Meri Leeworthy

Challenges to computer security

While it is simple to stipulate a set of properties that must be met in order to achieve security, the actual implementation and enforcement of those properties are far from simple. When considering computer security, the following aspects impact how secure a system is.

The type of attack

Security attacks can be classified based on the type of attack or the source of the attack, as follows:

The mechanism used to perform the attack

The attack mechanism is the mode employed by the attacker in order to attack the system. An attacker can choose to compromise one of the many parts involved in the communication between the sender and the receiver. Through this mechanism, an attacker can also have a very different target that they hope to exploit as a result of the attack. Some examples could include the system itself, a specific software in use on the machine, a protocol used by the system or its peripherals, an installed software, or even the network via which the systems are communicating. The possible combinations that can be used by the attacker are extensive. As no two systems are exactly the same, the job of securing all systems can become challenging.

The service or functionality targeted

Through the attack process, an attacker generally aims to gain an advantage over the target system(s). This advantage can be gained by exploiting some service or functionality offered by the system. The outcome of the advantage could be to get access to certain information or resources or to compromise the integrity of the data or information being transmitted.

Challenges to computer security

When considering the above aspects collectively, we can see now why securing a computing system is not a very simple task. There are many possible alternatives that an attacker can use to attack a system and in order to secure it, we first need to understand the different ways an attacker could compromise the system. The following are some challenges that pose a challenge to computer security:

As we can observe, all the above affect the complexity associated with securing a computer system from an attacker.

See also from my notes: Challenges of cybersecurity

Next: Types of security attacks

I live and work on the land of the Wurundjeri people of the Kulin Nation. I pay respect to their elders past and present and acknowledge that sovereignty was never ceded. Always was, always will be Aboriginal land.

This site uses open source typefaces, including Sligoil by Ariel Martín Pérez, and Vercetti by Filippos Fragkogiannis