Tuesday, 3 April 2012

Computer Security : Definition and Types

DEFINITION OF COMPUTER SECURITY
Computer security means protecting our computer systems and the information they contain against unwanted access, damage, destruction or modification.

We need to protect our computer from any intruders such as hackers, crackers and script kiddie.

We do not want strangers to read our e-mail, use our computer to
attack other systems, send forged e-mail from our computer, or examine personal information stored on our computer such as financial statements.

TYPES OF COMPUTER SECURITY
Three types of computer security are:

a)   hardware security
b)   software security/data security
c)   network security

a) HARDWARE SECURITY
Hardware security refers to security measures used to protect the hardware specifically the computer and its related documents.

The examples of security measures used to protect the hardware include PC-locks, keyboard-locks, smart cards and biometric devices.

b) SOFTWARE AND DATA SECURITY
Software and data security refers to the security measures used to protect the software and the loss of data files.

Examples of security measures used to protect the software are activation code and serial number. 

An example of security measure used to protect the loss of data files is the disaster recovery plan method. The idea of this plan is to store data, program and other important documents in a safe place that will not be affected by any major destruction.

c) NETWORK SECURITY
The transfer of data through network has become a common practice and the need to implement network security has become significant.

Network security refers to security measures used to protect the network system. One example of network security measures is firewall. With firewall, network resources can be protected from the outsiders.

PERSONAL COMPUTER SECURITY CHECKLIST
In order to make sure our computers are secured,  here are the computer 
security checklist to follow.

2 comments:

  1. Thanks a lot for summing up all about computer security. You do have also proposed the solution to overcome from all these threats and to make the system secure.
    electronic signature FAQ

    ReplyDelete
  2. This blog presented itself in a very easy and clear way. Owner of this blog found a very simple way to express its view but when you read this blog completely, you would get to know about how hard it could be to express such in a easy way.
    C2-Sim

    ReplyDelete