CURRENTLY ON AIR ⇒
  • Interviews, Current Affairs
    Friday, 7:45 am - 8:00 am
    [ - ]

feedback@radioislam.org.za

logo


((( Listen Live )))))
Radio Islam Logo


Computer Security – Part 1

Tomorrow the 30th of November is International Computer Security Day.

A Computer is an electronic device used in almost every field even where it is most unexpected. That is why this age is called the IT era. And now we cannot imagine a world without computers. These day`s computers are the tools for not only engineers and scientists but also they are being used by millions of people around the world.

Computers have become very important nowadays because it is very much accurate, fast and can accomplish many tasks easily. Otherwise to complete those tasks manually much more time is required. It can do very big calculations in just a fraction of a second. Moreover it can store huge amount of data in it. We also get information on different aspects using internet on our computer.

Like all our valuables, computers also need to be protected.

What is Computer Security?
Computer security, also called cybersecurity, is the protection of computer systems and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same means used to protect other valuable or sensitive equipment—namely, serial numbers, doors and locks, and alarms. The protection of information and system access, on the other hand, is achieved through other tactics, some of them quite complex.

The security precautions related to computer information and access address four major threats:
(1) theft of data, such as that of military secrets from government computers;
(2) vandalism, including the destruction of data by a computer virus;
(3) fraud, such as employees at a bank channelling funds into their own accounts; and
(4) invasion of privacy, such as the illegal accessing of protected personal financial or medical data from a large database.

The most basic means of protecting a computer system against theft, vandalism, invasion of privacy, and other irresponsible behaviours is to electronically track and record the access to, and activities of, the various users of a computer system. This is commonly done by assigning an individual password to each person who has access to a system. The computer system itself can then automatically track the use of these passwords, recording such data as which files were accessed under particular passwords and so on. Another security measure is to store a system’s data on a separate device or medium that is normally inaccessible through the computer system. Finally, data is often encrypted so that it can be deciphered only by holders of a singular encryption key.

Computer security has become increasingly important since the late 1960s, when modems (devices that allow computers to communicate over telephone lines) were introduced. The proliferation of personal computers in the 1980s compounded the problem because they enabled hackers to illegally access major computer systems from the privacy of their homes. With the tremendous growth of the Internet in the late 20th and early 21st centuries, computer security became a widespread concern. The development of advanced security techniques aims to diminish such threats, though concurrent refinements in the methods of computer crime pose ongoing hazards.

ADVERTISE HERE

Prime Spot!!!

Contact:
advertisingadmin@radioislam.co.za 

Related Articles

The Heart Matters – Part 4

The Heart Matters – Part 4

Post Ramadhan: From Peak Moments to a Lifetime of Connection The Heart Matters: Guarding the Spiritual Booty We are now four days into our post-Ramadhan journey. We have talked about keeping momentum, maintaining our shield of Taqwa, and sustaining our connection with...

read more
The Quran and Us – Part 3

The Quran and Us – Part 3

Post Ramadhan: From Peak Moments to a Lifetime of Connection The Quran and Us: From Pages of the Month to the Companion of the Year Let me ask you an honest question. How many of you completed a full reading of the Quran in Ramadhan? Many of us did. And that was...

read more
Safeguarding the Soul – Part 2

Safeguarding the Soul – Part 2

Post Ramadhan: From Peak Moments to a Lifetime of Connection Safeguarding the Soul: Maintaining the Shield of Taqwa Yesterday we spoke about keeping momentum and choosing one habit to carry forward. Today, we need to address something more fundamental. We need to talk...

read more
The Accepted Ramadan – Part 1

The Accepted Ramadan – Part 1

Post Ramadhan: From Peak Moments to a Lifetime of Connection The Accepted Ramadan: The Sign of a Good Deed is a Good Deed to Follow Eid Mubarak to you all. We spent thirty days in a spiritual bootcamp. We woke before dawn, we thirsted by day, and we stood in prayer by...

read more

Walking Forward with a Renewed Heart and Soul – Part 15

Renewal of the Heart and Soul Phase 5 – Transformation: Becoming Who Allah Loves Walking Forward with a Renewed Heart and Soul My dear brothers and sisters, this is it. The final day of Ramadhan. In a few minutes, the sun will set, and this blessed month will be...

read more
Life After Ramadhan – Part 14

Life After Ramadhan – Part 14

Renewal of the Heart and Soul Phase 5 – Transformation: Becoming Who Allah Loves Life After Ramadhan My dear brothers and sisters, today is the 30th day of Ramadhan. In a few hours, the sun will set, and this blessed month will be behind us. The nights of prayer, the...

read more

Subscribe to our Newsletter

0 Comments