Different Types of Computer Security

Last Updated on 3 months by Touhid

Computer Security is the protection of digital information and IT assets from all kinds of cyber threats and attacks. There are different types of computer security used to protect the organization’s IT infrastructure.

Types of Computer Security

Computer Security is also known as cyber security which is the protection of computer systems such as hardware, software, network, and electronic data.

In this post, we will cover the different types of computer security such as application security, network security, internet security, data security, information security, and end-user security.

1. Application Security

Application security is the types of cyber security that developing applications by adding security features within applications to prevent cyber-attacks. The attacks can be SQL injection, denial of service (DoS) attacks, data breaches, or other cyber-attacks.

Different types of security tools and techniques such as firewalls, antivirus software, encryption, and web application firewalls can help to prevent cyber-attacks.

A web application firewall is designed to protect web applications by filtering and monitoring HTTP harmful traffic. Here are the most used Web Application Firewalls are:

Application security is the types of Computer Security

Categories of Application Threats

Here are the most common categories of application threats related to software or applications, which are given bellows:

Input validation

Input validation or data validation is the process of correct testing of any input that is provided by users. It is difficult to detect a malicious user who is trying to attack the software and applications.

So, it should check and validate all input data that will be entered into a system.

Here is a list of some of the vulnerabilities that could be solved just by validating input.


Authorization is a security mechanism used to determine user privileges or access to system resources such as computer programs, files, services, data, and application features.

Session management

Session management is a process used by the web container to secure multiple requests to a service from the same user or entity. There are two types of session management: one is cookie-based and another one is URL rewriting.

A web administrator uses session management to track the frequency of visits to an application and movement within the site.

Here is a list of some session-related vulnerabilities such as:

Session management is types of computer security

Parameter tampering

Parameter tampering is a technique in which malicious hackers attempt to compromise an application by manipulating parameters in the URL string.

It is a simple attack targeting the application business logic to modify application data, such as user credentials and permissions, price, and quantity of products.


For example, a shopping site uses hidden fields to refer to its items, as follows:

<input type=”hidden” id=”1001” name=”price” value=”500.00”>

Here, an attacker can modify or alter the “value” information of a specific item, thus lowering its cost.

The parameter manipulation-related threats like query manipulating query string, form field, cookie, or HTTP header.

2. Information Security

This type of computer security refers to the process and methodology to protect the confidentiality, integrity, and availability of computer systems from unauthorized access, use, modification, and destruction.

Information security focuses on the CIA triad model, which ensures confidentiality, integrity, and availability of data, without affecting organization productivity.

3. Network Security

Network security is another types of computer security which is the process of preventing and protecting against unauthorized intrusion into computer networks.

It is a set of rules and configurations designed to protect the confidentiality, integrity, and accessibility of network systems and information using both software and hardware technologies.

Network security protect against unauthorized access

Network Security Methods

There are different components or methods to improve network security. Here, we have mentioned the most common network security components.

4. Endpoint Security

Human error is a major weak point that is easily exploited by cybercriminals. End users are becoming the largest security risk in any organization.

However, the end user does not fault their own, and mostly due to a lack of awareness and ICT policy. They can unintentionally open the virtual gates to cyber attackers.

That’s why comprehensive security policies, procedures, and protocols have to be understood in depth by users who access sensitive information. It is better to provide a security awareness training program to them and should cover the following topics:

  • Cyber security and its importance
  • Phishing and Social Engineering attack
  • Password creation and usage
  • Device Security
  • Physical Security

Learn More About Social Engineering Attack.

5. Internet Security

Internet security is an important type of computer security which is defined as a process to create a set of rules and actions to protect computer systems that are connected to the Internet. It is a branch of computer security that deals specifically with internet-based threats such as:


A Hacker is a person who finds a weakness and exploits the vulnerability in computer systems or networks to gain access. Hacking refers to activities that exploit a computer system or a network to gain unauthorized access or control over systems for illegal purposes.

Internet Security protect computers system

Computer Viruses

A computer virus is a software program that can spread from one computer system to another computer without the user’s knowledge and perform malicious actions. It can corrupt or damage data, destroy files, format hard drives, or make disks unreadable.

There are different types of computer viruses which are as follows:

  • Boot Sector Virus
  • Direct Action Virus
  • Resident Virus
  • Macro Virus
  • Multipartite Virus
  • File Infector Virus
  • Browser Hijacker
  • Polymorphic Virus
  • Web Scripting Virus

A computer virus may spread on your computer and other devices in the following ways:

  • Downloads Software Or Files
  • E-Mail Attachments
  • Phishing Emails
  • External Devices
  • Online Advertisements
  • Click On Malicious File
  • Infected Website
  • Copying Data From Infected Computer
  • Unsolicited E-Mail
  • Social Media Scam Links

Learn More About How Computer Virus Spread?

Denial-of-Service Attacks

A Denial-of-Service or DoS attack is an attack that shuts down a system and makes it inaccessible to the users. It occurs when an attacker prevents legitimate users from accessing specific computer systems, devices, or other resources.

In addition, DoS attacks typically flood a targeted system with requests until normal traffic is unable to be processed, resulting in denial of service to users.


Malware is short for “malicious software” that typically consists of software programs or code. It is developed by cyber attackers which are designed to extensive damage to data and systems.

The malware is delivered in the form of a link or file over email and it requires the user to click on the URL link or open the file to execute the malware.

There are different types of malwares such as computer viruses, spyware, ransomware, worms, Trojan horses, adware, or any type of malicious code.


Finally, computer Security is the protection of the software, hardware, and network of your organization from malicious threats. We have discussed different types of computer security. Hope the article will be helpful for you!

Affiliate Disclosure : Cyberthreatportal is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for website owners to earn advertising fees by advertising and linking to amazon.com.

Add a Comment

Your email address will not be published. Required fields are marked *