NIS MP
NIS MP
Computer security, the protection of computer systems and information from harm,
theft, and unauthorized use. Computer hardware is typically protected by the same
means used to protect other valuable or sensitive equipment, namely, serial
numbers, doors and locks, and alarms. The protection of information and system
access, on the other hand, is achieved through other tactics, some of them quite
complex. The security precautions related to computer information and access
address four major threats:
(1) Theft of data, such as that of military secrets from government computers;
(3) Fraud, such as employees at a bank channeling funds into their own accounts;
and
1) Virus:
Virus is a malicious program which is loaded into the user’s computer without
user’s knowledge. It replicates itself and infects the files and programs on the
user’s PC. The ultimate goal of a virus is to ensure that the victim’s computer will
never be able to operate properly or even at all.
2) Computer Worm
Computer worm is a software program that can copy itself from one computer to
another, without human interaction. The potential risk here is that it will use up
your computer hard-disk space because a worm can replicate in great volume and
with great speed.
3) Phishing
4) Botnet
To prevent from cyber security risk you have to protect your personal information.
IT security is the first prime issue to protect your personal and others information.
By the way you can keep your information secure using the following tips:
Data theft is act of stealing sensitive information such as bank account details,
credit card information, passwords, and documents which stored on computers,
servers, or other devices. The most common reasons of data breaches are as
follows:
● Malicious insiders
● Application vulnerabilities
● Human Error
So, prevent from data theft you have to ensure your device security by using
endpoint security, lock down your computer, Identify critical data and use
authentication.
1. APPLICATION SECURITY
Fortinet Forti WebCitrix NetScaler App FirewallF5 Advanced WAF Radware AppWall
2. INFORMATION SECURITY
Information security (IS) is the types of computer security which refers to the
process and methodology to protect the confidentiality, integrity and availability
of computer system from unauthorized access, use, modification and destruction.
Information security focuses on the CIA triad model, which ensure confidentiality,
integrity, and availability of data, without affecting organization productivity.
3. NETWORK SECURITY
Antivirus Software
Application Security
Behavioral Analytics
Data Loss Prevention (DLP)
Email Security
Firewalls
Mobile Device Security
Network Segmentation
Security Information and Event Management (SIEM)
Virtual Private Network (VPN)
Web Security
4. ENDPOINT SECURITY
Human error is a major weak point which is easily exploited by cyber criminals. End
users are becoming the largest security risk in any organizations. However, end
user has no fault of their own, and mostly due to a lack of awareness and ICT
policy. They can unintentional open the virtual gates to cyber attackers. That’s
why comprehensive security policies, procedures and protocols have to be
understood in depth by users who accessing the sensitive information .It is better
to providing security awareness training program to them and should cover the
following topics:
5. INTERNET SECURITY
Internet security is the important types of computer security which has defined as a
process to create set of rules and actions to protect computers system that are
connected to the Internet.
CONCLUSION
Now that you have completed this web request on Computer Security you are
now aware of the possible security treats to computer systems. Not only that, but
you are now better able to protect your computers as well as recommend
security measures to others. Have you ever heard the terms Computer Virus,
worms, Trojans, Cybercrime, hackers? Putting your computer in a bank vault with
security officers with shot guns and Rin-tin-tin will not protect your computer’s
data. To protect your data you will have to incorporate the use of special Data
Security software along with the Physical Security methods you have learned.
Have a look at Computer Security Threats as it relates to data security.
Referance:
https://www.google.co.in/
https://www.geeksforgeeks.org/
https://www.tpointtech.com/