Free Essay SamplesAbout UsContact Us Order Now

Importance Of Computer Security

0 / 5. 0

Words: 400

Pages: 1

84

Importance of computer security

Introduction

Explain the logical security measures that you would implement in a small business to guarantee the integrity/safety of computer equipment. Information security must be complete, since logical safety and physical safety must be taken into account, since there are both logical and physical threats, logical security uses electronic measures and permits within the operating system or rules Access to network layers, such as firewalls (firewalls), routers and switchs.

Developing

The computer security plan is the graphic expression of the designed computer security system that constitutes and establishes the organizational and functional principles of said activity an entity. For example, considering what was addressed in the computer security plan, in a small business of at least 35 fixed and 15 eventual workers, you could have at least 20 PC clients and a main server. Perform inventory of computer equipment and areas that use equipment connected to the company’s network.

Orient the technical support area on the logical security plan, these measures are to ensure that only authorized users are capable of performing actions or accessing information on a network or specific equipment. Create password input to each module of the main system to control access to all users of the programs and data, for example the warehouse area will only have access to the modules of the main system relevant to its function.

Wait! Importance Of Computer Security paper is just an example!

Guarantee that the various operators cannot modify the information or the programs that do not compete, without having absolute supervision over them. Ensure that each process or procedure uses the assets, resources and applications that correspond to it. Verify that the shared information is received by the authorized receiver. Ensure information integrity. Guarantee the altebility for data transmission from different access points.

Ensure contingency measures for data transmission. Guide the mandatory disinfection of external devices before use in computer technologies. Installation of firewall. Establish protection standards such as: identification, authentication and authorization for users. Restriction of access to programs and files. 

conclusion

Restriction of modification of programs and files that do not correspond. Safety in data use, files and correct programs in and by correct procedure. Information transmitted is received by the recipient to which it has been sent. Use Firewall barriers. Scan with antivirus computer equipment. Account assignment standards (hierarchical priorities). Maintenance of computer equipment periodically.

Get quality help now

Ashley Miller

5.0 (201 reviews)

Recent reviews about this Writer

Thank you for your services, they are really helpful! I was ready to give up my term paper because I just haven’t any idea what to write about. I’ve found a couple of ideas here and finished my piece without hurdles.

View profile

Related Essays

Recism and Health

Pages: 1

(275 words)

Cyberattack Brief

Pages: 1

(275 words)

THe US trade dificit

Pages: 1

(275 words)

Politics in our daily lives

Pages: 1

(275 words)

History Islam Text 2

Pages: 1

(275 words)

Bishop Stanley B Searcy Sr

Pages: 1

(275 words)

Phar-Mor

Pages: 1

(550 words)