The different types of security threats, resources and vulnerabilities of computer systems are studied to study the different types of confidentiality, integrity and availability.
The communication of confidential data over the Internet increases every day. Individuals and organizations submit their sensitive data electronically. It is also common for hackers to target these networks. Nowadays, protecting your data, software, and hardware from viruses is more of a necessity than ever, not just a concern. Cyber security is traditionally defined by the three attributes of confidentiality, integrity and availability. Confidentiality is the prevention of unauthorized disclosure of information. Integrity is the prevention of unauthorized modification of information, and availability is the prevention of unauthorized retention of information or resources. This article studies the different types of security threats, resources and vulnerabilities of computer systems.