Computer security means protecting our computer system and the information they contain against unwanted access, damage, destruction or modification.
We need to protect our computer from any inturders such as hackers,crackers and script kiddie.
We do not want strangers to read our email, use our computer to attack other systems, send forge email from our computer, or examine personal information stored on our computer such as financial statements.
Type of computer security
Three type of computer security are:
a) hardware security
b) software security/data security
c) network security
a)Hardware security
refer to security measures used to protect the hardware specically the computer and its related documents.
The examples of security measures used to protect the hardware include PC-locks, keyboard lock, smart cards and biometric devices.
b) Software and data security
refer to the security measures used protect the sofware and the lost of data files
Example of security of measures used to protect the software are activation code and serial number.
An example of security measures used to protect the lost of data files is the disaster recovery plan method. The idea of this plan is to store data, program and other important documents in a safe plase that will not be affected by any major destruction.
c) Network security
The tranfer of data throught network has become a common practice ant the need to implement network security has become significant
Network security refers to security measures used to protect the network system. One example of network measures is firewall. With firewall, network resources can be protected from the outsider.
Personal computer security checklist
In order to make sure our comoputers are secured, here are the computer security checklist to follow.
- do not eat , drink or smoke near the computer
- do not place the computer near open windows or doors
- do not subject the computers to extreme temperatures
- clean the equipment regularly
- place the cable lock on the computer
- use a surge protector
- store disk properly in a locked container
- maintain backup copies of all files
- scan a floppy disk before you open it
- do not open any unknown email received
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.