Insight Mission World Forum



Join the forum, it's quick and easy

Insight Mission World Forum

Insight Mission World Forum

Would you like to react to this message? Create an account in a few clicks or log in to continue.
Insight Mission World Forum

To facilitate balanced growth of Muslim generation culturally, morally, intellectually and spiritually, to become holistic and insightful in serving the cause of their Creator.


    information technology

    avatar
    Afolabi Wasiu


    Posts : 25
    Join date : 2013-11-20

    information technology Empty information technology

    Post by Afolabi Wasiu Wed Nov 27, 2013 2:03 am

    INTRODUCTION TO SECURITY AND RISK
    The following content are to be discussed under these security and risk
    -Security threats
    -types of threat security
    -potential threat
    -viruses, worm, and Trojan horse
    Protecting equipments
    Protecting data
    -conclusion
    Firstly, Security threats are threats possible danger that might exploit a vulnerability to breach security and thus cause possible harm.
    There are two types of security threat namely physical and data security threats.
    Physical threat can be classified in different forms like, theft, damage or destruction of the computer.
    Data threat can also be classified as follows, removal, corruption, denial of access, unauthorized access, theft of information.
    There are some potential threat than occur also to our computer security, and they are mainly classified into two which are; external threat and internal threat.
    External threat is the one through which outside users can easily attack in an untrusted and destructive way
    Internal threats are those done by employees maliciously or accidentally.
    There are also viruses, worms and Trojan horses that are used to attack a computer system.
    Viruses are computer soft wares that are created by an attacker. These viruses usually collect sensitive information to alter or destroy information .
    Worm is a self-replicating program that uses the network to duplicate its code to the host on the network.
    Trojan horses is technically a worm and is named for the ability of getting past computer defaces by pretending to be something useful.
    There are also spams and pop-up windows, spams are unsolicited emails which can be used to send harmful links or deceptive contents, while pop-ups are windows that automatically open and one designed. To focus on the attention and it leads you to advertising sites.
    Because of these, there are some security policies which are usually observed and these are; what assets require protection, the possible threat and should be done in the event of security breach.
    Protection of equipment
    To control access to facilities.
    Use cable locks.
    Lock telecommunication rooms.
    Use security screw
    Use security cage around equipment
    Label and installed sensory on equipment
    PROTECTING DATA
    1. Use password protection
    2. Data encrypton
    3. Port protection
    4. Data backup
    5. System security.

    Conclusion
    We have discussed about security threats, the types and potential threat of the computer security and more or less the viruses the worm and trojan horse, protecting equipment as well as data protection.



      Current date/time is Thu May 09, 2024 12:37 am