Safekipedia
Computer securityComputer security proceduresCryptographyCyberwarfare

Computer security

Adapted from Wikipedia · Adventurer experience

A security lock on an old Apple computer to prevent unauthorized access.

Computer security

Computer security, also known as cybersecurity, is about keeping computer software, systems, and networks safe. It helps protect them from threats that could share information without permission, steal things, or damage hardware, software, or data. These threats can also stop computers and networks from working properly.

An example of a physical security measure: a metal lock on the back of a personal computer to prevent hardware tampering.

As we use computer systems, the Internet, and wireless networks more, computer security becomes very important. This is especially true with smart devices like smartphones, televisions, and the many parts of the Internet of things (IoT).

Because many parts of our daily lives depend on digital systems, cybersecurity is a big concern. Modern information systems support important services like power grids, elections, and finance. They have weaknesses that need protection. Tools like passwords and encryption are important for security. Physical measures like metal locks are also still used to keep computers safe from people who should not get in.

Vulnerabilities and attacks

A vulnerability is a flaw in a computer system that lets someone do something they shouldn’t be able to, like stealing information or causing damage. These flaws are listed in a special database.

Different groups face different kinds of cyberattacks. Bigger businesses often see more attacks, but smaller ones can be at risk too. Regular internet users usually deal with attacks that target many people at once, like tricking them into giving away passwords.

To keep computers safe, it’s important to know about the different types of attacks. Some common ones include:

  • Backdoor: A secret way for someone to get into a computer system without permission.
  • Denial-of-service attack: When someone tries to stop a computer or website from working.
  • Malware: Harmful software that can steal information or take control of your computer. Types include viruses, worms, trojans, spyware, and ransomware.
  • Man-in-the-middle attacks: When someone secretly steps between two people communicating online.
  • Phishing: Tricking people into giving away personal information by pretending to be someone else.

Information security practices

Information security and cybersecurity are closely related but different. Cybersecurity protects computer systems from threats on the internet. Information security also includes rules and policies inside a company to keep information safe. How employees act can affect how well these security measures work.

Sometimes, employees don’t fully support security efforts, which can cause problems. For example, some security issues happen because people inside the company make mistakes. To improve security, organizations can check their policies, make plans, train staff, and review progress to make sure everything is working well.

Computer protection (countermeasures)

A countermeasure is something that helps protect computers and data from threats. Threats can try to steal information, damage systems, or cause problems.

One important idea is security by design. This means putting security into software right from the start. Companies should know their system's weaknesses and build strong defenses. They should also make sure important services keep working and can spot attacks when they happen.

Other key protections include using strong passwords, setting up firewalls to block unwanted traffic, and teaching people to recognize online dangers. Keeping software updated and backing up data also helps keep systems safe.

Systems at risk

More people and businesses use computers now. This means more systems need protection. Financial systems, like banks and money websites, are often targeted by people who want to steal or change money. Utilities that control power and water also face risks, especially if their computers are online.

Aviation, healthcare, large companies, and even cars have computer systems that can be attacked. These attacks can cause big problems, like losing important information or damaging systems that many people rely on. As technology grows, keeping these systems safe is very important.

Cost and impact of security breaches

Security breaches can cause big money problems for companies. Some experts think virus attacks and other bad things online cost a lot, but it’s hard to know the exact numbers.

Knowing how much security breaches can cost helps companies decide how much to spend on keeping their information safe. The Gordon-Loeb Model says companies should spend a little bit of what they might lose from an attack to protect their information. This amount is based on the expected value of what they might lose.

Attacker motivation

Attackers try to break into computer systems for many reasons. Some do it just for fun or to cause trouble, like vandals. Others might do it for political reasons, trying to make a company look bad by crashing its website. Criminals often attack for money, and sometimes countries will sponsor attacks to achieve their goals.

Understanding why attackers do what they do helps us protect systems better. Different places, like a home computer, a bank, or a military network, need different levels of protection because they face different kinds of threats. Knowing the motivations behind attacks is an important part of keeping our digital world safe.

Computer security incident management

Computer security incident management is a way to handle problems when a computer or network is attacked or broken into. The goal is to stop more damage, fix things quickly, and get everything back to normal. Having a plan helps people know what to do and can stop small problems from becoming big ones.

A good plan has four main steps: getting ready, finding and checking the problem, stopping it and fixing it, and learning from what happened to do better next time. This helps keep information safe and systems running smoothly.

Notable attacks and breaches

Further information: List of cyber-attacks and List of data breaches

Here are some important examples of when computer security was broken.

In 1988, a type of harmful software called a worm slowed down many computers connected to the Internet. It was made by a student who wanted to see how many machines were online.

In 2010, a computer worm named Stuxnet damaged machines in some factories.

In 2013, it was found that a government agency was watching online activities.

In 2021, a cyber attack on a big fuel pipeline in the U.S. caused fuel shortages.

These events show how important it is to keep computers and information safe.

