COMPUTER SECURITY NOTES
COMPUTER SECURITY NOTES
Definition
Computer Security is the process of detecting and preventing any unauthorized use of computer
related materials. It involves the process of safeguarding against trespassers from using your
personal or office based computer resources with malicious intent or for their own gains, or even
for gaining any access to them accidentally.
Cyberspace (internet, work environment, intranet) is becoming a dangerous place for all
organizations and individuals to protect their sensitive data or reputation. This is because of the
numerous people and machines accessing it.
(The world is now like a global village because of networking [Wide Area Network]; ICT –
Integration of computers along with telecommunication devices like modems, telephone lines
etc.)
Why is it successful?
Hacking tools that can be found very easily by everyone just by accessing the internet
and they are endless.
Access to hacking information manuals.
Technology with the end-users has increased rapidly within these years, like internet
bandwidth and computer processing speeds.
Note:
All this can make even a school boy with the curiosity, a potential hacker for your
organization.
What to Secure?
Let’s see this case, you are an IT administrator in a small company having two small servers
staying in a corner and you are very good at your job. You are doing updates regularly, setting up
firewalls, antiviruses, etc. One day, you see that the organization employees are not accessing the
systems anymore. When you go and check, you see the cleaning lady doing her job and by
mistake, she had removed the power cable and unplugged the server.
Note:
In this case, even physical security is important in computer security, as most of us think it is the
last thing to take care of.
Confidentiality:
Integrity
Availability
Information must be available on demand, but to the right owner or registered user.
Computer threats
A threat is a potential danger to an information system which interferes with data security core
principles.
i. Theft
a. Physical
Control measures: employ security personnel. Reinforce weak access points,
b. Intellectual – piracy
Control measures Enforce laws that protect the owners of the propert, make
software and digital content affordable, licences and certificates for genuine
softwares, set admin paswords.