Minggu, 05 Juni 2011

Computer Security

Computer security is a branch of technology known as information security isimplemented on a computer. Computer security objectives include the protection of information against theft or corruption, or maintenance availability, as defined in thesecurity policy.

According to Garfinkel and Spafford, an expert in computer security, the computer is said to be reliable and safe if the software works as expected. Computer security has5 goals, namely:

Availability
Confidentiality
Data Integrity
Control
Audit


Provides computer security requirements on different computers from most system requirements because they are often in the form of restrictions on what not to docomputer. This makes computer security becomes more challenging because it isquite difficult to make computer programs do all what has been designed to be doneproperly. Negative requirements also difficult to be met and require exhaustive testingfor verification, which is impractical for most computer programs. Computer securityprovides technical strategy to convert negative requirements into positive rules can be enforced.
The general approach taken to improve computer security, among others, is to limitphysical access to the computer, apply the mechanism on the hardware and operating systems for computer security, and create programming strategy to producea reliable computer program.

INFORMATION SECURITY

Information security aspects are the aspects covered and the surrounding information security in an information system. These aspects are:
privacy / confidentiality, maintain the confidentiality of information from all parties,except with the authority;
integrity, assuring that the data did not change by an unauthorized or by some otherthings that are unknown (eg bad data transmission);
authentication / identification, checking the identity of an entity, can be a person,credit card or a machine;
signing, ratifying the information into a single unit under one authority;
authorization, the granting of the right / authority to other entities within the system;
validation, checking the validity of an authorization;
access control, limiting access to entities in the system;
certification, authentication / authorization information to a trusted entity;
recording time, record the time of creation or existence of any information in thesystem;
testimony, to verify the creation and existence of an information in the system rather than by author
receipt, notice that the information has been received;
confirmation, notification that a service already available information;
ownership, providing an entity with legal to use or transmit to other parties;
anonymity, disguise the identity of the entities involved in a transaction process;
nirpenyangkalan, prevent denial of an entity for agreements or deeds that have beenmade​​;
withdrawal, withdrawal of a certificate or authority.

SOURCE : id.wikipedia.org/wiki/Keamanan_komputer


Tidak ada komentar:

Posting Komentar