5 Major Elements Of Computer Security

5 Major Elements Of Computer Security


When we talk of computer security in any gathering, we are looking at the security of information that we have stored on the computer. That means those data are free from external attack.


Before you can say that a computer is secured, there are some factors that must be present. It must have some attributes. If anyone of them is missing, that means the computer is not secured. It is as simple as that.

Without wasting time, here are the five elements of a good security system. I do hope that you will examine your security system and make the adjustment. It is not too late to do the right thing.


Now, let’s look at the computer security essentials together…

When we talk of confidentiality in security, it has to do with ensuring that information is assessable only to those authorized to have access.
This is contained in ISO 17799. It entails setting up access and security level that prevents an unauthorized person from having access to information.
5 Major Elements Of Computer Security

authenticity in computer security formation

The principle of authenticity is the identification and assurance of the origin of the information. Here, you are sure that the information actually comes from the right source. You do not have to doubt the sender with this protocol in place.


Also, when talking about integrity in security, it has to do with ensuring that the information is accurate, complete, and reliable and is in its original form.
This guarantees that the information has not tampered within the process of transmission.

availability in computer security formation

In addition, the principle of availability is about ensuring that the information is assessable to authorized persons when required without delay.
There is nothing that must prevent the authorized person from having the information. In order for this to be available, the person must be able to provide the necessary credentials.

non-repudiation in computer security formation

Furthermore, under the principle of non-repudiation, the sender of the information cannot deny that he was not the one that sent the information.
This is possible because the information will always contain their credentials. As long as it has that, the sender cannot say he has not sent the information.

Now your take on this argument.

SEE ALSO  Understanding Project Uniqueness In Project Management

We would also like to hear what you feel about the topic we discussed today. Your feedback is very important to us. Feel free to drop your comments and recommendations. If you have a contrary opinion, you can drop that too.


You can also join our Facebook Page CRMNigeria for more updates. You can do that by clicking on the link or searching for our page on Facebook.


Action Point.
You need to confirm your subscription by clicking on the link sent to you. You can check the spam folder for it. Add us to your mailing list to receive directly from us.

SEE ALSO  Some Recommended Actions for Facebook Search Settings


PS: Click on the link below to sign up for my Online E-Course CRM Training. Make sure you confirm your subscription by clicking on the link sent to you. Thanks.

" This Post Was First Published On CEHNigeria "

Share This Post

Be the first to comment

Leave a Reply

Your email address will not be published.