Legal issues and global regulation

Cyber attacks cause tricky legal problems because there are no universal rules to punish cybercrimes. When experts find the person behind harmful malware or a cyber attack, local authorities often cannot act because their laws do not cover these cases. It is also hard to prove who is responsible for attribution for cybercrimes and cyberattacks. Criminals can use tricks like dynamic DNS, fast flux, and bullet proof servers to hide, making it difficult for authorities to catch them. This makes the Internet a hard place to keep safe.

Role of government

The government helps keep computer systems and important services, like the power grid, safe from cyberattacks. It does this by making rules for companies to follow.

Some people think the internet should not have government rules, while others think the government should do more to keep everyone safe online. Finding the right balance between government rules and private companies is important for our digital safety.

International actions

Many teams and organizations work together to keep computer systems safe around the world. The Forum of Incident Response and Security Teams (FIRST) is a global group. It includes members like US-CERT, AT&T, Apple, Cisco, McAfee, and Microsoft. The Council of Europe helps protect societies from cybercrime. The Messaging Anti-Abuse Working Group (MAAWG) works to stop harmful messages like spam. Other important groups include the European Network and Information Security Agency (ENISA). ENISA aims to improve security across the European Union.

In Europe, the European Parliament and the Council of the European Union created rules called the General Data Protection Regulation (GDPR). These rules help make sure that companies protect people’s personal information properly. There are also groups like TeleTrusT in Germany that focus on improving IT security.

National actions

Most countries have special teams to protect their networks from cyber threats.

Since 2010, Canada has had a cyber security strategy with three main goals: securing government systems, protecting important private systems, and helping people stay safe online. The Canadian Cyber Incident Response Centre works to prevent and respond to cyber threats.

Australia has helped small and medium businesses improve their cyber security. Hong Kong passed a law in 2025 to protect important systems from cyber attacks. India has policies to safeguard public and private information. South Korea trained experts after cyberattacks in 2013.

The United Kingdom formed a National Cyber Security Centre in 2016 to oversee cyber security. The United States has a national cyber plan to protect networks, promote a strong digital economy, and work with other countries to stop harmful cyber activities. The U.S. also has laws and agencies to fight cyber crime and protect important systems.

Modern warfare

Main article: Cyberwarfare

Experts worry that the internet might become a new place where conflicts happen. They say that in the future, battles could involve using computers to disrupt important systems like power grids, transportation, and communication networks. This idea has led to new words like cyberwarfare and cyberterrorism. Many countries, including the United States Cyber Command, have created special groups to protect their digital systems. Some people, however, think that the danger from cyber attacks might not be as big as people say.

Careers

Cyber security is a fast-growing field. It helps protect organizations from hacking and data breaches. Many places hire cyber security professionals. These include businesses, government agencies, and non-profits. Industries like finance, health care, and retail need these skills a lot because they handle lots of consumer data.

Some common jobs in cyber security are security analysts. They look for weaknesses and suggest fixes. Security engineers monitor and improve security systems. Security architects design security systems. There are also important leadership roles. These include the Chief Information Security Officer (CISO) and Chief Security Officer (CSO). Data Protection Officers (DPO) make sure data laws are followed. Students interested in this field can find training programs and certifications to help start or advance their careers.

Terminology

Computer security uses special words to help keep computers safe. Access authorization decides who can use a computer. This can be done with passwords or biometric scans.

Anti-virus software helps find and stop harmful programs called computer viruses and other malware.

We also make backups. These are extra copies of important files, so we don’t lose data.

Firewalls act like guards. They let only safe traffic pass between networks.

Encryption hides information. This means only the right person can read it, keeping data safe when it travels between computers.

History

Since the Internet became part of our lives, computer security has become very important. For about 60 years, cyber security and cyber threats have been with us. In the 1970s and 1980s, computer security was mostly studied in schools. Then the Internet connected computers, leading to the start of computer viruses and network problems.

Important events helped shape computer security. In April 1967, a meeting organized by Willis Ware started discussions about protecting computers. In 1977, a simple way to describe security goals was introduced, called the CIA triad, which stands for confidentiality, integrity, and availability. Early computer threats were often from people inside organizations who tried to access information without permission. One of the first computer programs to move through a network was Creeper in 1971, which was just an experiment. Later, in 1988, the Morris worm became one of the first widely known computer worms on the Internet.

Notable scholars

Many smart people have helped us learn how to keep computers safe. Some of these important scholars include Ross J. Anderson, Annie Anton, Adam Back, Daniel J. Bernstein, Matt Blaze, and Stefan Brands. Others like Dorothy E. Denning, Peter J. Denning, Cynthia Dwork, and Bruce Schneier have also done important work in computer security. Their research helps protect our information and keep the internet safe for everyone.

This article is a child-friendly adaptation of the Wikipedia article on Computer security, available under CC BY-SA 4.0.

Images from Wikimedia Commons. Tap any image to view credits and license.

Computer security — Safekipedia Adventurer