WHAT IS COMPUTER SECURITY?
Computer security is a branch of information security applied to both theoretical and actual computer systems. Computer security is a branch of computer science that addresses enforcement of 'secure' behavior on the operation of computers. The definition of 'secure' varies by application, and is typically defined implicitly or explicitly by a security policy that addresses Confidentiality,Integrity and Availability of electronic information that is processed by or stored on computer systems.
WHY DO WE NEED SECURITY?
In the ever changing world of global data communications, inexpensive Internet connections, and fast-paced software development, security is becoming more and more of an issue. Security is now a basic requirement because global computing is inherently insecure. As your data goes from point A to point B on the Internet, for example, it may pass through several other points along the way, giving other users the opportunity to intercept, and even alter it. It does nothing to protect your data center, other servers in our network, or a malicious user with physical access to your EnGarde system.
Security has been getting more and more attention recently, as attacks against even personal computers (viruses, worms, spam), or banking cards, or mobile phones, etc., are becoming more and more frequent, and more and more well-known to the general public.
In this paper we discuss about the methods to protect our data, protect our system while on internet and to protect all the data base’s and images from being manipulated .The topics of security we are going to discuss briefly are
• Computer Security terminology.
• Password Security.
• E-mail security.
• Web Security.
• Are password rules too complex?
-Computer hardware speed and price are always dropping.
-Is your computer in a locked room?
-Who has physical access to your system?
-A majority of system attacks originate through network
• COMMON E-MAIL PROTOCOLS:
1. POPS-POP over an SSL connection.
2. IMAPS-IMAP over an SSL connection.
3. SMTP+TLS-negoioation of a TLS/SSL connection
4. All popular e-mail uses the following e-mail protocols.
• Protection of E-mails using
• SSL: Secure Sockets Layer.
PEER-PEER FILE SHARING (P2P):
• Issues to consider while P2P.