types of computer security

Types of Computer Security

Computer security is one of the most important issues in organizations which cannot afford any kind of data loss.

Computer security is that branch of information technology which deals with the protection of data on a network or a stand-alone desktop. As every organization is dependent on computers, the technology of its security requires constant development. Here are the different types of computer security. Hardware Security Threat Even if the computer is not plugged into a network, a person can open its cabinet and gain access to the hard drives, steal them and misuse or destroy the data saved on them or, damage the device altogether. It is also necessary to remember that in case one dissembles his computer hardware, the risk of losing coverage of warranty becomes very high. Protection The security of computer hardware and its components is also necessary for the overall protection of data. If a stand-alone system contains some important or classified information, it should be kept under constant surveillance. Locking system for a desktop and a security chain for a laptop are basic security devices for your machine. Certain disk locks are available in various sizes, which control the removal of the CPU cover protecting internal components of the system. For example, you will find disk/tape drive lock, computer case lock with cable and padlock, security cables, etc. A disk lock guards all the internal access points located on the CPU and protects them. Software Security Network Security Computer networks are an integral part of any organization these days, as they facilitate the free flow of data and services to the authorized users. However, such networks also pose a security threat in case the data is classified and confidential, thus making network security a vital necessity. Threats As the data is available only for authorized users, it is possible for hackers to pretend to be one, by providing the correct user name and password. Computer network security can be disrupted or encroached in the following ways: Denial of Service Denial-of-service is meant to disable a computer or a network and can be executed with limited resources. It is one of the most common forms of attacks by hackers and can effectively disable the whole network of an organization. Denial of service attack makes a computer resource unavailable to its intended user. To carry out this kind of attack, hackers generally flood a network or the access routers with bogus traffic. They also make attempts to disrupt connections between two machines and prevent individuals from accessing a service. Trojan Horse Trojan horse is common and one of the most potential threats to computer security. They are malicious and security-breaking programs, disguised as something which is considered as non-malicious by the security software. They are a useful tool for hackers who try to break into private networks. Hackers generally attach Trojan horse to a file, which triggers a virus or remotely controlled software, giving the hacker complete control over the computer. Viruses and Worms Viruses and worms are well-known for their destructive nature and the property of replicating themselves. They are basically pieces of computer program codes, which are written by hackers and other computer geniuses. Sniffing Sniffing is the act of intercepting TCP/IP packets while they are getting transferred on a network. The interception generally takes place through simple eavesdropping done by a hacker. Protection Firewall It is one of the most essential type of network security in today's world of Internet. Firewall is a filter that prevents fraud websites from accessing your computer and damaging the data. However, a firewall is not a great option for securing the servers on the Internet because the main objective of a server is granting access to unknown users to connect to various web pages. Security Software Along with firewall, try installing a good anti-virus and security software to enhance the security level of your computer system.
Data Security
Threat Although uncommon, hardware malfunction can prove to be a major threat to your data in the computer. The life span of hard disks is always limited because of surrounding factors and this can amount to a severe loss of all your files saved on the disk, if there is no proper backup of those files made on any other system. Protection Keep Backup It is important to avoid data and information loss in case of hard disk crashes. The only solution is to regularly keep backups of all the data on other media such as magnetic tapes, CD-ROM, etc. It is a good practice to store the media off-site and in case of a disk crash, restore the information from the backup media onto the new disk. In case a backup media is not affordable, one should try to store the files on at least two different media devices. These media devices should be systematically kept at a place which is safe and secured, as the information contained may be confidential. People usually have backup for database files, spreadsheet files and large documents. As the technical constraints are always there, it is better to take regular backups, in order to avoid any loss of information. Clean-up Software Install a software program on your computer that will clear all the old, unused files and registry keys. It will also help to detect malware and save your computer from a severe damage caused by it. Keep your system in the loop of latest updates and security alerts or else, it will become vulnerable to security threats. It is important to keep a record of technical support consultants and software documentations, like manuals and guides to make them accessible to the staff members of the company.

Похожие статьи