Page 15 - DCAP516_COMPUTER_SECURITY
P. 15
Unit 1: Introduction to Computer Security
the website is using Secure Sockets Layer (SSL) technology that encrypts data and requires Notes
a code.
4. Research suspicious information: If you see something suspicious do some research online
to find out if something is legitimate and not a hoax of some sort.
5. Baits: Do not take offers of free products of services at face value. These are likely intended
to fool you into downloading infected files or will infect your computer when you click
on them. Also be wary of any messages that ask you to “validate” information, these are
often phishing attempts.
Figure 1.4: Example of Bait
1.8 Summary
The objective of computer security includes protection of information and property from
theft, corruption, or natural disaster, while allowing the information and property to
remain accessible and productive to its intended users.
The term computer system security means the collective processes and mechanisms by
which sensitive and valuable information and services are protected from publication,
tampering or collapse by unauthorized activities or untrustworthy individuals and
unplanned events respectively.
Confidentiality, Integrity and Availability are the basic components of computer security.
Computer systems are vulnerable to many threats that can inflict various types of damage
resulting in significant losses. The effects of various threats varies considerably: some
affect the confidentiality or integrity of data while others affect the availability of a system.
Prevention, detection and recovery are the major goals of computer security.
LOVELY PROFESSIONAL UNIVERSITY 9