The main technical areas of computer security are privacy, integrity and authentication/availability.
- Privacy, also known as confidentiality or confidentiality, means that unauthorized parties cannot access your own information. Privacy breaches range from embarrassing to catastrophic
- Free means your information is protected against unauthorized alterations to authorized users. Database integrity and other resources are usually compromised by hacking.
- Authentication means that a user pretends to be them.
- Availability means that resources are accessible by affiliated parties. Examples of availability attacks are ‘service denial’ attacks.
Other important issues that computer security professionals are concerned about are access control and persistence. Access control not only implies the fact that users can not only access the resources and services they deserve, but they also cannot be denied access to legally expected resources. Neutrality means that the person who transmits a message cannot deny that he or she sent it and vice versa.
Apart from these technical aspects, the concept of computer security is huge. The core of computer security is drawn from disciplines such as ethics and risk analysis and the main issues associated with it are computer crime (trying to prevent, detect and remedy attacks) and identity/identity in cyberspace.
Although privacy, integrity, and authenticity are the most important issues when it comes to computer security in general, privacy is of paramount importance for everyday Internet users, as many people feel that they have nothing to hide or do without the information they provide ‘. They don’t feel sensitive when they are registered with an internet service/site.
Keep in mind, however, that the information on the Internet is very easily shared between companies, and small pieces of information from different sources can be combined to form something more complex about one person. Because of this, nowadays, the ability to control what information about free web content is collected about them, who can use it and how to use it is crucial.