You are on page 1of 1

Introduction to Security

Introduction
Before understanding the various concepts of security, we should know what we are trying to
protect. What are the various dangers when we use computers, networks and internet? What
are the likely pitfalls? What can happen if we do not setup the right security policies?
The need for security
In early days of computers, computer data was considered to be useful, but not something to be
protected. Most initial computers had no or very little security. When computer applications were
developed to handle financial and personal data, the real need for security was felt. Therefore some
types of security mechanisms were needed.
Consider the following examples of security violations:

User A transmits a file to user B. The file contains sensitive information that is to be protected
from disclosure. User C, who is not authorized to read the file, is able to monitor the
transmission and capture a copy of the file during its transmission.

A network manager, D, transmits a message to a computer, E, under its management. The


message instructs computer E to update an authorization file to include the identities of a
number of new users who are to be given access to that computer. User F intercepts the
message, alters its contents to add or delete entries, and then forwards the message to
computer E, which accepts the message as coming from manager D and updates its
authorization file accordingly.
Types of security

Data security
Data security is the means of ensuring that data is kept safe from corruption and that access
to it is suitably controlled.
Computer Security
Computer Security is the protection of computing systems and the data that they store or
access, while allowing the information and property to remain accessible and productive to its
intended users.
Network Security or Information Security
It ensures the protection of the network and the network-accessible resources from
unauthorized access, consistent and continuous monitoring and measurement of its
effectiveness.
Principles of Security
Confidentiality
It ensures that no unauthorized people or systems ever get a hold of information that is not
meant for them.

Integrity: Ensures that only authorized parties are able to modify computer system assets and transmitted
information.

You might also like