In general, a secure system will use some special secure features to control access of information. Only properly authorized people or the processes carry out in the name of these people can read, write, create, and delete information. With the development of computer hardware, the amount of programs and data are stored in the computer is become larger. How to protect the data in the computer from being lost, which should be the first consideration problem for any computer application department. Computer hardware and software production manufacturers are also trying to study and continue to solve this problem.
The main causes of losing data on a computer are: virus attack, theft, computer electromagnetic radiation, computer storage hardware damage and so on.
So far, there has found near million computer viruses. Vicious virus can crash the whole computer software system and destroy data completely. There are hundreds of such viruses. A computer virus is a small hidden program that attaches to computer software. It is similar with other working computer programs, but it will disrupt the normal function programs and data files. To prevent virus attacks, it mainly strengthen the administration, never open extraneous software, and text the system regularly. Also, we can insert the anti-virus card or use clear software to clear the virus that has been found on computers.
Thefts refers to people access computer systems in legal identity and extract data from a computer without permission to modify, transfer, copy and so on. One way to prevent is add software system security mechanisms so that thieves cannot enter the system with legal identity. For example, add recognition of legitimate users or password to stipulate different privileges for the users. So, it cannot freely access the data areas that should not be accessible. Second, encrypt the data. Even if the thieves get into the system, they cannot read the data without the key. Keys can be soft code or hard code, but it requires being replaced at any time. Encrypted data has security in transmission. Third, setup operation log in computer. It automatically records reading, writing, or modifying important data. This log is a black box that only a handful of privileged people can open. It can be used to detect the theft.
Hi Wenlong, a lot of people seem to not know how to properly protect their systems. I feel the encryption is the best way to properly protect data. I read on someone else’s blog that there are multiple ways to encrypt a file. Which method do you prefer? A lot of people also seem to forget that anti-virus software exists. That is the first thing I install onto a new computer, after Firefox. I look forward to reading more posts by you in the future.
ReplyDeleteHi Wenlog!
ReplyDeleteI enjoyed reading your blog post on computer security. It was very informative! Computer security is definitely one of the most important and interesting things. I learned a lot from reading your post and I was especially surprised by the fact that there are about a million computer viruses.
Overall, great post! I would just suggest you add references but other than that, I had a great time reading it.
Hi wenlong,
ReplyDeleteI enjoyed reading your blog post about computer security. As a IT professional, one of the major problems I get with my clients computers is slow downs and virus attacks. Many of my clients do not know about data or computer security and they tend to visit shady sites and slow down their computers, in which I have to fix. I sure think that all of them can read your post about securing their data and better improve themselves. Overall great work and picture choice!
Jeff
Wenlong,
ReplyDeleteGood job on the blog post.
I like how you define both the terms and them give your step by step opinion son the best way to protect data. Also, interesting picture choice!
Happy blogging,
Tushar.
Great read Wenlong,
ReplyDeleteData access and security is a major issue in computing. Data loss can devistate a business. You are correct in that encription is a great means of protecting data. I like your formatting and choice of images.