Académique Documents
Professionnel Documents
Culture Documents
1.3.1 Definition
Computer security means protecting our computer systems and they contain against
unwanted access, damage, destruction or modification.
a)Malicious code
b)Hacking
c)Natural/environment
d)Theft
Malicious code
The agent of malicious code is the writer of the code, or any person who causes its
distribution. There are various kind of malicious code. They include virus, Trojan Horse,
logic door, trapdoor and back door, worms and any others.
Hacking
Hacker are person who learn about the computer system in detail. They write program
referred to as hacks. Hackers may use a modem or a cable to hack a targeted computers.
a. Flood
b. Fire
c. Earthquakes, storms and tornados
d. Excessive Heat
e. Inadequate Power supply
Theft
threats.
a. software security
b. network security
a. Hardware security
b. Software security
Hardware security refers to the security measures used to protect the software
and the loss of data files. Examples of security measures used to protect the
software are activation code and series number. An example of security
measure used to protect the loss of data is the disaster recovery plan method.
The idea of this plan is to stored data, program and others important
documents in a safe place that will not be any major destruction.
c. Network security
The transfer of data through network has become a common practice and the
need to implement network security has become significant. Network security
refers to security measure used to protect the network system. One example of
network security measure is firewall. With firewall, network resources can be
protected from the outsiders.
Antivirus
An anti-virus program scans for programs that attempt to modify the boot program, the
operating system and others program that normally are read from but not modified.
Identifying virus
Anti- Spyware
Spy ware is a program placed on a computer without the user’s knowledge. It secretly
collects information about the user. The spyware program communicates information to
the outsides source. An anti-spyware application program sometimes called tracking
software or a spy bot is used to remove spyware.
Cryptography
Firewall
Type of firewall
1. Screening routers
-simplest
2. Proxy Gateway
-somewhat complex
3. Guard
-most complex
Data backup
Data backup is a program of file duplication. Backups of data applications are necessary
so that they can be recovered in case of an emergency. Depending on the important of the
information, daily, weekly or biweekly backups from a hard disks can be performed.
Human aspects
Human aspects refers to the users and also the intruder of a computer system. It is one of
the hardest aspect to give protect to. The most common problem is the lack of achieving a
good information security procedure.
References website
1. http://en.wikipedia.org/wiki/Computer_security
2. http://www.cert.org/tech_tips/home_networks.html
3. http://www.secure-computing.info/