Security
Security means freedom from risk or danger: thus we define security by the risks and dangers
we want to avoid. In computer systems, these risks include unavailability of a system or
unauthorized behaviour by users; in communications systems they include unauthorized
eavesdropping, tampering, or redirection of messages. It includes both prevention and detection.
We restrict our attention to malicious behaviour by so called attackers, leaving computer
reliability to hardware experts and communications fidelity to engineers.
Information Security
We are a part of an information Society. Huge amount of Information can be speedily processed
and saved on easily accessible media. Information plays a really important part in decision
making in an organization. For an organization a wrong decision can lead to drastic result. This
is one of the reasons why information security is steadily acquiring a more central role in
business. In the world of today information is becoming increasingly important. Generally
speaking the standard of information security has not kept pace with this development. For
example, information that before was saved on a large amount of paper and physically difficult
to steal can today be saved on a disk that can easily be removed. Information security is an
attempt to protect information by making it accessible only to the intended individuals, groups or
organizations. The reason may be financial, political, tactical or purely logistical. Every
organization depending upon its resources, and the type of data it handles, has allowed a separate
budget and manpower for developing information security arrangements.
Vulnerability
Vulnerability is a weakness which allows an attacker to reduce a system's information assurance.
Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access
to the flaw, and attacker capability to exploit the flaw. To exploit vulnerability, an attacker must
have at least one applicable tool or technique that can connect to a system weakness. In this
frame, vulnerability is also known as the attack surface. Vulnerability management is the cyclical
,practice of identifying, classifying, remediating, and mitigating vulnerabilities. This practice
generally refers to software vulnerabilities in computing systems
Computer Security
Is the protection of computer systems and networks from the theft, disruption, misdirection, or
damage to their hardware, software, or electronic data.
Computer security are measures, procedures, and controls which provide an acceptable degree of
safety of information resources from accidental or intentional disclosure, modification, or
destruction.
Computer security is primarily concerned with information flow, and some people define
computer security as that subset of information security which pertains to computers.
The meaning of the term computer security has evolved in recent years. Before the problem of
data security became widely publicized in the media, most people’s idea of computer security
focused on the physical machine. Traditionally, computer facilities have been physically
protected for three reasons:
• To prevent theft of or damage to the hardware
• To prevent theft of or damage to the information
• To prevent disruption of service
Vulnerability
Vulnerability is a weakness which allows an attacker to reduce a system's information assurance.
Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access
to the flaw, and attacker capability to exploit the flaw. To exploit vulnerability, an attacker must
have at least one applicable tool or technique that can connect to a system weakness. In this
frame, vulnerability is also known as the attack surface. Vulnerability management is the cyclical
practice of identifying, classifying, remediating, and mitigating vulnerabilities. This practice
generally refers to software vulnerabilities in computing systems.
, Cybercrime
Offences that are committed against individuals or groups of individuals using modern
telecommunication networks such as Internet.