What Security Measures You Need

Security of information, files etc. become important when the computer gets connected to the network. People can access other’s computer anytime so their security is important. Data theft such as information about credit card and bank account numbers, documents, sheets or passwords is increasing due to the lack of the security measures. This data can be misused by the intruders. They can change or modify the source code of the programs. Another important factor in the computer security is the malicious intents where the intruders use an unknown person’s computer to attack other computers and create havoc. Some hackers crash the system or websites which results in data loss. There are some methods to prevent the unauthorized access.
  • Username and Strong Password:
A very common practice for protecting data in computers by setting the user accounts with a unique username and a strong password. The access is denied when the username and password are entered wrong. So passwords should not be easy and have a combination of Uppercase and lowercase alphabets, numbers etc. For example, the weak password is 6 Nov1993. And the example of a strong password is Skl24yZ. Some computers have built-in security option like fingerprint, ID card or voice recognition system.
  • Installing a firewall:
A firewall can be software or a device which is kept between the computer or the LAN and the WAN from where hackers hack (entrepreneur.com).
  • Physical Security:
This should be made sure that no unauthorized person can access any computer in the network physically. So office or server rooms must be locked when no authorized person there.
  • Antivirus Systems:
Viruses can be spread through e-mail, downloading or clicking the malicious link while browsing. Antivirus systems are becoming popular because of the spread of viruses but they are useless less if not up-to-date. So it is important to update the virus information (igcseict.com).
  • Vulnerability Scanner:
The vulnerability scanner is most likely a steroid or port scanners in which the large database system are checked through the scanner and identify the services that are running on the computer. It found the security holes and makes a report. It is a simple tool. The retina is the one example of Vulnerability Scanner (searchnetworking.techtarget.com).
  • Minimum remote access:
The access given to authorized people should be limited and create the passwords and codes strong enough for the hackers to guess and change them with time.
  • Updating programs:
To protect fully keep your computer programs up-to-date so security is increased with the recent updates.
  • Surfing web carefully:
Be careful when surfing the webs and avoid clicking the extra links that look harmless.

Comments