security measures

Definition of security measures:
The precautionary measures taken toward possible danger or damage.


Explanation :
Data backup
  • A data backup is the result of copying or archiving files and folders for the purpose of being able to restore them in case of data loss.
  • Data loss can be caused by many things ranging from computer viruses, hardware failures, file corruption, system failure or theft. 
  • If you are responsible for business data, a loss may involve critical financial, customer, and company data. 
  • If the data is on a personal computer, you could lose financial data and other key files, pictures, music and others that would be hard to replace.
Cryptography
Anti-virus
  • Anti-virus software is a program or set of programs that are designed to prevent, search for, detect and remove software viruses and other malicious software like worms, Trojan horses, adware and more.
  • If and when a virus is detected, the computer displays a warning asking what action should be done, often giving the options to remove, ignore, or move the file to the vault.
  • If a virus infected a computer without an antivirus program, it may delete files, prevent access to files, send spam, spy on you, or perform other malicious actions.
  • Examples: Norton anti-virus, AVG anti-virus, Kaspersky anti-virus.
Anti-spyware
  • Spyware is a type of malware that is installed on a computer without the user's knowledge in order to collect information about them. 
  • Once installed, spyware can degrades system performance by taking up processing power, installing additional software, or redirecting users' browser activity.
  • It also can monitors user activity on the Internet and transmits that information in the background to someone else.
  • Spyware can also gather information about email addresses and even passwords and credit card numbers.
Firewall
  • A firewall is a system designed to prevent unauthorized access to or from a private network. 
  • A firewall can be implement either through hardware or software form, or a combination of both. 
  • Firewalls prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. 
  • All messages entering or leaving the intranet (i.e., the local network to which you are connected) must pass through the firewall, which examines each message and blocks those that do not meet the specified rules/security criteria.
  • Rules will decide who can connect to the internet, what kind of connections can be made, which or what kind of files can be transmitted in out.
Physical access control
  • Lock your laptop whether you're at home, in a dorm, in an office, or sitting in a coffee shop, use a security device, such as a laptop security cable.
  • Lock doors and windows, usually adequate to protect the equipment.
  • Put the access code at the door to enter the computer room or your office.
  • Make a policies who can access the computer room or your data center.
Human aspects: awareness
Ethics - Be a good cyber citizen

  • Do not engage in inappropriate conduct, such as cyber bullying, cyber stalking or rude and offensive behavior.
  • Do not use someone else's password or other identifying information. 
  •  




Comments

Popular posts from this blog

INTERNET,INTRANET AND EXTRANET

Network Topology

WEB BROWSER