Computer Security
Computer Security
Computer Security
1) ComputerNetworkSecurity
Computer networks are an integral part of any organization these days, as they facilitate
the free flow of data and services to the authorized user
2) ComputerSystemSecurity
The security of computer hardware and its components is also necessary for the overall
protection of data. Even if the computer is not plugged into a network, a person can open
its cabinet and gain access to the hard disk, which can later be used on some other
computer for data theft
3) ComputerInformationandDataSecurity
It is important to avoid data and information loss in case of hard disk crashes. The only
solution is to regularly keep backups of all the data on other media such as magnetic
tapes, CD-ROM, etc.
The Computer Security Law of 1987, was passed by the United States Congress. It was passed
to improve the security and privacy of sensitive information in Federal computer systems and to
establish a minimum acceptable security practices for such systems.
1)Each computer should have an antivirus product installed on it and configured to auto updates
Free alternative: AVG from Grisoft
3)Malware tracks your web surfing, causes pop-up windows,slows down your computer, and
other evil deeds.
4)Use a Safer Email Client, you can use Mozilla Thunderbird.
5)Use a Safer Web Browser, Mozilla Firefox:
A webcam is a video camera which feeds its images in real time to a computer or computer network
This common use as a camera for the web gives the webcam its name. Other popular uses
include security surveillance and computer vision.
They have also become the source of security and privacy issues, as some inbuilt webcams can be
remotely activated via spyware
BEIJING: A computer virus dubbed the world's "first cyber superweapon" by experts and which may
have been designed to attack Iran's nuclear facilities has found a new target -- China.
The term computer system security means the collective processes and
mechanisms by which sensitive and valuable information and services are
protected from publication, tampering or collapse by unauthorized activities or
untrustworthy individuals and unplanned events respectively. The strategies and
methodologies of computer security often differ from most other computer
technologies because of its somewhat elusive objective of preventing unwanted
computer behavior instead of enabling wanted computer behavior.
Computer Security