Ways to control security threats on your computer

Security is an essential aspect as far as computer hardwaresoftware and data is concerned. From an individual level to organisations and nations, guarding computer systems against vulnerability is always a priority.

Also read: step by step guide to mount your desktop computer 

This is to ensure privacy, integrity, availability and safety of the machine and information. Measures have always been put in place against threats such as: 

  1. Hacking: having unauthorized access to information just for fun.
  2. Crackers: having unauthorized access to information for malicious reasons.
  3. Phishing: sending emails purporting to be from a genuine source with an intention for  inducing the recepient to submit) reveal personal information such account PIN.
  4. Fraud: stealing by false pretence online.
  5. Physical theft: making away with computer hardware or software.
  6. Virus: a malicious program that secretly transfer information to an unknown recipient or alter the smooth running of computer system.
  7. Alteration: illegal modification of private or confidential data and information with aim of misinforming users. 
  8. Surveillance: monitoring use of computer system and networks using background programs such as coockies so as to use the gathered information for propaganda or sabotage.
  9. Sabotage: this is the illegal destruction of data & information with the aim of crippling service delivery to an organization.
  10. Privacy etc. 


Also read: structure of the hard disk and how it works.

  • Aunthentication.

The ability to verify user credentials before access and use of computer systems. This could be achieved by use of biometrics, passwords and user accounts.

    • Firewall

    Software systemthat filters the data and information exchange between different networks by enforcing networks access control policy.

    • Data encryption

    Information transfered over networks faces vulnerabilities such as copying, tapping and being listened to by illegal personels.

    Therefore mixing up information to be transffered over networks into a form that only the sender and receiver is able to understand is a suitable remedy. 

    Plain text is encrypted by use of a particular algorithm or key then sent as ciphertext on a network. The recepient receives and decrypts it using a reverse algorithm called decryptionkey to get the original text.

    Without decryption key no one can access the sent message.

    • Biometric security

    Is a security measure in which human attributes such as facial recognition, voice, finger prints, iris recognition e.t.c are verified before log in. 

    Also read: how to manipulate objects in windows explore

    Also using smartcards, PINs and assigning different passwords and different log in accounts to various levels of personels is an added advantage. 

    • Buggler proofing. 

      It include reinforcing physical security for both hardware and software. This can be achieved by employing security personels, fitting strong mettalic grills on all entrances, reinforcing weak points and installing secuty devices such as alarms and cameras.

      Advertisements
      About

      Tech Writer: I write gadget reviews and tech news

      Tagged with: ,
      Posted in computer lessons, computer systems
      2 comments on “Ways to control security threats on your computer
      1. Oduor protus says:

        This is a good site bro congratulations i like it, please add control buttons for easier navigation

        Liked by 1 person

      Leave a Reply

      Fill in your details below or click an icon to log in:

      WordPress.com Logo

      You are commenting using your WordPress.com account. Log Out / Change )

      Twitter picture

      You are commenting using your Twitter account. Log Out / Change )

      Facebook photo

      You are commenting using your Facebook account. Log Out / Change )

      Google+ photo

      You are commenting using your Google+ account. Log Out / Change )

      Connecting to %s

      Categories
      %d bloggers like this: