The Challenges of Computer Security

             Computer and Network security is both very complex and interesting. Let’s list some sort of challenges;
       I.            Computer and Network security is not simple as it seems; Most of the computer related words can be explained easily, likewise we discussed above Integrity, Availability and Confidentiality. Those words can be explained easily, understand easily. But when it comes to working, those things are quite complex.

    II.             When developing such security system, Developer should always be aware of potential threats. Most of the times successful attacks were designed and attacked by looking complete different way of the problem, So the attacker could identify weak and vulnerable points of security algorithm.

 III.            If we lock up security too hard, then also there will be consequences, such as accessing problems, so it will be a violation of Availability, and also in fact, Integrity. So the security developer has to watch both ends, without loosing either.  The security mechanism should be complex to face various attacks, but not to override CIA triad.

 IV.            Decide, design and place. We should exactly know where to place our security program, otherwise both physically and logically our security mechanism will be vulnerable to third parties, and attackers.

    V.            The most advanced security systems involve more than one person or one company, and also involves more than single particular algorithm or protocol. It is a challenge to connect those parties in a secure way. In purpose of that, Security developers use an encryption key to authorize the access. For example, if the proper functioning of the security mechanism requires setting time limits on the transit time of a message from sender to receiver, then any protocol or network that introduces variable, unpredictable delays that useless.

 VI.            Computer and Network security is commonly known as an endless struggle between security developer and the attacker. But the thing is, if the attacker find a single hole in security chain, attacker can jeopardize the entire security algorithm and, security developer has to reconstruct all the things again.

VII.            There are some modern trends of challenges of Computer security;

§  Defense against botnets
§  Application software security
§  Web services security
§  Electronic payment
§  Electronic passports




Comments

Popular posts from this blog

Unity Guide for newbies - Part II