Skip to content
Home » Computer Security Concepts

Computer Security Concepts

Computer Security Concepts

Introduction

Computer Security refers to the protection of computer systems, networks, and data from unauthorized access, misuse, damage, or disruption. It ensures that information and computing resources are used safely, correctly, and legally. In Information Security and Cyber Law, computer security forms the foundation of data protection and cyber crime prevention.


Objectives of Computer Security (CIA Triad)

The core concepts of computer security are based on the CIA Triad:

1. Confidentiality

Confidentiality ensures that information is accessible only to authorized users.

Techniques to achieve confidentiality:

  • User authentication (ID & password)
  • Encryption
  • Access control policies
  • Firewalls

Example:
Only authorized bank employees can access customer account details.


2. Integrity

Integrity ensures that data is accurate, complete, and not altered without authorization.

Techniques to maintain integrity:

  • Hash functions
  • Digital signatures
  • Checksums
  • Audit logs

Example:
Marks stored in a university database should not be modified illegally.


3. Availability

Availability ensures that information and systems are accessible when needed.

Techniques to ensure availability:

  • Backup and recovery
  • Fault tolerance
  • Redundant systems
  • Protection against DoS attacks

Example:
ATM services should be available 24×7.


Key Computer Security Concepts

1. Authentication

Authentication is the process of verifying the identity of a user or system.

Types of authentication:

  • Something you know → Password, PIN
  • Something you have → Smart card, OTP
  • Something you are → Fingerprint, face recognition

Example:
Logging into email using password and OTP.


2. Authorization

Authorization determines what actions an authenticated user is allowed to perform.

Example:

  • Student → View results
  • Admin → Modify results

📌 Authentication comes before authorization.


3. Access Control

Access control defines rules and mechanisms to restrict access to resources.

Models of Access Control:

  • Discretionary Access Control (DAC)
  • Mandatory Access Control (MAC)
  • Role-Based Access Control (RBAC)

Example:
Only HR department can access salary files.


4. Encryption

Encryption is the process of converting plain text into cipher text to protect data.

Types:

  • Symmetric encryption (AES, DES)
  • Asymmetric encryption (RSA)

Example:
HTTPS encrypts data between browser and server.


5. Non-Repudiation

Non-repudiation ensures that a sender cannot deny sending a message.

Techniques used:

  • Digital signatures
  • Time stamps

Example:
Online contract signed using digital signature.


6. Auditing and Accountability

Auditing involves tracking and recording system activities to detect misuse.

Example:

  • Login logs
  • Transaction logs

📌 Helps in cyber crime investigation and legal evidence.


Threats to Computer Security

1. Malware

  • Virus
  • Worm
  • Trojan horse
  • Ransomware
  • Spyware

2. Unauthorized Access

  • Hacking
  • Password cracking

3. Denial of Service (DoS)

  • Overloading system to make it unavailable

4. Insider Threats

  • Employees misusing access rights

Security Mechanisms

MechanismPurpose
FirewallNetwork protection
AntivirusMalware detection
IDS/IPSIntrusion detection
BackupData recovery
Patch managementFix vulnerabilities

Computer Security and Cyber Law (Indian Context)

Computer security is legally supported by:

  • IT Act, 2000
  • Section 43 → Damage to computer systems
  • Section 65 → Tampering with computer source code
  • Section 66 → Computer-related offences

📌 Poor security can lead to legal liability.


Example: Computer Security in Online Banking System

  • Authentication → User ID + Password + OTP
  • Confidentiality → Encrypted transactions
  • Integrity → Digital signatures
  • Availability → 24×7 servers with backup
  • Audit → Transaction logs

Advantages of Computer Security

  • Protects sensitive data
  • Prevents cyber crimes
  • Ensures business continuity
  • Builds user trust
  • Supports legal compliance

Conclusion

Computer security is essential to protect digital assets from growing cyber threats. Concepts like CIA triad, authentication, encryption, access control, and auditing form the backbone of secure systems. In today’s digital world, strong computer security is not only a technical requirement but also a legal and ethical necessity.