Computer Security

Computer Security, Threats & Vulnerabilities – Hardware & Software

Computer Security: Any item you value needs to be protected and secured. Similar is the case with your computer hardware and software. Managed IT Services Chicago says that the protection is required for every valuable thing, no matter it’s physical or visual. We call these items or things as assets of a computer system. Now the question arise is “What should be protected?” The answer seems to be very simple, “valuable assets should be protected”, but difficult to decide about what is valuable?

A computer system is completely useless without a software, even it is a minor calculator or a high level super computer. If it does not have any software installed, it is just combination of some silicon chips placed on a table. Hence, software is identified as one of the most valuable asset in a computer. A software can be an operating system, a user application, a utility, a kernel, a service, an interface etc. A computer can be bought from any shop with best specifications. If any of its hardware fails, you may replace it with a new one. However, the files in a computer or software installed in a computer distinguishes your computer from other’s. Software can be replaceable or irreplaceable. For example, you personal applications are irreplaceable but operating systems, anti-viruses, commercial software are replaceable and you can buy them from market any time.

Hence, An important asset can be a hardware, software or data. All of them are related. A software is nothing without hardware. A hardware is nothing without software. Data is the most important part which makes a software and hardware more valuable. For example, if a pen-drive contains some sensitive data, you will try various methods to secure it. You will keep it near you. You will encrypt its data. You will put password protection on it and so on. If a pen drive has some regular songs recorded from a broadcast of radio, you will not spend time or money in protecting it with password or encrypting data. It means, it’s the data that make an asset more valuable as compared to other. So, in computer security, the first step is to identify the valuable assets. It is recommended to have a strong data security and privacy practice. Learn more of this data privacy at https://www.delphix.com/glossary/data-privacy.

Some assets are more valuable and some are less. I mean, not all the assets have same priority or importance. Some of the assets requires protection all the time and some don’t. For example, your locker has jewelry. In this case, you will never leave your locker open. As compared to this, another locker or almirah which contains your clothes, can be left open. Hence, the second step is prioritizing the assets for security measures.

What if you leave your locker containing jewelry open? A thief will break in and take advantage of situation. Can you tell what is threat and vulnerability in the above situation?

What is threat? : A threat is a situation which has potential to cause harm and put you in problem.

What is vulnerability? :  You can define vulnerability as a weakness of a system that can be exploited.

In the above example, the threat is thief can break in and steal the jewelry. The locker will be secure if you have locked it. The weakness of lock is key with which it can be unlocked. However, if the lock can be opened with any key, it means the lock is vulnerable to key. If the locker can be opened with only its own key, the thief may attack it but he will not succeed in opening the lock. But if you will leave the locker unlocked, but close its door, it will be a vulnerability. The thief will pull the door of locker to exploit this vulnerability.

Now let’s move to the computers, to exploit a vulnerability in a computer system, the attacker will need to use another computer system for attacking. He may attack in various ways. There are many techniques including flooding system, brute force, shutting down system and so on.

For more details, read more articles in “Computer Security” section of this website.

Arslan ud Din Shafiq

Alibaba Cloud MVP, Alibaba Cloud Technical Author, Dzone MVB, Software Engineer, Software Developer, Software Designer, Web Engineer, Web Developer, Web Designer, Database Designer, Database Developer, Cloud Computing Specialist, Linux Expert, Servers, 3D Modeling, Blogger, Facebook Map Editor, Google Map Editor

Recent Posts

I have 20 years of experience in computer security advancement. What I can recommend to regular PC users

If you are living in a digital world you must know how to protect your…

4 years ago

Software Development Life Cycle Model (SDLC)

Software Development Life Cycle Model, also known as SDLC or Software Development Process, is base…

4 years ago

How to Install Go Lang on CentOS 8

Go, often referred to as golang is a modern open-source programming language created by Google…

4 years ago

SE Ranking in [2020]. What is SEO in marketing?

Torque published an article on October 18, 2016, about WordPress statistics. According to this article,…

4 years ago

PostgreSQL Version via Command Line & SQL Shell

PostgreSQL, often known simply as Postgres, is an open-source general-purpose object-relational database management system. In…

4 years ago

Google SEO: 15 Best ways about how can I do SEO for Free?

SEO is free as well as paid. To achieve SE ranking, money is not enough.…

5 years ago