3 great triangles of computer security arrangement

Domain names for just 88 cents!

computer security arrangement

Computer security is one reoccurring theme on my blog. This is because security is something I love so much. I have been a victim of security negligence and I would love to help others.

In my previous article, I have looked at some of the elements of security. In this article, I want to look at the triangles of security. 

 

A triangle has three sides. Maybe it was named triangles of security because it has three sides.

I want to look at that three sides. You should know that when any of it is missing, we cannot say that the computer is secured. Now let us examine the three in details in this article.

 

ease of use
This is a dilemma. We want our computers and other devices to be easy to use. Besides that, we want it to be secured. I am currently using one to secure my Android phone.

Believe me, I am already thinking of removing it. It is a lot of stress to swipe and open my phone. You should note that when you are moving too much towards ease of use, your computer can never be secured.

functionality

This is the second side of the angle. We want the device to be secured. We also want it to be able to perform the function that it needs to perform. You should be able to chat and download games without any hindrance.

I know how some of us will react when password pops up when you are downloading.

That is the challenge that we have to cope with. Devices are designed to perform their routine functions but that does not mean we should compromise security. 

security

These are restrictions that are enforced on device users in order to secure their devices. They are logged out at intervals in order to restrict access. Sometimes as the device user, you are made to pass through hell when you forget passwords.
computer security arrangement
These are some of the headaches we have to live with in order to guarantee computer security. 

Above all, when you move towards one angle of the security ball, you are gradually moving towards the others. You cannot eat your cake and have it. 

Action Point
If you enjoy our article, sign up to get our next article in your inbox.

You need to confirm your subscription by clicking on the link sent to you. You can check the spam folder for it. Add us to your mailing list to receive directly from us. 

PS: Click on the link below to sign up for my Online E-Course CRM Training. Make sure you confirm your subscription by clicking on the link sent to you. Thanks.

 

YOU CAN ALSO READ  How malicious software propagate itself

Related Post

Advertisements

Add a Comment

Your email address will not be published. Required fields are marked *

CommentLuv badge

This site uses Akismet to reduce spam. Learn how your comment data is processed.