security for your computer

We use computer to perform several task in our daily life. They are used to process and store valuable information. Some information may be very important to organization. The loss of these important data can cause serious damage to the organization. It takes lots of money and effort to recover them. As the computer system is delicate electronic and electro mechanical system. It should be used and kept safely. If we do not use it properly, its hardware as well as software, may damage any time. Hence, computer security plays a vital role to the growth and survival of any organization. So, proper management of computer is essential for every organization.

Computer security includes the policies, procedures, tools and techniques designed to protect a company’s computer assets from accidental, international or natural disasters, including accidental input our output errors, theft, breaking or physical damage and illegal access or manipulation of data.

The protection of computer system from accidental or intentional harm, including destruction of computer hardware and software, physical loss of data, deception of computer users and the deliberate invasion of database by unauthorized individuals is called computer security. In other words, the protection of computer, its accessories, data and programs for a long life of computer system is known as computer security.Computer security is concerned with the hardware security as well as software security.

HARDWARE SECURITY

Hardware is the essential part of computer system. Computer can not perform any task without hardware. All the physical parts of the computer such as CPU, Mouse, Monitor, Keyboard, Printer etc are known as hardware. Without existence of hardware software is useless. Hardware plays very important role for proper functioning of our computer system. So, we must check and maintain hardware components frequently. We should replace defective parts of hardware immediately. Now-a-days, hardware diagnostic facilities are

available to find defective hardware comments of the computer system.The protection of al l hardware components used in computer system is known as hardware security.

Some common hardware security measures are as follows:

I. Regular Maintenance

II. Insurance

III. Dust free environment

IV. Protection from fire

V. Protection from theft

VI. Air Condition System

VII. Power Protection Devices (UPS, Volt Gu

ard and Spike Guard)

VIII. Avoiding unrelated persons in the computer rooms.

REGULAR MAINTENANCE

Regular maintenance is necessary for proper functioning of our computer system. We should clean our computer and its peripherals regularly by using dust cleaner. We should scan hard disk using latest and updated Anti-virus software to make it virus free. We should format hard disk time to time in order to make our computer system fast. It is better to delete unnecessary files from hard disk. Upgrade some hardware components as well as software to make computer system fast.

INSURANCE

The term Insurance is not new for us. Generally people insurer their health, life, company, building, vehicle, etc. But nowadays many people also insure their computer. If our computer is damaged or lost we can claim for the insurance amount and replace the computer system easily. So, it is being one of the hardware security measures of our computer.

DUST FREE

Dust is one of the major factors which cause infection of our computer system. Dust effect external as well as internal parts of our computer system. So we should keep our computer in the dust free place. We should use dust cover to prevent our computer from dust.

PROTECTION FROM FIRE

Fire is another factor, which cause infection of our computer system. Fire can damage whole computer system. It is very dangerous factor so we must be very careful about fire. It may cause by smoking, so it is better to avoid smoking inside computer room. Another chance is by electricity so proper wining is necessary inside the computer room. Keeping fire extinguishers can be a good idea.

PROTECTION FROM THEFT

As we all know that computer is an expensive machine as compared to other common machines. So we must keep our computer system in the secure place to protect from theft. If we are not careful, someone can easily state important parts of computer system from computer room. We must lock doors of computer room properly. The entry and exit of computer room must be well controlled and monitored. Unknown or unauthorized persons should not be allowed inside the computer room. Construct the computer room with emergency doors and windows. We can hire security guards to guard computer room.

AIR CONDITION SYSTEM

We should maintain suitable temperature and circulation of air in the computer room. Low or high temperature in the computer system may cause unexpected crashes during the operation of computer. Heat can break down contracts or junctions in the chip or other devices. So, there should be proper air condition to maintain suitable temperature in the computer system. Similarly there should be enough light in the computer room. We can use cooler or fan to prevent heat built-up.

POWER PROTECTION DEVICES

The computer system is made of delicate electronic and electro-mechanical components. We all know that it needs electric power to operate. It needs 220-240 Volts (AC) and the frequency of AC should be 49.5 Hz to 50Hz. High voltage or fluctuating voltage may cause several hardware damage. Our important data and programs can be lost due to sudden power failure. To avoid such unpredictable behavior of the power supply, we have to use some kind of power protecting devices. Some power protection devices are:

I. Uninterruptible Power Supply (UPS)

II. Volt Guard

III. Spike Guard

UPS

A computer needs a well regulated power supply for the proper functioning of its various parts. UPS is a device that stores electricity and automatically provides backup power to the computer in case of electricity failure is the source. It is activated when it detects a loss of power from the source and prevents loss of data and damage of computer parts that might be caused due sudden power failure. It also prevents our computer system against sudden power surge. It acts like a buffer between the incoming power supply and the computer system. It constantly monitors the quality and characteristics of the power supply. Nowadays a several different types of UPS having different capacities are available in the market. We should buy UPS from a well-known and reputable company.

