6 vital terms you should know in computer security

Spread the love


Here are the terms you must know in computer security

Information security According to Wikipedia is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.  In my previous article as well, I have talked about the fundamental concept of security which includes precaution, maintenance and reaction. In this article, I want to look at the five layers of security. Follow me as we look at this together.
#1 Physical security
This has to do with the process of safeguarding the personnel, hardware, programs, network and data that you have in your organization. Some of us handle our devices in a way that we make it tempting for hackers. Some will abandon their devices. This contributes to about 10 percent of security incidence in the United States in the year 2011 according to data loss database.
6 computer security
#2 Network security
Network security has to do with the act of protecting the networks and their services from unauthorised modification, destruction or disclosure. This help us to ensure that intruders do not have access to our system, thereby compromising the integrity of our system.
#3 System security
This has to do with the act of protecting the system and its information from theft, corruption and unauthorized access or misuse. It ensures that all users are given necessary training and guidelines so as to avoid “man in the middle” attack.
#4 Application security
This covers the use of software, hardware and procedural methods to protect application from external threats. It has to do with the steps that are taken to ensure that application users obey security rules. It also include all “patches” that are introduced in order to cover backdoors that hackers can use as a medium of attack.
#5 User security
The user security ensures that a valid user is logged in and that the logged in user is allowed to use an application and programs available to him. It also has to do with the authentication process that have to take place before users can have access to the organization’s resources.
 Action Point
If you enjoy our article, sign up to get our next article in your inbox. You need to confirm your subscription by clicking on the link sent to your email. You can check the spam folder for it.Add us to your mailing list to receive directly from us. Thanks.

Leave a Reply

Your email address will not be published. Required fields are marked *

CommentLuv badge