Security is an essential aspect as far as computer hardware, software and data is concerned. From an individual level to organisations and nations, guarding computer systems against vulnerability is always a priority.
This is to ensure privacy, integrity, availability and safety of the machine and information. Measures have always been put in place against threats such as:
- Hacking: having unauthorized access to information just for fun.
- Crackers: having unauthorized access to information for malicious reasons.
- Phishing: sending emails purporting to be from a genuine source with an intention for inducing the recepient to submit) reveal personal information such account PIN.
- Fraud: stealing by false pretence online.
- Physical theft: making away with computer hardware or software.
- Virus: a malicious program that secretly transfer information to an unknown recipient or alter the smooth running of computer system.
- Alteration: illegal modification of private or confidential data and information with aim of misinforming users.
- Surveillance: monitoring use of computer system and networks using background programs such as coockies so as to use the gathered information for propaganda or sabotage.
- Sabotage: this is the illegal destruction of data & information with the aim of crippling service delivery to an organization.
- Privacy etc.
Also read: structure of the hard disk and how it works.
The ability to verify user credentials before access and use of computer systems. This could be achieved by use of biometrics, passwords and user accounts.
- Data encryption
Information transfered over networks faces vulnerabilities such as copying, tapping and being listened to by illegal personels.
Therefore mixing up information to be transffered over networks into a form that only the sender and receiver is able to understand is a suitable remedy.
Plain text is encrypted by use of a particular algorithm or key then sent as ciphertext on a network. The recepient receives and decrypts it using a reverse algorithm called decryption–key to get the original text.
Without decryption key no one can access the sent message.
- Biometric security
Is a security measure in which human attributes such as facial recognition, voice, finger prints, iris recognition e.t.c are verified before log in.
Also read: how to manipulate objects in windows explore
Also using smartcards, PINs and assigning different passwords and different log in accounts to various levels of personels is an added advantage.
- Buggler proofing.
It include reinforcing physical security for both hardware and software. This can be achieved by employing security personels, fitting strong mettalic grills on all entrances, reinforcing weak points and installing secuty devices such as alarms and cameras.