Insight Mission World Forum



Join the forum, it's quick and easy

Insight Mission World Forum

Insight Mission World Forum

Would you like to react to this message? Create an account in a few clicks or log in to continue.
Insight Mission World Forum

To facilitate balanced growth of Muslim generation culturally, morally, intellectually and spiritually, to become holistic and insightful in serving the cause of their Creator.


    computer security risk

    avatar
    Abdul basit damilare


    Posts : 14
    Join date : 2013-11-21
    Age : 29
    Location : Ogun state

    computer security risk Empty computer security risk

    Post by Abdul basit damilare Tue Nov 26, 2013 11:51 pm

    CHAPTER 4: COMPUTER SECURITY RISK
    Computer security risk is any event or action that could cause a loss or damage to computer hardware, software, data and information. Also proper security procedure will protect computer and network equipment, and the data they contain, from physical danger such as fire and theft as well as from damages by employees and attackers.
    Importance of computer securities
    1. Avoiding pirated and cracked software
    2. Use of antivirus
    3. Keeping of software updated
    4. Leave the firewall enable and configure it correctly
    5. Leave UAC enable
    Security threats: there are so many computer threats which are really harmful while some are totally annoying.
    1. Trojan- this is one of the most complicated threats among all.
    2. Virus-these is a malicious program where it replicates itself and aim to only destroy a computer.
    3. Worms- is one of the most harmless threats where it is program designed only to spread.
    4. Spyware- is a malware which is design to spy on the victim’s computer.
    Web security: these blocks web threats to reduce malware infections, decrease help desk incidents and free up valuable IT resources.
    DENIAL OF SERVICE
    This is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, motives for, and target of a DOS attack may vary, its generally consists of efforts to temporarily or indefinitely interrupt or suspend service of a host connected to the internet.
    Develop and maintain a security plan to protect both data and physical equipment from loss.
    Keep operating systems and applications up to date and secure with patches and service packs.

      Current date/time is Fri Mar 29, 2024 1:37 am