security
Security software is available in many forms. For users who intend to surf the Internet, antivirus software is the basic software should be owned. This antivirus software will scan every file sent and received from the internet to check the probability of a virus. Two major antivirus software suppliers are Norton and McAfee. both the supplier has a good reputation in the international market. To remain effective, antivirus software should be updated often because many viruses are created every day. The virus enters the operating system when it successfully invades undetected.
protection
Addition of firewall system is a personal choice. This system will provide another layer of added protection when users on the Internet. Each program must obtain permission from the firewall to the computer to send and receive any information that comes from the Internet. Computer firewall can be modified, allowing users to allow any program that they can trust. For programs that do not know the origin, Firewall will block any action by any of these programs to seek permission from the user.
protection and security concept.
Protection concepts
The aim of the concept of computer virus protection is to create suitable safeguards with which the occurrence of computer viruses in the IT systems of an organisation can be prevented or detected as early as possible. In this way, countermeasures can be taken and possible damage can be minimised. In the protection against computer viruses it is essential that the safeguards are consistently adhered to and that technical countermeasures are constantly updated. This requirement is due to the continual occurrence of new computer viruses or variants of viruses. The development of operating systems, programming languages and application software may also provide opportunities for computer viruses to attack. This should therefore be taken into account and suitable countermeasures should be taken.
Security concepts
Certain concepts recur throughout different fields of security:
Assurance - assurance is the level of guarantee that a security system will behave as expected
Countermeasure - a countermeasure is a way to stop a threat from triggering a risk event
Defense in depth - never rely on one single security measure alone
Exploit - a vulnerability that has been triggered by a threat - a risk of 1.0 (100%)
Risk - a risk is a possible event which could cause a loss
Threat - a threat is a method of triggering a risk event that is dangerous
Vulnerability - a weakness in a target that can potentially be exploited by a threat security
7.1Recognize security policy and mechanism.
Protection mechanisms
In computer science, protection mechanisms are built into a computer architecture to support the enforcement of security policies. A simple definition of a security policy is "to set who may use what information in a computer system.
· a mechannism for controlling the access of programs, processes, or users the resources defined by the computer system.
· the protention mechanism ensures the enforcement of a certain policy.
· policy is established in several ways:
ü system design.
ü system management.
ü user defined.
Security in computer system
· security is an enternal operating systems problem-providing controlled access to programs and data stored in the computer
· security is mainly focused on malicious behavior of entities external to the system,affecting computer assets:
ü software.
ü data
ü Hardware
Software mechanism
A compatibility mode is a software mechanism in which a computer's operating system emulates an older processor, operating system, and/or hardware platform in order to allow obsolete software to remain compatible with the computer's newer hardware or software.
Hardware mechanisms that protect computers and data
Hardware based or assisted computer security offers an alternative to software-only computer security. Devices such as dongles may be considered more secure due to the physical access required in order to be compromised.
Security Policy
A computer security policy defines the objectives and elements of computer system organization. This definition is very formal or regular informal. Security policy enforced by organizational policy or security mechanisms. A technical implementation of defining what a computer system is not secure or safe.
Elaborate authentic basic.
password
A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password should be kept secret from those not allowed access.
Artifact
In natural science and signal processing, an artifact is any error in the perception or representation of any visual or aural information introduced by the involved equipment or technique(s).[1]
In computer science, digital artifacts are anomalies introduced into digital signals as a result of digital processing.
In microscopy, artifacts are sometimes introduced during the processing of samples into slide form. See Artifact (microscopy)
Biometric
Biometrics consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance.
Elaborate protection concept and access control.