VOLT GUARD

Volt Guard is another important power protection device. It provides constant output voltage to the computer system in case of high input voltage coming from the source. As we have known that our computer system needs voltage between 220 to 240volts and high or low voltage affects our computer system. Volt Guard plays important role to save our computer system from damage due to high voltage. If the input voltage comes from the source, it provides constant output voltage between the ranges 220 to 240 volts. So, we must use Volt Guard in our computer system.

SPIKE GUARD

The lightening in the rainy season can cause sudden increase in the voltage level of the AC-line supplied to our house. The voltage can increase more than 2000V in our normal 220V supply. The over voltage can severely damage the electric device running at the time. This sudden over voltage is known as spikes. Spikes are very brief over voltage up to 2000V or more caused due to lightening, power- line faults etc. To save the electronic device from these spikes, we need the special, equipment called spike guard. Spike guards are the electronic device, which remove the spike and prevent it from entering into the main system.

SOFTWARE AND DATA SECURITY

Data and programs or software is very important things. Computer can not perform any task without software. We cannot operate our computer without operating system software. Some information of organization may be very important and the loss of these data can cause serious damage to the organization. It is very costly to recover these important data and some cases that is impossible to recover them. So, data and software security is essential for any organizations as well as every computer users. Software security is the most convenient way of safeguarding our computer system.

The protection of data and programs used in computer system is known as software security.

For protection of data and programs in our computer systems, we should apply some security measures. Some common software security measures are as follows:

Ø Password Protection

Ø Backup System

Ø Defragmentation

Ø Scan Disc

Ø Virus Scanning

PASSWORD PROTECTION

The password scheme is one of the easiest and easiest and reliable method of protecting important data and information in our computer system. It is the common type of authorization control. If we protect our document by using password, only authorized users can open the document. Password is the primary source of data protection; it is a set of characters that acts like a key to unlock the system. Separate password can be used to access a system, an application, or even a file in a given application. The user in an organization who is permitted to access the company database is issued with a user ID and password and only certain level of access rights are provided to them by database administrator.

The success of this type of security depends on the ability of the user to create a password that is difficult to guess and to keep the password confidential. In order to ensure tight system security, many companies have policies that mandate the use of hard to guess passwords or randomly generated password and require employees to change their passwords frequently.

Some common rules while creating password:

· Password must be at least 6 characters.

· The word used in password should be difficult to guess for others.

· We should keep our password confidential.

· We have to change our password frequently.

· Files, which store password, must be encrypted.

BACKUP SYSTEM

Creating backup consists of making extra copies of programs or data. It provides safeguard against the loss of data or programs in computer memory, on hard disk or on diskettes. While creating backup data to a file, we have to give file name and location for the file to be saved. We can create a extra copy of data in our hand disk by using backup utility. Sometime our original data in the hard disk may erase, in that case we can restore our data from backup copy. It is always a good idea to create backup copies of our important data and programs.

DEFRAGMENTATION

Defragmentation is the process of rewriting parts of a file to contiguous sectors on a hard disk to increase the speed of access and retrieval. When files are updated, the computer tends to save these updates on the largest continuous space on the hard disk, which is often on a different sector than the other parts of a file. When the files are fragmented the computer must search the hard disk each time the file is opened to find all of the file parts, which slows down response time.

Thus hard disk needs to be defragmented using disk defragmenter. The defragmenter is available in most of the latest operating system such as windows 98, windows XP, windows vista in its system tool.

SCANDISK

Scandisk feature is used to detect and repair errors on disk. This feature is available in windows 95/98/Me and Dos.6.2 operating systems. The scandisk feature included in windows 95/98 can search corrupted files also.

VIRUS SCANNING

Computer viruses are the most defective factor of data and software. Viruses may damage our data and software. Viruses produce several unusual symptoms in our computer and used to give trouble to the user while working with computer. So, we should keep our computer free from viruses. For that we should scan our computer regularly using latest and updated Anti-Virus software. We can also install an ‘On access’ scanner and configure it to start automatically each time we boot our computer.

