Unit1 Computer Security
Unit1 Computer Security
Computer security helps to keep healthily computers against viruses, malware and other
unintentional softwares that can prevent computers to run smoothly.
Computer network need to be protected because Cyber criminals, hackers, and identity thieves
present real and dangerous threats to any online system.
Computer threats
Knowing how to identify computer security threats is the first step in protecting a computer. The
threats could be intentional, accidental or caused by natural disasters. Computer threats are
categorized in two categories; physical threats and logical threats:
Computer attacks
Viruses can be contacted through a transfer of documents via a Bluetooth, once one of the computers
is infected with a virus or the document to be transferred is infected.
On corporate network
As with any business asset, hardware, software, networks, and data resources need to be protected
and secured to ensure quality, performance, and beneficial use.
Antivirus
i. Definition
Computers connected to communication networks, such as the internet, are particularly vulnerable
to electronic attack because so many people have access to them. These computers can be
protected by using firewall computers or firewall software placed between the networked
computers and the network. The firewall examines, filters, and reports on all information passing
through the network to ensure its appropriateness.
The Parental Controls feature is a valuable tool for controlling the amount of time the children
spend on the computer and the programs they’re using. Parental controls can filter the web,
blocking inadvertent access to inappropriate websites.
Access control is a security technique that can be used to regulate who or what can view or use
resources in a computing environment.
The user can protect the access to the operating system. The administrator defines the passwords
of users who are allowed to use the computer. If users do not enter the valid credentials (Username
and Password), access will be denied.
Identification occurs when a user (or any subject) claims or professes an identity. This can be
accomplished with a username, a process ID, a smart card, or anything else that can uniquely
identify a subject. Security systems use this identity when determining if a subject can access an
object.
Authorization
Biometric authentication is a security process that relies on the unique biological characteristics of
an individual to verify that he/she is who is says he/she is. Typically, biometric authentication is
used to manage access to physical and digital resources such as buildings, rooms and computing
devices.
Voice identification systems rely on characteristics created by the shape of the speaker’s mouth
and throat, rather than more variable conditions
Encryption and Decryption
Encryption is the process of encoding a message or information in such a way that only authorized
parties can access it. Encryption does not of itself prevent intervention, but denies the intelligible
content to a would-be interceptor.
To read an encrypted file, you must have access to a secret key or password that enables you to
decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text.
Decryption is the process of taking encoded or encrypted text or other data and converting it back
into text that you or the computer can read and understand. This term could be used to describe a
method of un-encrypting the data manually or with un-encrypting the data using the proper codes
or keys. It isreversing encryption process
Cleartext or Plaintext: The original message, before being transformed, is called plaintext. After the
message is transformed, it is called ciphertext. An encryption algorithm transforms the plaintext
into ciphertext; a decryption algorithm transforms the ciphertext back into plaintext.
Storing backup copies of data and having backup computer capabilities are important basic
safeguards because the data can then be restored if it was altered or destroyed by a computer
crime or accident. Here are some considerations for data backups:
b. Recovery point
As with earlier versions of windows, system restore allows to ‘rewind’ windows installation
to an earlier working state, without affecting the documents inside the computer. This is
possible because windows automatically saves restore points when something significant
happens, such as installing a windows update or a new application the idea being that if it
goes wrong, the last restore point (or an even earlier one) can be returned back and get
things performing as they were previously. The problem is that system restore is disabled by
default in windows 10 and shuld therefore be enabled before benefiting from its features.