What is computing security and what are the main components of Computing security?
Computing security deals with protecting computer systems, information systems, and information from harm, theft, disclosure and unauthorized access. Moreover, it focuses on ensuring confidential, integrity and availability of organizational assets. There are different motives behind computer attacks and it is paramount to safeguard the computing devices, storage and other computing systems in an enterprise. The cyberattacks to an organization may occurs for one or more of the following reasons:
- Financial Gain or ransom
- Military Objectives
- Disrupting businesses and critical infrastructures
- Reputational damage
- Disseminating religious or political beliefs
- Coercion, cyberbullying, cyber terrorism,
- Corporate espionage
- More
The most common computing attacks include:
- SQL Injection
- Password attacks (password cracking, password sniffing, password spraying, etc.)
- Shoulder surfing / Eavesdropping
- Phishing attacks (Spear phishing, whaling, spam, etc.)
- Social engineering
- Malware attacks (Ransomware, viruses, worms, Trojan horse, rootkits, spyware, adware, malvertising, etc.)
- Man in the Middle (MITM)
- Denial of service, Distributed denial of service (DoS/DDoS)
- Many more
The best techniques to secure the computing device include, but not limited to, the following?
- Secure passwords or credentials
- Multifactor authentiction, or at least two factor authentication
- Firewalls
- Access controls
- Antimalware programs or software
- Regular updating or patching
- Cryptographic encryption techniques
- Internet hygiene
- Security awareness training
- More