Computer Security

Computer Security

Protecting our computer systems and the information they contain against damage, unwanted access, destruction or modification is known as Computer Security.

Intruders such as hackers, crackers and script kiddie have to be kept away to ensure the safety of our computer. I am sure that all of us do not want strangers to read our e-mail, use our computer to attack other systems, send forged e-mail from our computer, or examine personal information stored on our computer such as financial statements.

There are 3 types of computer security; hardware security, software security/data security and network security.

HARDWARE SECURITY

Hardware security mean ways to protect the hardware specifically the computer and its related documents.

The examples of security measures used to protect the hardware include PC-locks, keyboard-locks and smart cards.

SOFTWARE AND DATA SECURITY

Software and data security refers to the security measures used to protect the software and the loss of data files.

Examples of security measures used to protect the software are activation code and serial number.

An example of security measure used to protect the loss of data files is the disaster recovery plan method. The idea of this plan is to store data, program and other important documents in a safe place that will not be affected by any major destruction.

NETWORK SECURITY

The transfer of data through network has become a common practice and the need to implement network security has become significant.

Network security refers to security measures used to protect the network system. One example of network security measures is firewall. With firewall, network resources can be protected from the outsiders, therefore, you can feel safe with firewall.

PERSONAL COMPUTER SECURITY CHECKLIST

In order to make sure our computers are secured,

  • Do not eat, drink or smoke near the computer
  • Do not subject the computer to extreme temperatures
  • Do not open any unknown email received
  • Maintain backup copies of all files
  • Stores copies of critical files off sites
  • Scan a floppy disk before you open it

The credit goes to my teacher as she taught me all this and this is the note i made.

If you like my post, kindly bookmark my profile and visit again in future for more information.

If you want to become a member of bukisa, please do so by click the link below:

http://www.bukisa.com/r/thunder02

About Author

Leave A Reply