Definition of

Computer security

Protected system

There are various resources that aim to improve computer security.

Computer security is a discipline that is responsible for protecting the integrity and privacy of the information stored in a computer system . In any case, there is no technique that can ensure the inviolability of a system .

A computer system can be protected from a logical point of view (with software development) or physically (linked to electrical maintenance, for example). On the other hand, threats can come from harmful programs that are installed on the user's computer (such as a virus ) or arrive remotely (criminals who connect to the Internet and enter different systems).

Types of viruses

In the case of viruses, it must be emphasized that currently the list of viruses that exist and that can palpably violate any computer or computer system is very extensive. Thus, for example, we find the so-called resident viruses, which are those that are characterized by the fact that they are hidden in the RAM memory and that gives them the opportunity to intercept and control the different operations that are carried out. on the computer in question, carrying out the infection of programs or folders that are a fundamental part of them.

In the same way, there are also the well-known direct-action viruses, which are those that execute quickly and spread throughout the computer, bringing with them the contagion of everything in their path.

Encryption viruses, boot viruses, file viruses or overwriting viruses are also other of the most important contagious dangers that can affect our computer.

Computer criminal

A hacker can detect flaws in computer security.

Computer security software

Among the most common computer security tools are antivirus programs , firewalls, information encryption and the use of passwords.

All of them are very useful tools, as are the well-known intrusion detection systems, also known as anti-spyware. These are programs or applications thanks to which we can immediately detect what those spy programs are that are found in our computer system and what they do is collect information from it and then offer it to an external device without counting. with our authorization at any time. Among this type of spies, Gator stands out, for example.

Keys to safe use of systems

A secure system must be complete (with information modifiable only by authorized people), confidential (the data must be readable only by authorized users), irrefutable (the user must not be able to deny the actions they performed) and have good availability ( must be stable).

In any case, as in most areas of security , the essential thing remains user training. A person who knows how to protect themselves from threats will know how to use their resources in the best possible way to avoid attacks or accidents.

In other words, it can be said that computer security seeks to guarantee that the resources of an information system are used as an organization or a user has decided, without interference.