08 February 2010
DEFINITION OF COMPUTER SECURITY
Computer security means protecting our computer systems and the information they contain against unwanted access, damage, destruction or modification.
We need to protect our computer from any intruders such as hackers, crackers and script kiddie.
We do not want strangers to read our e-mail, use our computer to
attack other systems, send forged e-mail from our computer, or examine personal information stored on our computer such as financial statements.
TYPES OF COMPUTER SECURITY
Three types of computer security are:
a) hardware security
b) software security/data security
c) network security
a) HARDWARE SECURITY
Hardware security refers to security measures used to protect the hardware specifically the computer and its related documents.
The examples of security measures used to protect the hardware include PC-locks, keyboard-locks, smart cards and biometric devices.
b) SOFTWARE AND DATA SECURITY
Software and data security refers to the security measures used to protect the software and the loss of data files.
Examples of security measures used to protect the software are activation code and serial number.
An example of security measure used to protect the loss of data files is the disaster recovery plan method. The idea of this plan is to store data, program and other important documents in a safe place that will not be affected by any major destruction.
c) NETWORK SECURITY
The transfer of data through network has become a common practice and the need to implement network security has become significant.
Network security refers to security measures used to protect the network system. One example of network security measures is firewall. With firewall, network resources can be protected from the outsiders.
PERSONAL COMPUTER SECURITY CHECKLIST
In order to make sure our computers are secured, here are the computer
security checklist to follow.
Do not eat, drink or smoke near the computer
Do not place the computer near open windows or doors
Do not subject the computer to extreme temperatures
Clean the equipment regularly
Place a cable lock on the computer
Use a surge protector
Store disks properly in a locked container
Maintain backup copies of all files
Stores copies of critical files off sites
Scan a floppy disk before you open it
Do not open any unknown email received
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment