5 layers of computer information security

2
47

 

BECOME A PROUD LANDLORD WITH NCPL. CLICK HERE TO LEARN MORE

In my previous article, I have talked about the fundamental concept of security which includes precaution, maintenance and reaction. In this article, I want to look at the five layers of security. Follow me as we look at this together.

 

physical security

This has to do with the process of safeguarding the personnel, hardware, programs, network and data that you have in your organization. Some of us handle our devices in a way that we make it tempting for hackers. Some will abandon their devices. This contributes to about 10 percent of security incidence in the United States in the year 2011 according to data loss database.

 

network security

Network security has to do with the act of protecting the networks and their services from unauthorized modification, destruction or disclosure. This help us to ensure that intruders do not have access to our system, thereby compromising the integrity of our system.

layers computer information security

system security

This has to do with the act of protecting the system and its information from theft, corruption and unauthorized access or misuse of your device. It ensures that all users are given necessary training and guidelines so as to avoid “man in the middle” attack.

 

application security

This covers the use of software, hardware and procedural methods to protect application from external threats. It has to do with the steps that are taken to ensure that application users obey security rules. It also include all “patches” that are introduced in order to cover backdoors that hackers can use as a medium of attack to your device.

 

user security

The user security ensures that a valid user is logged in and that the logged in user is allowed to use an application and programs available to him. It also has to do with the authentication process that have to take place before users can have access to the organization’s resources.

 

P.S: If you enjoy this article, please help me share it on social media, so as to reach more people with this article. Thanks so much as you are doing this for me.

 

Like Us on Facebook : CRM Executives Hangout
Follow us on Twitter: @cehnigeria
Pinterest: adeniyi5390




Related Post

SHARE
Previous article3 fundamental concepts in security
Next article5 ways smart hackers get their victims

Salau Adeniyi Olayinka (CEP, MCTP,CSCU) is an accomplished Digital Marketer and E-Business Consultant . His passion is writing and sharing of knowledge and meeting people. He intends to use this blog to boost ICT and E-Business Knowledge in Nigeria and beyond.
He is currently the Digital Marketing & I.T Executive for New Creations Properties Limited , a Real Estate Firm in Ogun State, Nigeria as well as the CEO of Fourth Mouse Consulting , a Digital Marketing firm in Nigeria.

2 COMMENTS

  1. All except physical security will be guarenteed through a perfect antivirus internet security, here perfect means just an updated version of an antivirus, good insights you provided here, great job.

    • Ajay. Its been a while. I am so glad to hear from you. Friends. Ajay is an expert in his field. You can click on the link to visit his blog and read more about device security.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

CommentLuv badge