Intruduction - Computer and Network Security

Computer and network security are essential for several reasons, driven by the increasing reliance on digital systems and the growing sophistication of cyber threats. Here are some key needs for computer and network security:

  1. Protection of Data: To safeguard sensitive information such as personal data, financial records, intellectual property, and confidential business information from unauthorized access and breaches.

  2. Prevention of Cyber Attacks: To defend against various forms of cyber attacks including malware, ransomware, phishing, and denial-of-service attacks that can disrupt operations and cause significant damage.

  3. Integrity of Information: To ensure that data remains accurate and unaltered during transmission or storage, protecting it from tampering or corruption.

  4. Confidentiality: To ensure that information is accessible only to those authorized to have access, protecting it from unauthorized disclosure.

  5. Availability of Services: To ensure that computer systems and networks remain operational and accessible to authorized users, preventing downtime and service interruptions.

  6. Compliance and Legal Requirements: To adhere to legal and regulatory requirements related to data protection and privacy, such as GDPR, HIPAA, and other laws, which mandate specific security measures.

  7. Reputation Management: To protect the reputation and trustworthiness of organizations by preventing data breaches and security incidents that could lead to loss of customer trust and damage to the brand.

  8. Economic Protection: To prevent financial losses resulting from cybercrime, including theft, fraud, and the costs associated with responding to security incidents and recovering from breaches.

  9. National Security: To protect critical infrastructure and national interests from cyber espionage, sabotage, and attacks by hostile entities.

  10. Innovation and Growth: To create a secure environment that fosters innovation and growth by enabling businesses to adopt new technologies and digital practices without compromising security.

Ensuring robust computer and network security involves implementing a combination of technologies, policies, and practices designed to mitigate risks and protect against threats.

This course focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet security, which rely heavily on cryptographic techniques.


Cryptographic algorithms and protocols can be grouped into four main areas:

• Symmetric encryption: Used to conceal the contents of blocks or streams of data of any size, including messages, files, encryption keys, and passwords.


• Asymmetric encryption: Used to conceal small blocks of data, such as encryption keys and hash function values, which are used in digital signatures.


• Data integrity algorithms: Used to protect blocks of data, such as messages,from alteration.


• Authentication protocols: These are schemes based on the use of cryptographic algorithms designed to authenticate the identity of entities.


The field of network and Internet security consists of measures to deter, prevent,detect, and correct security violations that involve the transmission of information.

Comments

Popular posts from this blog

Cryptographic Algorithms CST 393 KTU CS Honour Notes Semester V -Dr Binu V P

Syllabus CST 393 Cryptographic Algorithms

Computer Security Concept- CIA Triad