computer and cyber security
computer and cyber security
Computer security - is the protection of computer systems and information from harm (both
natural and man-made), theft, and unauthorized use. It is the process of preventing and
detecting unauthorized use of your computer system. So, Computer security can be defined
as controls that are put in place to provide confidentiality, integrity, and availability for all
components of computer systems.
Is malicious
2 May or may not be malicious
COMPUTER MISUSE
There are many types and forms of copyright infringement. These are some
examples of activities that would constitute copyright infringement if you carry them
out without first obtaining permission from the owner, creator, or holder of the
copyrighted material:
2. Data theft – Data theft is the act of stealing digital information stored on
computers, servers, or electronic devices of an unknown victim with the
intent to compromise privacy or obtain confidential information.
- SOFTWARE MEASURES
5. Firewalls – devices controlled by software programs that check all the data
communications that come into and go out or the network. It blocks any
communications that do not match its rules. The rules can be set to give the
level of protection that is need for the network.
PHYSICAL MEASURES
1. Prevent people from getting into buildings – electronic door entry systems
are used to prevent access to buildings, and rooms these include
Keypad
ID card – a card swipe read the data held on the magnetic strip give
permission to enter
Smart card – has a chip embedded in it that carries a lot of information
on the user.
Biometric systems – reads fingerprint, palm print, and patterns of the
iris or face and match the images against those already stored in the
systems.
Security guards, alarm systems and security cameras are also used for
prevention of access.
2. Keeping important data away from harm – data must be protected from
deliberate and accidental loss or damage. This can be done by storing data
on hard disks, tapes floppy disks and optical media.
Hardware firewall: