Security of the computer system
Security of the computer system
It is essential to have adopted various prior protective measures for the safety and the durability
of computers. The security of the computer system can be divided in to two parts.
Hardware security
Software security
Let’s protect our computer hardware.
v Computer Hardware.
Any physical component of a computer that you can touch and
see is called as computer hardware. As there hardware devices outside of a
computer, there are hardware inside the system unit too.
v Possible hardware security issues.
Some main factors that may cause physical damage to hardware devices.
Sudden power
failure
damage to hardware devices
Main ways that cause
Overheat inside the
system unit
Issues related on
theft
Dust gathering
Let’s protect computer software components.
Ø Data and information in the computer and programs used for various tasks
come under the category of software.
ex:- Operating System
Word Processing software
File containing documents
Possible software security issues.
Natural
disasters, Threat of
terrorist, malware
attacks, ect…
Unexpected Complications
deletion of in the
files or operating
overheating system
Some
instances that
Unauthorized Sudden power
may cause
access failure
possible threat
to software
Providing protection against malware.
Ø Malware is the main factor that can couse a threat against the
security of computer software
§ Torjan horse
§ Computer worms
Damages caused by malicious software
• Copies kept as backups can be used in case the original copy is misplaced
or damaged. Several storage techniques can be applied to keep backups.
eg:
Compact disks (CD)
Digital Video Disks (DVD)
external hard disks
Different location in the same computer (another folder or another
drive)
3 Access Control
It means the methods and services provided by several software to control access to
computer and safeguard its resources.
• Using strong and difficult to guess password
• Creation of suitable user accounts
• Encryption
By following the above mentioned methods, not only access to computer can be
controlled but also data and information can be protected from sudden loss.
• The computer system, data and information stored in the computers and software
are protected by using devices and methods that are in the form of hardware in this
method.