Computer Security May 2026
If you've ever taken a computer security class, you've probably learned about the three legs of computer security—confidentiality, Schneier on Security -
Ensuring that sensitive information is only accessible to those authorized to see it. COMPUTER SECURITY
The "enemies" of computer security are constantly evolving. What started as simple viruses designed to annoy users has turned into a global industry of cybercrime. Hackers now use sophisticated tools like ransomware , which locks a user's files until a payment is made, and phishing , which tricks people into giving away their passwords through fake emails. Furthermore, "social engineering" attacks target the weakest link in any security chain: the human. By manipulating someone into revealing a secret, an attacker can bypass even the most expensive digital locks. If you've ever taken a computer security class,
Guaranteeing that data is accurate and hasn't been tampered with or modified by unauthorized parties. Hackers now use sophisticated tools like ransomware ,
At the heart of any security strategy is a concept known as the CIA Triad , which consists of three main principles:
Ensuring that systems and data are ready and usable when authorized users need them.