6 vital terms you should know in computer security

 

Here are the terms you must know in computer security



information security According to Wikipedia is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.  In my previous article as well, I have talked about the fundamental concept of security which includes precaution, maintenance and reaction. In this article, I want to look at the five layers of security. Follow me as we look at this together.
#1 Physical security
This has to do with the process of safeguarding the personnel, hardware, programs, network and data that you have in your organization. Some of us handle our devices in a way that we make it tempting for hackers. Some will abandon their devices. This contributes to about 10 percent of security incidence in the United States in the year 2011 according to data loss database.
6 computer security
#2 Network security
Network security has to do with the act of protecting the networks and their services from unauthorised modification, destruction or disclosure. This helps us to ensure that intruders do not have access to our system, thereby compromising the integrity of our system.
#3 System security
This has to do with the act of protecting the system and its information from theft, corruption and unauthorized access or misuse. It ensures that all users are given necessary training and guidelines so as to avoid “man in the middle” attack.
#4 Application security
This covers the use of software, hardware and procedural methods to protect an application from external threats. It has to do with the steps that are taken to ensure that application users obey security rules. It also includes all “patches” that are introduced in order to cover backdoors that hackers can use as a medium of attack.
#5 User security
The user security ensures that a valid user is logged in and that the logged in user is allowed to use an application and programs available to him. It also has to do with the authentication process that has to take place before users can have access to the organization’s resources.

Action Point

If you enjoy our article, sign up to get our next article in your inbox.

 

You need to confirm your subscription by clicking on the link sent to you. You can check the spam folder for it. Add us to your mailing list to receive directly from us.

 

PS: Click on the link below to sign up for my Online E-Course CRM Training. Make sure you confirm your subscription by clicking on the link sent to you. Thanks.

image_pdfGENERATE PDFimage_printPRINT

Be the first to comment

Leave a Reply

Your email address will not be published.


*


CommentLuv badge