0% found this document useful (0 votes)
21 views

Unit1 Computer Security

This document discusses computer security and related concepts. It covers why security is important to protect against viruses, malware, and hackers. It defines physical and logical computer threats and outlines various security measures. These include antivirus software, firewalls, access control, authentication, authorization, encryption, backups, and system restore points. Biometric authentication methods like fingerprint and voice identification are also outlined. The document provides definitions and explanations of key computer security concepts.

Uploaded by

ashrafsmith272
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

Unit1 Computer Security

This document discusses computer security and related concepts. It covers why security is important to protect against viruses, malware, and hackers. It defines physical and logical computer threats and outlines various security measures. These include antivirus software, firewalls, access control, authentication, authorization, encryption, backups, and system restore points. Biometric authentication methods like fingerprint and voice identification are also outlined. The document provides definitions and explanations of key computer security concepts.

Uploaded by

ashrafsmith272
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

UNIT 1 : COMPUTER SECURITY

Why computer security?

Computer security helps to keep healthily computers against viruses, malware and other
unintentional softwares that can prevent computers to run smoothly.

Computer network need to be protected because Cyber criminals, hackers, and identity thieves
present real and dangerous threats to any online system.

Computer threats

Knowing how to identify computer security threats is the first step in protecting a computer. The
threats could be intentional, accidental or caused by natural disasters. Computer threats are
categorized in two categories; physical threats and logical threats:







Computer attacks
Viruses can be contacted through a transfer of documents via a Bluetooth, once one of the computers
is infected with a virus or the document to be transferred is infected.

On corporate network
As with any business asset, hardware, software, networks, and data resources need to be protected
and secured to ensure quality, performance, and beneficial use.

Effective security measures can reduce errors, fraud, and losses.

Antivirus
i. Definition

ii. Virus detection


Anti-spyware software is a type of program designed to prevent and detect unwanted spyware
program installations and to remove those programs if installed. Detection may be either rule based
or based on downloaded definition files that identify currently active spyware programs. Notice
that most anti-virus software such as AVG contain inbuilt anti spyware software.

Computers connected to communication networks, such as the internet, are particularly vulnerable
to electronic attack because so many people have access to them. These computers can be
protected by using firewall computers or firewall software placed between the networked
computers and the network. The firewall examines, filters, and reports on all information passing
through the network to ensure its appropriateness.

The Parental Controls feature is a valuable tool for controlling the amount of time the children
spend on the computer and the programs they’re using. Parental controls can filter the web,
blocking inadvertent access to inappropriate websites.

Access control is a security technique that can be used to regulate who or what can view or use
resources in a computing environment.

The user can protect the access to the operating system. The administrator defines the passwords
of users who are allowed to use the computer. If users do not enter the valid credentials (Username
and Password), access will be denied.

Identification occurs when a user (or any subject) claims or professes an identity. This can be
accomplished with a username, a process ID, a smart card, or anything else that can uniquely
identify a subject. Security systems use this identity when determining if a subject can access an
object.

In computer security, general access control includes authentication and authorization.


Authentication and access control are often combined into a single operation, so that access is
approved based on successful authentication, or based on an anonymous access token.
Authentication methods and tokens include passwords, biometric scans, physical keys, electronic
keys and devices.
Authentication

Therefore, Authentication verifies the identity and authentication enables authorization

Authorization

Biometric authentication is a security process that relies on the unique biological characteristics of
an individual to verify that he/she is who is says he/she is. Typically, biometric authentication is
used to manage access to physical and digital resources such as buildings, rooms and computing
devices.

Finger vein ID is based on the unique vascular pattern in an individual’s finger.

Voice identification systems rely on characteristics created by the shape of the speaker’s mouth
and throat, rather than more variable conditions
Encryption and Decryption

Encryption is the process of encoding a message or information in such a way that only authorized
parties can access it. Encryption does not of itself prevent intervention, but denies the intelligible
content to a would-be interceptor.

To read an encrypted file, you must have access to a secret key or password that enables you to
decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text.

Decryption is the process of taking encoded or encrypted text or other data and converting it back
into text that you or the computer can read and understand. This term could be used to describe a
method of un-encrypting the data manually or with un-encrypting the data using the proper codes
or keys. It isreversing encryption process

Cryptosystem: A combination of encryption and decryption methods

Cleartext or Plaintext: The original message, before being transformed, is called plaintext. After the
message is transformed, it is called ciphertext. An encryption algorithm transforms the plaintext
into ciphertext; a decryption algorithm transforms the ciphertext back into plaintext.

Data Backup and recovery point

Storing backup copies of data and having backup computer capabilities are important basic
safeguards because the data can then be restored if it was altered or destroyed by a computer
crime or accident. Here are some considerations for data backups:
b. Recovery point

As with earlier versions of windows, system restore allows to ‘rewind’ windows installation
to an earlier working state, without affecting the documents inside the computer. This is
possible because windows automatically saves restore points when something significant
happens, such as installing a windows update or a new application the idea being that if it
goes wrong, the last restore point (or an even earlier one) can be returned back and get
things performing as they were previously. The problem is that system restore is disabled by
default in windows 10 and shuld therefore be enabled before benefiting from its features.

You might also like