0% found this document useful (0 votes)
11 views

Security of the computer system

Uploaded by

kavishkeshan200
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

Security of the computer system

Uploaded by

kavishkeshan200
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Security of the computer system

Let’s protect our computer system

It is essential to have adopted various prior protective measures for the safety and the durability
of computers. The security of the computer system can be divided in to two parts.

Hardware security

Software security
Let’s protect our computer hardware.

v Computer Hardware.
Any physical component of a computer that you can touch and
see is called as computer hardware. As there hardware devices outside of a
computer, there are hardware inside the system unit too.
v Possible hardware security issues.
Some main factors that may cause physical damage to hardware devices.

Sudden power
failure
damage to hardware devices
Main ways that cause
Overheat inside the
system unit

Sudden flow high


voltage currant

Issues related on
theft

Dust gathering
Let’s protect computer software components.

Ø Data and information in the computer and programs used for various tasks
come under the category of software.
ex:- Operating System
Word Processing software
File containing documents
Possible software security issues.

Natural
disasters, Threat of
terrorist, malware
attacks, ect…
Unexpected Complications
deletion of in the
files or operating
overheating system

Some
instances that
Unauthorized Sudden power
may cause
access failure
possible threat
to software
Providing protection against malware.

Ø Malware is the main factor that can couse a threat against the
security of computer software

These are several types of malware,

§ Computer virus § Spyware

§ Torjan horse

§ Computer worms
Damages caused by malicious software

• Deletion, hiding or modification of data / information.


• Creation of new files and folders that
• do not belong to the user.
• Deletion, mal-function or alteration of
• the software behaviour.
• Decrease efficiency of the computer.
• Unusual behaviour in computer networks such as sudden
• disconnection or malfunction of network and the inability to
• work with the network as usual.
• Unusual reduction in the capacity of storage devices
Possible solutions to avoid or minimize the harm caused by malware

• Install an antivirus software and update


• it regularly.
• Open an external storage device only after
• scanning it for possible viruses.
• Activate firewall and make right settings.
• If using internet, always access secure websites only.
• Do not open black listed websites shown by antivirus
• software.
• Do not click on pop-ups that suddenly appear on the screen.
• Do not open suspicious emails or attachment.
• For daily use, normally maintain a Limited User Account which
• can allow only a limited number of tasks.
• Update all software installed in the computer including the
• operating system
• Use only the original copy of licensed software. Use of pirated
2 Keeping Backups

• Keeping backups can be defined as a process of keeping copies of software


components.

• Copies kept as backups can be used in case the original copy is misplaced
or damaged. Several storage techniques can be applied to keep backups.
eg:
Compact disks (CD)
Digital Video Disks (DVD)
external hard disks
Different location in the same computer (another folder or another
drive)
3 Access Control

Providing software solutions for access control

It means the methods and services provided by several software to control access to
computer and safeguard its resources.
• Using strong and difficult to guess password
• Creation of suitable user accounts
• Encryption

By following the above mentioned methods, not only access to computer can be
controlled but also data and information can be protected from sudden loss.

Encryption is another way of protecting data. Encrypted data


cannot be read and understood even if it falls into wrong hands.
This method is adopted especially when sensitive data is to be
communicated.
Use of physical locks for access control

• The computer system, data and information stored in the computers and software
are protected by using devices and methods that are in the form of hardware in this
method.

For this, following methods are used.

1. Keeping the computer at a secure place.


It is advisable to keep the computer that contains sensitive and valuable data,
information at a secure place, so that it will be protected from thieves and unlawful
entry of people.

2. Use of CCTV cameras and alarms


Tasks such as monitoring movements when necessary, provision of automatic
urgent messages are done by this system.
3. Use biometric passwords
At present, finger prints and voice recognition methods are widely used to access
computer systems and to open doors of the computer laboratory.
Unlike a conventional password, using
biometric passwords is somewhat a
modern method. Permission to access the
system is granted only after recognizing
authorized person’s identity through
finger prints, voice, face or iris
Thank You !
Kavish Keshan

You might also like