Wednesday, July 3, 2024
HomeCommunitiesGuest BlogsCyber System Security

Cyber System Security

Cyber System Security as the name suggests, it protects our system from cyber attacks, malicious attacks. It is basically to advance our security of the system so that we can prevent unauthorized access of our system from attacker. 

In today’s world the attacker become more advanced to crack the security of any system so it is our responsibility to make our security advance because attacker can misuse the data against us which will create a problem for us. 

For example we can take example of cyber attack in India when our more than 200 websites were hacked by a group of Bangladesh including Border Security Force website (BSF). 

Another example is attack on hydro power plant in New York, attack on power grid in Iran. These attacks were very big which threatened the whole world and also these attacks were big threatened to country security. 

The security of computer security depends on three goals that are Confidentiality, Integrity, Authenticity. These Goals are basically threatened by attacker. There are various software to protect our information that are anti-spyware, antivirus, Firewall which helps in authorized access of information. There are other security system such as Intrusion Detection System, Cryptography, Digital Signature which will help us in protecting our system from attack. 

So, in advance various threat models should be design with their solution to protect our confidentiality of information from an unauthorized access and also accessing the vulnerability will also help in protection because it is the weakness of computer itself which can be easily targeted by the attacker.
 

Last Updated :
21 Oct, 2021
Like Article
Save Article


Previous

<!–

8 Min Read | Java

–>


Next


<!–

8 Min Read | Java

–>

Share your thoughts in the comments

Calisto Chipfumbu
Calisto Chipfumbuhttp://cchipfumbu@gmail.com
I have 5 years' worth of experience in the IT industry, primarily focused on Linux and Database administration. In those years, apart from learning significant technical knowledge, I also became comfortable working in a professional team and adapting to my environment, as I switched through 3 roles in that time.
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments