:

Computer security itself is a term that has many meanings and related terms. Computer security entails the methods used to ensure a system is secure. Subjects such as authentication and access controls must be addressed in broad terms of computer security.

Seldom in today’s world are computers not connected to other computers in networks. This then introduces the term network security to refer to the protection of the multiple computers and other devices that are connected together.

There are two other terms that are related to these terms also that are information security and information assurance, information security focus on the data instead of hardware and software used in the computer system. Assurance also introduces another concept, that of the availability of the systems and information when we want them.

Since the late 1990s, much has been seen in the media concerning computer and network security. Often the news about a specific lapse in security, which has resulted in the penetration of a network or denial of service for a network.

Since the last few years, the public has become increasingly aware of its dependence on computers and networks and consequently has also become interested in the security of these same computer and networks. As a result of this increased attention by the public, several new terms have become commonplace in conversations and print. Terms such as hacking, virus, TCP/IP, encryption and firewalls are now frequently seen in mainstream news publications and have found their ways into casual conversations.

Download Word format file for free

--Tayyab Khadija 09:42, 9 April 2010 (UTC)

The “CIA” of Security
The “CIA” of Security: Almost from the beginning, the goal of computer security has been threefold. These are given below.

1.	Confidentiality 2.	Integrity 3.	Availability

The purpose of Confidentiality is to ensure that only those individuals who have the authority to view a piece of information may do so. No unauthorized individual should ever be able to view data they are not entitled to.

Integrity is a related concept but deal with the generation and modification of data. Only authorized individuals should ever be able to create or change information. The Goal of availability is to ensure that the data, or the system itself, is available for use, when the authorized user wants it.

As the result of the increased use of networks for commerce, two additional security goals have been added to the original three in the CIA of security. Authentication deals with the desire to ensure that the individual is who they claim to be. The need for this in an online transaction is obvious. Non-repudiation, which deals with the ability to verify that a message has been sent and received and that the sender can be identified and verified. The requirement for this capability in online transactions should also be readily apparent.

Ref: Principles of Computer Security by Wm. Arthur Conklin, Gregory B. White, Chuck Cothren, Dwayne Williams, Roger L.Davis

Download CIA of Security in word format --Tayyab Khadija 10:03, 9 April 2010 (UTC)