Abstract

The communication of confidential data over the Internet increases every day. Individuals and organizations submit their sensitive data electronically. It is also common for hackers to target these networks. Nowadays, protecting your data, software, and hardware from viruses is more of a necessity than ever, not just a concern. Cyber security is traditionally defined by the three attributes of confidentiality, integrity and availability. Confidentiality is the prevention of unauthorized disclosure of information. Integrity is the prevention of unauthorized modification of information, and availability is the prevention of unauthorized retention of information or resources. This article studies the different types of security threats, resources and vulnerabilities of computer systems.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call