There are various benefits related with providing the security. They are given below, 
(i)  Confidentiality/ Privacy
(ii)  Integrity 
(iii) Availability (iv)Authentication. (i)  Privacy 
Security ensures that the information available in the system is kept secret, by allowing access only to the authorized users.
(ii) Integrity has following sub types
(a) Hardware Integrity
The physical and the administrative security measures ensure that the hardware is secure from incidental (or) intentional damages and is willingly available round the clock.
(b) Software Integrity
Security ensures  that  the  system  software    free  from  any of the  illegitimate  alterations, damages etc.
(c)  Data Integrity
Security  also  ensures  that  data  files  are secured  from  the unauthorized  access  thereby availability, privacy and integrity is maintained.
(d) Network Integrity
Security mechanisms also prevent the network from theactive and passive attacks.
(iii). Resource Availability
Security also ensures that the computer resources are available only to the legitimate and the authorized users.
(iv). Authentication
Security also ensures that the authentication of users and the resources is done before initiating any of the transaction.
 Disadvantages/Cons of Providing Security:
Apart from the various advantages of it, the security also has certain disadvantages. They are as follows,
      (i) It quite  Expensive
(ii)  It is very much Time consuming
(iii)   Additional resource utilization are required in this
(iv)  Increased employee count are required in this.
(i)  Expensive
Though security mechanisms protect the, software, hardware data and network from the intruders’ interference, they are quite expensive to implement and maintain.
(ii) Time Consuming
Providing privacy, availability, integrity, authenticity etc., involve number of steps to be taken. Thus, they need an additional time.
(iii) Additional Resource Utilization
The  implementation  of  the  security  mechanisms  includes  utilization  of  the additional bandwidth, memory space, hardware and software for storing, downloading  exchanging and implementing the encryption/decryption procedures.
(iv) Increased Employee/Staff Count
Providing security to the number of applications requires the involvement of more number of high-end professionals, hence, more staff must be employed.