An Outline of Computer Security
Auto Beauty Business Culture Dieting DIY Events Fashion Finance Food Freelancing Gardening Health Hobbies Home Internet Jobs Law Local Media Men's Health Mobile Nutrition Parenting Pets Pregnancy Products Psychology Real Estate Relationships Science Seniors Sports Technology Travel Wellness Women's Health

An Outline of Computer Security

Computer security is extremely important. This is so because all data stored in a computer contains people’s information that identifies them. With the growth of identity theft, the importance of keeping this information safe and secure cannot be underestimated. The basic aim of computer security is to enable people to carry out their jobs, tasks and research safely. It is essential for protecting vital business process and protecting sensitive information (Including personal information.

The word security is well understood. It refers to protecting assets, like a farm or a house. Similarly computer security is concerned with safeguarding the assets of a computer. The assets of a computer are the information and data which is stored on its hard disk.   Real world security systems vary. As an example a building may be secure against certain types of attacks, but not all. Similarly computer security systems provide different types of security.

Computer security means security of information and its prevention against unauthorized access. This means preventing and detecting unauthorized use of the computer. It also includes security against virus and malware (Malicious computer software) that can affect a computer and seriously hamper its working. Computer security also includes protection from unplanned events and natural disasters.

Computer security is extremely important. This is so because all data stored in a computer contains people’s information that identifies them. With the growth of identity theft, the importance of keeping this information safe and secure cannot be underestimated.

The basic aim of computer security is to enable people to carry out their jobs, tasks and research safely. It is essential for protecting vital business process and protecting sensitive information (Including personal information.

 Computer security greatly depends on the conduct of the user. Any user using a computer must set up a system of passwords that limit the access to the computer. There are separate rules for setting up passwords. They should not common, which can be easily broken, but must be complex with a combination of letters and figures and upper/lower case letters. It is also imperative to change the passwords at infrequent intervals. Good security standards are 90% personal and 10% technical.

 The user will also have to maintain discipline on the net. It is advisable not to click on any unsolicited links or attachments. In addition unknown files or programs should not be down loaded.

 The operating system needs to be protected as well. The computer must be protected against virus and malware with the latest up-to-date antivirus and anti-spyware software. This is easily available on the net or the market for a fee. Antivirus software is marketed by many companies like AVG, Kaspersky, Quick Heal etc. The user can select any antivirus depending on the price and protection offered.

 t is important to carry out a computer scan at frequent intervals. This may take anything from 30 minutes to an hour. Once the antivirus is installed, the company will allow you to update the protection from the net. This should be carried out as and when update is available.

 While using the computer the user must avoid sending sensitive information by standard, unencrypted e-mail or Instant Messaging (IM) services.  In case a user notices any unusual activity, its best to notify the appropriate contact.

 Computer security is a vast field and large computer systems like those  used by government agencies have many layers of security in water tight modules. In case a module is breached, the hacker will not be able to access the other modules.

Need an answer?
Get insightful answers from community-recommended
experts
in Internet Security on Knoji.
Would you recommend this author as an expert in Internet Security?
You have 0 recommendations remaining to grant today.
Comments (0)
ARTICLE DETAILS
RELATED ARTICLES
RELATED CATEGORIES
ARTICLE KEYWORDS