USING ORIGINAL SOFTWARE

We should not use pirated software but should go for the original software. The pirated software can contain several viruses. No one can guarantee the stability and performance of the pirated software.

16 comments:

  • Unknown says:
    March 28, 2017 at 8:18 AM

    Mobistealth instantly sends you all incoming text messages and lets you monitor the email activity. When you need to know every bit of information, there is no time to wait, look does spy texts really work find it here.

  • Unknown says:
    July 14, 2017 at 7:53 AM

    Thanks for sharing it
    I really like it this kind of information..........Great blog post and really helpful...... and your blog are very interesting and inspiring.
    Midnightinfo
    CRPF ASI Steno Answer key 2017
    HPU BSc Nursing Answer Key 2017
    GATE Application Form 2018
    JCECEB Para Medical Answer Key 2017
    Bihar TET Admit Card
    TS EdCET Answer Key

  • Anonymous says:
    May 7, 2018 at 5:42 AM

    IT series The Concepts of Information Technology Introduction to Computers & Information Technology Free Education Computers And Software Education website

    Visit:http://itseries.net

    itseries.net

  • Lohar Studio says:
    October 20, 2019 at 8:39 PM

    This is nice and superb post.

    Product Photographer
    Product Photography in Delhi

  • Employee Monitoring Software- RemoteDesk says:
    January 28, 2021 at 9:31 PM

    Thanks for such great article. Remotedesk is the world's most advanced AI-based Best Employee monitoring software 2021 for work-at-home compliance and security

  • Samantha says:
    September 13, 2021 at 6:11 AM

    nice

  • Olivia George says:
    September 13, 2021 at 6:15 AM

    Great article! It is very helpful for me to know about the security of computer. Keep sharing more material like this.
    Refurbrished Desktop Hard Drive

  • LevelUpwestpalm says:
    January 30, 2022 at 8:16 AM

    Level Up florida alcohol and drug rehab Treatment Center in West Palm Beach is located in stunning South Florida. Our clients who are looking for the best alcohol or drug treatment to overcome their fixation for the last time come from the United States, Canada, and even the world to receive our treatment plan.

  • We Level Up Ca says:
    January 30, 2022 at 8:17 AM

    what is dual diagnosis treatment
    World-class We Level Up Addiction Treatment Center providing Dual-Diagnosis Recovery Programs.

  • Unknown says:
    February 3, 2022 at 7:09 AM

    Thanks for sharing the useful blog very informative keep going.
    Used Power Supply

  • Unknown says:
    February 15, 2022 at 12:49 AM

    Your content is well-written and simple enough for a novice to understand. As a result, it can be extremely beneficial to beginners. Thank you for sharing that information. I admire and respect writers like you.
    Sell Apple Smart Watches Online

  • Unknown says:
    March 21, 2022 at 6:35 AM

    Your article is well-written and understandable even to a novice. As a result, beginners may find it incredibly useful. Thank you very much for sharing that information with us. Writers like you inspire me and I admire and respect them.
    sdcz450 128g a46

  • Aditya Rana says:
    October 12, 2022 at 5:07 AM

    The information you are disseminating is excellent since you should think about how to secure your data from cyber attacks before beginning a new business. Skyline IT Management offers services like IT support and cyber security Edmond OK if you want to understand more in-depth.

  • Thomas James says:
    December 2, 2022 at 6:12 PM

    I want to buy wifi router. Can someone suggest me best router? Also I am looking for the company who is providing Cape town wireless installation service at cheapest price. Do let me know if someone can help me.

  • wAnywhere Solutions says:
    April 5, 2024 at 3:46 AM

    In today's interconnected world, the security of our computers is paramount. With cyber threats becoming increasingly sophisticated, safeguarding our digital assets has never been more crucial. From personal information to sensitive data, our computers hold a treasure trove of valuable content that requires vigilant protection.

    In essence, safeguarding your computer requires a multifaceted approach that combines robust AI software solutions, proactive habits, and ongoing vigilance. By prioritizing security and adopting a proactive mindset, you can fortify your digital defenses and navigate the vast expanse of the internet with confidence.

  • Jack says:
    October 26, 2024 at 3:10 AM

    Are you looking to elevate your travel with Asiana Airlines? Need help on How to cancel and refund at Asiana Airlines Flight? For assistance, contact Asiana Airlines at OTA+1 800 970 3794 (no wait).

    How to cancel and refund at Asiana Airlines Flight?

Post a Comment

.

About

website counter