Computer Security - What Exactly Is It?Written by Ciontescu Molie
Although term 'computer security' is used a lot, content of a computer is actually vulnerable to only a few risks unless computer is connected to others on a network. As use of computer networks (especially Internet) has increased dramatically during past few years, term computer security is now used to describe issues referring to networked use of computers and their resources. The major technical areas of computer security are confidentiality, integrity and authentication/availability. - Confidentiality, also known as secrecy or privacy, means that information you own cannot be accessed by unauthorized parties. Breaches of confidentiality range from embarrassing to disastrous. - Integrity means that your information is protected against unauthorized changes that are undetectable to authorized users. The integrity of databases and other resources are usually compromised through hacking. - Authentication means that an user is who he claims to be. - Availability means that resources are accessible by authorized parties. Examples of availability attacks are 'denial of service' attacks. Other important things that computer security professionals are concerned about are access control and nonrepudiation. Access control refer not only to fact that users can only access resources and services they are entitled to, but also to fact that they can't be denied to access resources they legitimately expect. Nonrepudiation means that a person who sends a message cannot deny he sent it and vice versa.
| | FocusStor, launches a new data backup & recovery softwareWritten by Marc Bulot
FOR IMMEDIATE RELEASE Montreal, Canada, April 28, 2005 FocusStor, Online Data Backup & Recovery (www.focusstor.net), leading Canadian provider of disk-based backup and recovery solutions for small businesses since 1985, today released their newest offsite storage software. In today's insecure world, cables become unplugged, electronics fail daily, disks stop turning, viruses and hackers burden businesses constantly, and regardless of specific backup procedures, electronic records will continue to be discarded and overwritten. Each year businesses loose billions of dollars due to data loss. The factors used to determine viability and business continuity for an organization that has suffered from a significant system or data loss does not rely strictly on ability to replace hardware or rebuild infrastructure. In most cases continued success relies heavily on ability to quickly and successfully recover business critical data. Considering it's one of key deciding factors in whether your company will remain in business, shouldn't a company be prepared to make needed data protection decisions up front? Indeed, they should, and that is why FocusStor offers a highly secure data back up technology.
|