ALL >> Technology,-Gadget-and-Science >> View Article
A Non-technical Primer To Computer Security
Total Articles: 57
Also, there have been issues regarding the security of computer systems and networks, as they are used to store sensitive information or communicate to relevant persons at distant locations. Moreover, there have been cyber crimes that have raised many questions regarding the safety of computer systems and networks.
To understand the situation in a deeper way, you need to appreciate the way computers work. Computers are not the collection of tangible hardware that you can catch hold of. In fact, only the hardware components amount to nothing but some dead, fancy and costly mini toys. What puts life into the hardware and makes it work is the software.
Now, among the software, the major one is the operating system. The job of an operating system, among many others, is to manage the resources for processes, applications and system requirements. It does so in a quiet manner, often at the back ground. The operating system has two components – the kernel and the shell.
The kernel is mainly responsible for hardware management, and is regarded as the innermost layer of all software. The second layer is the shell. Users can access the shell and instruct the kernel what work to fetch from the hardware, and the kernel complies accordingly.
If you want to save a file or send an email, what you basically do is to instruct the kernel through the shell (often you use other software for accessing the shell, although it is readily accessible at the command prompt) to make changes in the hardware voltages.
You must have heard about the binary logic of 0 and 1 that controls a computer. This binary logic is nothing but two distinct voltage levels of 0 Volt and +5 Volt respectively. Changes in these levels, as in this particular case, will create patterns at a specific portion of your hard drive, and your file will be saved at a definite location. Off course, you don’t get a whiff of such complex processes that gets done within a second at the click of a mouse, but this is the naked picture.
Now, if anyone wants or can access the shell of your computer system, either over a network or at the physical machine itself, and have the right skills, he can hack into your system and access all the files, see them, delete or modify them, download them, or even send emails and virtually every possible thing that can be done with a computer. In computer professionals’ parlance, persons executing these types of malicious activities are called crackers. They are the villains among the computer communities.
However, the technology that empowers a hacker can also be used to trace back the hacker, provided one has the right tools and adequate knowhow of the subject. These experts are called the real hackers, who tests computer systems and networks to make them more secure and robust. Such tests, called the security analysis and network penetration tests, are not easy to perform and cannot be done only through theoretical knowledge. There are professional consultants who are experts in this domain and enterprises often end up hiring them.
Worris Levine is an information security expert. As a professional consultant, he has worked with many big corporate and need-sized companies in the domain of business technology integration and data security.
Technology, Gadget and Science Articles1. Relevancy In The Modern Day Scenario
Author: Education Portal
2. Hire Pool Builders
Author: Elena Southcott
3. Various Features To Look For In Contract Management Software
Author: James Blake
4. Vitamins: How Do They Work?
Author: James Brown
5. Security Solutions To Home, Schools And Business
Author: Vivency Global
6. Blackberry Leap Screen Replacement In The Uk
7. How To Drive Smart Customized Consumer Engagement Using Hybris Marketing
Author: Sandeep Arora
8. Nokia Lumia Screen Replacement In The Uk
9. Global Cloud Radio Access Network (c-ran) Market Trend
10. Kotlin On Android: A Step Ahead In Coding
Author: Eldon Broady
11. Hp Laptop Repair Services In The Uk
12. How To Troubleshoot The Activation Errors Of The Mcafee Antivirus Subscribed With Cd Or Retail Card?
Author: Robert Williams
13. Videocon Wallcam Launches Mobile Vehicle Surveillance Solution
Author: Videoocn WallCam
14. Industrial Box Type Oven
15. Benefits Of Hiring Smart Av (audio Visual) Equipments For Your Conference
Author: One World Rental