Saturday, 2024-04-20, 7:46 AM
Welcome Guest | RSS
Statistics

Total online: 1
Guests: 1
Users: 0
Site menu
Our Documentations
1* METASPLOIT
Blog Category
# Only for beginners [39]
This category contains some introductions and tutorials about UBUNTU and BACKTRACK for those who just start using LINUX.
# Computer Security [11]
In this category, you will find all courses about the Informatique Security
# LINUX [2]
EVERYTHING ABOUT LINUX - UBUNTU & BACKTRACK - (NEWS, VIDEOS, TUTORIALS, ... )
# BackTrack 5 Tutorials [6]
In this categorie, I will post all tutorials about BackTrack5 (Installation, Configuration, Update, Hacking...)
# TechnicDynamic Tutorials [12]
Technic Dynamic is a source of education focused in the following categories of technology: (Computer - Design - Gadgets - Networking - Security) Link : http://technicdynamic.com
# Vishnuvalentino Tutorials [2]
He is a computer security specialist, and also freelance website designer. Read more : http://vishnuvalentino.com/about/
# Hackers News [6]
All news about the hackers of the world ...
# Tools [18]
All Security Tools
MEMES PICTURES [0]
Entries archive
Shopping


Follow us
facebook
Main » 2012 » January » 31
Introduction to Computer Security



Introduction to Computer Security

The purpose of this document is to familiarize readers with the basics of computer security, as defined in ISO 7498-2, for example.

The objectives of computer security 

Computer security has several objectives, of course related to the types of threats and types of resources, etc ...However, the main points points are: 
  • prevent the unauthorized disclosure of data
  • prevent the unauthorized modification of data
  • prevent the unauthorized use of network resources or computer in general

The scope of information security 

These objectives apply in different areas or fields of applications, each using different techniques to attain the same objectives, and these fields are: 
  • physical security
  • Personal Safety
  • procedural security (security audit., procedures, computer ...)
  • physical security programs (screens, power cables, power consumption curves ...)
  • the security of operating systems
  • communications security

Terminology of computer security 

Computer security uses a well-defined vocabulary that we use in our articles. In order to understand these articles, it is necessary to define some terms: 
  • Vulnerabilities: what are the security vulnerabilities in one or more systems. Any system as a whole has seen vulnerabilities, which can be exploited or not.
  • Attacks (exploits) represent the means to exploit a vulnerability. There may be several attacks for the same vulnerability but all vulnerabilities are not exploitable.
  • The cons-measures: these are the procedures or techniques to address a vulnerability or to counter a specific attack (in which case there may be other attacks on the same vulnerability).
  • Threats: These are determined opponents can mount an attack exploiting a vulnerability.

For other definitions, see ISO 7498-2 defines no fewer than 59 words, while other definitions are also available in our lexicon. 

... Read more »
Category: # Computer Security | Views: 1266 | Added by: Administrator | Date: 2012-01-31 | Comments (0)

THE HACKING

What is it?

Hacking is a collection of computer technology, to attack a network, website, etc.. These attacks are different. It includes:
Sending "bombs" software.
Sending and search for Trojans.
The search for security holes.
Identity theft.
Overload caused by an information system (Flooding of Yahoo, eBay ...).
Changing user rights of a computer.
The provocation of unhandled errors.
And so on.
The attacks may be local (on the same computer, see the same network) or remote (on the internet by telecommunication).
Category: # Computer Security | Views: 682 | Added by: Administrator | Date: 2012-01-31 | Comments (0)

Visitors

Share This On:
Google Translator
Search
Login form
Our poll
Rate my site
Total of answers: 20
Clock & Calendar

«  January 2012  »
SuMoTuWeThFrSa
1234567
891011121314
15161718192021
22232425262728
293031