Hence they are operating well in the business field

This preview shows page 12 - 14 out of 26 pages.

Hence, they are operating well in the business field of IT. 3 Individual Work 3.1 Computer Security: Computer security is a branch of information security which is the process of protecting from malicious intents. Furthermore computer security from using your computer security is detecting unauthorized users and preventing against intruders from using your computer resources for different virus. It also involves the process of safeguarding hackers and crackers. It enclosed several security measure such as software program like firewalls, anti-virus, and user dependent. These software helps to detect malicious and unauthorized access users and prevent your computer for these virus and access. Information security is broad areas of security rather than computer security. Computer security also involved with four main areas which is as bellowed: 1. Confidentiality: computer security is only authorized users can access the data resources and information. It is concerned to prevent and detect unauthorized access users. 2. Integrity: It’s only authorized users should be able to modify the data when needed. 6
Image of page 12

Subscribe to view the full document.

Computing and IT in Workplace 3. Availability: when users needed data should be available. 4. Authentication: authentication is the process of communicating with who you are communicating with. Importance of Computer Security: In current scenario, we can heart about Cybercrime, server down, website hacked, DDOS attack and many more. Computer security help to prevent this things for unauthorized users. There are some reason to important of computer security in current scenario and further as below: Prevention of data theft like (credit card information, bank account numbers, password and essential work documents or files.) Protection of misused by unauthorized intrusions. Prevention of Identity theft. Prevention of derogatory contents such as offensive social accounts, fake misleading and pornographic images. Detect and prevent of malicious intents. Protection of DOS and DDOS attacks. There are so many things which we can’t imaging and prevent for cybercrime. So, It is essential to protect your computer and hence the essential for computer security arise. Sources: [www17] Types of Computer Security: There are three types of computer security which is recognized by computer security experts. These three types of computer security can be explain below: 7
Image of page 13
Computing and IT in Workplace 1. Physical Computer Security: Physical computer security is basic tangible security which is easily control it. Moreover, it is touchable and seeable security types which is easily understandable to protect our computer hardware devices. This types of computer security are lockable doors, security guards, and safe places. It helps to protect their computer hardware such as server computers, database server systems, government and private organization’s computers that is essential part of every areas.
Image of page 14
You've reached the end of this preview.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern