Latest Post:

Computer Security

Computer Security / Cyber Security
• The security given to the computer for protecting computer data, information, program and hardware from being lost and damaged is called computer security. • Proper computer security helps prevent viruses and malware, which allows programs to run quicker and smoother.
Hardware Security
• The protection of computer Hardware from physical loss or theft and accidental harms is called Hardware Security.
Hardware security Measures:
Regular maintenance: Helps to keep computer up to date. It helps to check the computer disk error for detecting and removing errors.
Insurance: In case of computer theft damage or lost we can claim insurance money if computer are insured.
Free from dust: Computer room should be clean and free from dust.
Fire protection: Computer can be damaged and destroyed due to fire so there should be fire extinguisher installed in the computer room.
Power protecting device: The fluctuation and sudden over voltage can damage the computer system so we can use power protecting device. Like UPS, CVT, Spike guard etc.
Protection from theft: We should not allow unauthorized person to enter in the computer room.
Air condition system: Computer should be kept in well ventilated rooms and the temperature of room should be normal between 20 to 25 degrees Celsius. So, air condition system should be installed in the computer room
Why UPS is used in computer system?
UPS is used in computer system to supply backup electric power and to protect computer from power failure and power fluctuation of electric Voltage.
Software security: The protection of software, program data, file, document etc. from being lost, damage or corrupted is known as software security. Some of the software security measures are:
Use of password
• Backup system
• Virus prevention
• Scandisk
• Defragmentation
• Using original software

Information Security (infosec)
The processes and methodologies which are designed and implemented to protect print, electronic, or any other form of confidential, private and sensitive information or data from unauthorized access, use, misuse, disclosure, destruction, modification, or disruption. Key principles of Information Security
a) Confidentiality:- Only authorized users can access the data resources and information.
b) Integrity:- Only authorized users should be able to modify the data when needed.
c) Availability:- Data should be available to users when needed. Security Threats
 A risk which can potentially harm computer systems and organization.  The cause could be physical such as someone stealing a computer that contains vital data.
 The cause could also be non-physical such as a virus attack.
Possible Security Threats
 Internal: The threats include fire, unstable power supply, humidity in the rooms housing the hardware, etc.
 External: These threats include Lightning, floods, earthquakes, etc.
 Human: These threats include theft, vandalism of the infrastructure and/or hardware, disruption, accidental or intentional errors.
 Loss or corruption of system data.
 Disrupt business operations that rely on computer systems.
 Loss of sensitive information.
 Unauthorized access to computer systems resources such as data.