Chapter 16 (Computer)
Chapter 16 (Computer)
§ Computer security: It is connected with taking care of hardware, software and mostly important
data.
§ A note should be made of all the serial numbers of computer and peripherals because this may be the
only way by which a police can identify stolen equipment
§ When the computer is not in use it is possible with computers to lock the case of the computer which
prevents the computer from being turned on and the key should be kept in a secret place.
§ Data should be backed up regularly and stored securely away from the computer. If the computer
system is stolen the data which would be a lot more expensive to recreate are safe.
§ Al staff should be made aware of security and encouraged to question suspicious behavior.
§ If a ID badge system is used where staff and visitors have to wear a security badge that contains
name photograph etc, then from chairman to cleaner everyone must wear them. so it indicated to
outsiders that the place is security conscious
3 How can you protect computer system from fire, dust and extreme temperature?
§ A computer system can be protected from fire, dust and extreme temperature by using air conditioner
which is important for large mainframe system, the temperature and humidity must be controlled and
the air must be filtrated before it enters the room.
§ Computer virus is a one kind of program that has been created to damage our computer system.
Some problems:
§ It's much faster to upload files.
§ Display a message on the screen.
§ Make the letters start to drop off the screen.
§ Erase the entire contents of our hard disk.
Page 1 of 3
§ Viruses: they are mischievous programs which purpose is to disrupt the sensible use of computers.
§ Antivirus software: It is a software which is used to scan a computer's memory and disks to detect
viruses. After detection, viruses are detected from the memory and disks.
§ Examples: Kaspersky
§ Backing up data: It means taking a copy of the data and keeping it away from the computer in a
secure place so that when the real data is lost the backup data can be useful.
§ We should never keep backup disks near the computer, because if the computer stolen, the backup
disk can also be stolen.
§ If we hold a lot of data which would be difficult to recreate we should keep the backup disk in a
fireproof state to protect our backups against theft and fire.
§ We should keep at least one set of backup disks in a different place.
§ Archiving: It means placing important computer files in a safe place so that they can be found easily
if needed.
§ Encryption: sometimes files which contain sensitive documents are encrypted (coded). If a tape or a
disk consists of important files it would be impossible to read without being encrypted.
§ Firewall: it's both a software and a hardware. It's used to filter unauthorized requests from a outside
user to gain to access with a network.
Page 2 of 3
12. How can we protect our files from theft or misuse?
§ We can protect our files by using a software which doesn't allow access to a computer unless
password is required. The password should be changed regularly and should never be written down.
§ In many large systems software is used to limit each user's access to only those files that are needed
for the performance of their particular job. It's also important to try to restrict access to a computer's
operating system particularly for inexperienced users. Restricted access prevent people from to copy
data from the hard disk.
15. What are the differences between data security and data integrity?
Data security Data integrity
It is used to keep the data safe from the various It is based on the correctness of data. Errors may be
problems that could destroy them introduced into data in a variety of ways. They can
be introduced when the person typing in the data
misreads them off a source document.
Integrity deals with the validity of data. Security deals with protection of data.
Page 3 of 3