Computer Security


Computer security is primarily the concept behind protection and preservation of Computer information systems that generally revolves around the triad of CIA. It is illustrated as Confidentiality, Integrity and availability of information and information systems.

  • Confidentiality. Confidentiality is the narrative that conforms to the assurance of information related protection from unauthorized personal. It also insures delivery, control and influence of this information to individuals who are authorized to access the information.
  • Integrity. Integrity means the information is free from any sort of distortion, corruption or negative change either by the system or unauthorized individuals.
  • Availability. The term availability means that the information is sustainably provisioned to authorized individuals.
  • Confidential information sharing between two individuals is performed by a technology called encryption. There are two types of encryptions.

  • (1)Symmetric encryption The Symmetric encryption is a method in which a user generates a secret key that is a unique string of characters. He applies this key to some confidential information that he needs to share with another individual that is authorized to possess. The secret key is used to scramble the information in a particular state determined by computer algorithms. This information is now sent to the authorized individual afore mentioned. The secret key is then shared between the two individuals. Now, only the individual receiving the key can decrypt the information and bring it into a readable format. Any hacker launching a “Man in the middle” attack or an eaves dropper obtaining this information will find it useless. It is mentionable that even if the hacker tries to decrypt this information, it will take up to several months or even years to decode it without any assurance or guarantee of success. The two most widely used symmetric algorithms are the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES).
(2)Asymmetric encryption One weakness of the symmetric encryption is that when the secret key is shared it can be compromised. This problem can be resolved with asymmetric encryption. The Asymmetric encryption is a type of encryption in which a user creates two files. One of the key is called private key and the other is called a public key. The public key can be shared with everyone like it can be published on an organizations website. The Private Key is shared with only the authorized individual. Once the information is sent it can be decrypted by the public key only when the encryption algorithm and the private key is relevant. One drawback of the asymmetric encryption is that it requires more processing power and it is more time consuming than symmetric encryption.

Learn From Experts

When you want further in-depth knowledge on how to write an essay, you can work with others with more experience. You can choose to get insight from colleagues with good writing skills, your instructor when reviewing guidelines, and even expert academic writers that produce essays from scratch on a regular basis.

Essay services

Looking for good essay writer? Follow this link: My Essay Written - hire from 200+ essay writers.

Copyright (c) 2012-2017 - IgniteMarketingInstitute.com. All rights reserved.