Sunday, February 7, 2010

Lesson 16 Computer Security

Definition od computer security

Computer security means protecting our computer system and the information they contain against unwanted access, damage, destruction or modification.

We need to protect our computer from any inturders such as hackers,crackers and script kiddie.

We do not want strangers to read our email, use our computer to attack other systems, send forge email from our computer, or examine personal information stored on our computer such as financial statements.

Type of computer security

Three type of computer security are:
a) hardware security
b) software security/data security
c) network security

a)Hardware security

refer to security measures used to protect the hardware specically the computer and its related documents.

The examples of security measures used to protect the hardware include PC-locks, keyboard lock, smart cards and biometric devices.

b) Software and data security

refer to the security measures used protect the sofware and the lost of data files
Example of security of measures used to protect the software are activation code and serial number.

An example of security measures used to protect the lost of data files is the disaster recovery plan method. The idea of this plan is to store data, program and other important documents in a safe plase that will not be affected by any major destruction.

c) Network security

The tranfer of data throught network has become a common practice ant the need to implement network security has become significant

Network security refers to security measures used to protect the network system. One example of network measures is firewall. With firewall, network resources can be protected from the outsider.

Personal computer security checklist

In order to make sure our comoputers are secured, here are the computer security checklist to follow.

  • do not eat , drink or smoke near the computer
  • do not place the computer near open windows or doors
  • do not subject the computers to extreme temperatures
  • clean the equipment regularly
  • place the cable lock on the computer
  • use a surge protector
  • store disk properly in a locked container
  • maintain backup copies of all files
  • scan a floppy disk before you open it
  • do not open any unknown email received

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.