Computer System Security

Computer security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users.

1. Human error - Internet and file security is vital when a business begins their computer infrastructure plans. Backing up files, making them secure, and securing files across the network are all key factors in keeping a businesses information secure from the public or other corporations. A mistake that many companies make is not backing up files on secure networks.

2. Dedicated Computers - Computer built into another device for the purpose of controlling or supplying information to it. Its use has increased dramatically since the advent of the microprocessor: washing machines, cars, and MP3 players all have their own processors. A dedicated system is a general-purpose computer system confined to performing only one function for reasons of efficiency or convenience. A dedicated Web server is an example.

3. Keep a checklist for the decommissioning process - By a wide margin, the most common justification for application decommissioning is cost
savings. Many ERP systems are installed with the expressed purpose of consolidating
functionality and shutting down old, expensive applications.
Unfortunately many decommissioning projects fail and some are never even started
because they are so complex. It is not as easy as just flipping a switch; it is verifying
report accuracy, data cleansing, enhancing functionality in other applications, data
retention strategies, adhering to legal requirements, personnel retraining, and a host of
other issues. Severing the tie to an old application can be a painful process if not
approached correctly.

4. Develop competent internal technical support personnel - There are two kinds of security: data and break-in. Data security is addressed by having a good backup system. Break-in security is often a matter of using passwords to files or systems where possible, locking systems in offices and managing modem dial-in. Have the modem on only when sending or receiving.

5. Chat Line and Message Board Warnings - Chat rooms are an offshoot of electronic bulletin boards, which are offshoots of traditional bulletin boards. At first, people posted messages, ads, and queries. When the bulletin boards went electronic, you could post responses to a posting. In chat rooms, postings and responses can be done in real time. All chat rooms have one characteristic. They are areas of the Internet where you can exchange messages with a large number of people at one time; and where there is the option to join a group chat where everyone in the chat room can view every comment.

6. Record all important phone numbers - it is very important to record all the important numbers to easily to find when the phone numbers are needed.

7. Keep all software documentation - Maintaining a profile of the things you own can be very useful. For instance while selling your used car, receipts for all of its repairs can be extremely helpful in convincing the buyers that your car has been well taken care of.

8. Keep the serial numbers of all software packages - If so, you're like many people who have serial numbers and photos carefully catalogued of their big ticket items like flat screen TVs, giant speakers and more. While that's a great place to start, it reflects a misunderstanding between what items thieves really want and what homeowners fear will go missing. In fact, the larger items are really the least of your worries when it comes to a break in.


9. Develop a disaster recovery plan - Every business and organization can experience a serious incident which can prevent it from continuing normal operations. This this can happen any day at any time. The potential causes are many and varied: flood, explosion, computer malfunction, accident, grievious act... the list is endless.

10. Secure Lines


  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

0 comments:

Post a Comment