Home Random Page


CATEGORIES:

BiologyChemistryConstructionCultureEcologyEconomyElectronicsFinanceGeographyHistoryInformaticsLawMathematicsMechanicsMedicineOtherPedagogyPhilosophyPhysicsPolicyPsychologySociologySportTourism






Security measures to protect hardware and software

Computer security involves safeguarding computing resources, ensuring data integrity, limiting access to authorized users, and maintaining data confidentiality. Effective computer security therefore involves taking physical security measures (to ensure hardware and media are not stolen or damaged), minimizing the risk and implications of error, failure or loss (for example by developing a resilient back-up strategy), appropriate user authentication (for example by employing strong passwording), and possibly the encryption of sensitive files.

Computer security can takes two forms. Software security provides barriers and other cyber-tools that protect programs, files, and the information flow to and from a computer. Hardware security protects the machine and peripheral hardware from theft and from electronic intrusion and damage.

These security measures include:

Ø Secure data backup (The loss of a PC or server also means you may have lost potentially critical business data. Therefore, it is important to take security measures for both hardware and data, for example, by backing the data up in a second location. Methods of backup include external hard drives, pen drives or memory sticks)

Ø Power supply backup (An uninterruptible power supply will make sure that your key components will continue to operate for a short time even if there is a power cut. This will give you time to shut systems down in an orderly fashion)

Ø Computer maintenance (It is about computer cleaning, maintenance of disk drive, registry maintenance and etc.)

Ø Physical secure measures (Here I mean theft of computer hardware, for example laptops should always be equipped with security cables and securely locked away when not in use.)

Computer software security refers to the use of software to prevent damage to computer files, programs, and operating systems, as well as to monitor a personal computer (PC) or laptop for theft.

These security measures include:

Ø Installing antivirus protection

Ø Updating your programs regularly (Becausemaking sure your computer is "properly patched and updated" is a necessary step towards being fully protected)

Ø Putting up a strong firewall (A firewall protects your network by controlling internet traffic coming into and flowing out of your computer)

Ø Establishing strong passwords (Implementing strong passwords is the easiest thing you can do to strengthen your security. Use a combination of capital and lower-case letters, numbers, and symbols, and make it 8 to 12 characters long)

Top 5 measures which can help to protect your computer.

1) Using a strong password as I said before.

2) Protect your confidential information.

3) Make sure your operating system and virus protection are up-to-date.

4) Use secure and supported applications. Any software you install has the potential to be exploited by hackers, so be very careful to only install applications from a trusted source.



5) Be wary of suspicious e-mails. Never click on a link in an email; if you're tempted, cut and paste the URL into your browser. That way, there's a good chance your browser will block the page if it's bad. And don't open email attachments until you've verified their legitimacy with the sender.
Following these advice you can reduce the risk of identity exposure, account hijacking, malware and so on.

The future of IT

We live in a time when discoveries in science and technology are happening at a pace that makes it difficult to stay informed. The full potential of these changes are continuously evolving.

Today many employees already have hand-held devices such as smartphones or tablets. These devices can be repurposed to access enterprise services.

Personalization is the ability to provide content and services that are tailored to individuals based on knowledge about their preferences and behavior.

Telepresence refers to a set of technologies which allow a person to feel as if they were present, to give the appearance of being present, or to have an effect, via telerobotics, at a place other than their true location.

The Robotics branch of technology deals with the design, construction, operation, development and application of robots, and computer systems for their control, sensory feedback, and information processing.

Bioprinting The construction of a biological structure by computer-aided, automatic, layer-by-layer deposition, transfer, and patterning of small amounts of biological matter.

Artificial Intelligence is the intelligence of machines and robots and the branch of computer science that aims to create it.

Cloud computing involves distributed computing over a network, where a program or application may run on many connected computers at the same time. It specifically refers to a computing hardware machine or group of computing hardware machines commonly referred as a server connected through a communication network such as the Internet, an intranet, a local area network (LAN) or wide area network (WAN). Any individual user who has permission to access the server can use the server's processing power to run an application, store data, or perform any other computing task..

NUI this is a system for human-computer interaction that the user operates through intuitive actions related to natural, everyday human behavior.

NUI is much more than simply those input modalities. It enables a world where technology understands what we are doing and what we need or want

All of these technologies will become more important over the years as our relationship with computers grows deeper. More technologies will also undoubtedly emerge over the next few years that will make us rethink our relationship with computers yet again. Moving to rename information technology to intelligent technology is the first step to realizing our intertwined future with machines.

The World Wide Web

The World Wide Web, Web or WWW is a network of documents that works in a hypertext environment, i.e. using text that contains links, hyperlinks to other documents.

The files, web pages, are stored in computers, which act as servers. Your computer, the client, uses a web browser, a special program to access and download them. The web pages are organized in websites, groups of pages located on the Web, maintained by a webmaster, the manager of a website.

The Web enables you to post and access all sorts of interactive multimedia information and has become a real information highway.

How to surf the Web:

To surf or navigate the Web, access and retrieve web pages or websites, you need a computer with an Internet connection and a web browser. After you have launched it, you must type the website address or URL (Uniform Resource Locator), the type of protocol that the server and browser will use to communicate. Here it is Hypertext Transfer Protocol.

The different parts are separated by full stops (.) and forward slashes (/). When we say a URL, we say dot (.) and slash (/).

To find interesting sites you can use search engines, where the website information is compiled by spiders, computer-robot programs that collect information from sites by using keywords, or through web indexes, subject directories that are selected by people and organized into hierarchical subject categories. Some web portals - websites that otter all types of services, e.g. email, forums, search engines, etc. - are also good starting points.

The most relevant website addresses can be stored in your computer using the bookmarks or favourites function in your browser.

Websites usually have a beginning page or home page. From this starting point you can navigate by clicking your mouse on hyperlinks in texts or images.


Date: 2016-01-14; view: 1250


<== previous page | next page ==>
Successful organization | People hacking into a system.
doclecture.net - lectures - 2014-2019 year. Copyright infringement or personal data (0.002 sec.)