SECURITY MEASURES
Security measures are measures taken as a precaution (taken beforehand)
against theft or espionage or sabotage or possible danger or failure. Usually
we use antivirus, cryptography, firewall and data backup to protect sensitive
information.
Apply the correct security procedures. ANTIVIRUS, ANTI-
SPYWARE, CRPTOGRAPHY, FIREWALL, DATA BACKUP,
AND HUMAN ASPECTS.
Anti-virus=
-is a utility program that the protects the computers against viruses by identifying
and removing computer viruses found in the computer memory, computer storage
or incoming e-mails files. Examples of antivirus are Norton Antivirus, AVG, Kaspersky, Bitdefender and Not32.
Anti-spyware=
-Is a utility program that protects the computers against spyware.
-Spyware is software or computer program that is designed secretly
record and report an individual`s activities on the internet. Spyware usually
enters your system through the internet, sometimes when you open e-mail or
download software especially shareware and freeware.
-Examples of anti-spyware program are Spybot Search and Destroy, Ad-aware
and Spyware Blaster.
Firewall=
-A firewall is a software or hardware that secures a network, shielding, it from
access by unauthorized users.
-We use fire wall to prevent hacking (unauthorized access is the use of a computer
or network without permission)
Backup=
-Is utility program that makes a copy of all files or selected files that have been
saved onto a disk.
-We backup our data to ensure that our data can still be used if the original is
corrupted and prevent our files from malicious program – virus, Trojan horse,
worm, logic bomb, etc.
-Backup data is important when original data is corrupted.
Note: When data on a computer becomes corrupt, it is spoilt and cannot be
properly used because it has become change in wrong ways.
Cryptography=
-Is a process of transforming plaintext into ciphertext then back againt.
-Encryption is a process of converting plaintext into ciphertext. Decryption
is the process of converting ciphertext into plaintext.
-An encryption key is a formula that the sender of that the data uses to encrypt
plaintext. A decryption key is a formula that the recipient of the data uses to
decrypt ciphertext.
-Until recently, encryption was used only by intelligence service, militaries, and banks.
We use cryptography to secure the information and prevent hacking or unauthorized
access.
Human aspects=
-Refer to the user and also the intruder of a computer system. Human aspect security
is the hardest aspects to give protection to. The most common problem of human aspect
security is the lack of achieving a good information security procedure.
Tiada ulasan:
Catat Ulasan