Types of computer security breaches

The information on your computer is normally intended for use by you alone. Unauthorized access, change or destruction of protected information, hardware and processes amounts to a security breach.

The number of computer security breaches include:

Physical breach

Portable laptops, computers and accessories can be stolen. Unauthorized persons who have intentions of either accessing the hardware or the data in the computer forcefully or tactfully gain access to the computers and steal. This leads to loss of both the hardware as well as data stored up in a particular computer.

This can be dealt with by ensuring a lock down on all workstations & laptops and limiting access to the computer room.

Malware attack

This is where malicious software that can be downloaded and knowingly or unknowingly installed in the computer. The malware is accessed through visits to some websites. The software damages your computer through corruption of important data, the computer operations are slowed down, and at times pop-up windows disrupt computer usage. At extremes some malware will erase or duplicate data and therefore render them useless. The malicious software denies the user access to essential information while availing the same to external third parties. Hackers use malware attacks to access sensitive information from your computer such as social security numbers or bank account details.

This kind of breach can be prevented by safe computer practices and ensuring adequate software defense.

Network Breach

The access of a computer can be done via the Internet. Computers that access Internet are vulnerable to this kind of crime. Malicious users are known to gain access to computer through an open network. This happens when the firewalls are compromised.

Internal Users

It is not only the people outside the perimeter who have malicious reasons to access the data in your computer but also those around you. These users access the data by using your password or your hardware. This is normally a result of misuse of the powers by users of shared computers or networks. This can be addressed by restricting the accounts, computers and networks that do have sensitive information.

Computer security covers the computer software and hardware, to prevent loss or theft of electronic data. The information stored in your computers hard drives are important and have more value than the hardware itself. The most sensitive information is normally stored electronically. Computer security helps protect the computer, the data stored in it and the user’s identity.

Security Articles

Comment’s

Comments loading...

Write Comment

© 2017 Comprsite