Computer Security | What is Computer Security – Full review & Security Introduction

Computer security

Computer security, also known as cyber security or IT security, is protection given to computer systems from the theft and damage to their hardware, software or information, as well as from disruption or misdirection of the services they offer…

IT security Computer security | cyber security 


Computer security, therefore, refers to all the rules and measures taken to lower the degree of computer system’s vulnerability to potential threats and attacks.

Why Computer Security Affects You

Computers are an part of day-to-day everyday life; University administrative business processes depend upon computer automation, record keeping, and dependable, confidential, and quick access to reliable information. The university’s academic processes make use of the computer for classroom representations, lab demonstrations and simulations, and online research. For many of us, computers also used often in our private lives like in playing video games, watching videos, programming, writing projects …

“The people of the world have granted control of their existence to a computer, networks, and databases. You own a property if a computer says you do, You can buy a house if a computer says you may, You have money in the bank if a computer says so, Your blood type is what the computer says it is, You are who the computer says you are”. know more…

Computer security


  1. To avoid physical damage to computer systems
  2. Prevent information loss
  3. To protect personal/official purposes


Computer software refers to the logical components of the computer system, which may include computer programs with their proper documentation, and coding and they needed data for the computer operations.

Thus there is every need to secure the computer software; security refers to all measures taken to make sure that information in the computer keeps intact. Information we know is both asset and power and no person or organization like been short of the above.

Measures Taken to Ensure Software security are:

  1. PASSWORD: This is a secret coding/representation known only to the user.
  2. BACKUP: This is substitute reserved for when of original loss.
  3. ANTI-VIRUS: These are computer programs that attempt to find, thwart and drop computer viruses and other malicious software. E.g Avast Anti-Virus, AVG, 360 Security …
  4. AUTHENTIFICATION: This restricts access to unauthorized users.



Hardware security protects the computer and its peripherals from theft, electronic intrusion and damage. Also, BIOS passwords prevent a malicious user from booting the system at all, find the user from quickly accessing or stealing information stored on the hard drive key lock prevent internal access.

Computer Security could be compromised by hardware and software malpractice, human error and faulty operating environment. Threats, which exploit computer vulnerabilities can stem from sabotage, espionage, industrial competition, terrorist attack and mechanical malfunction. Also, know…

The consequences of a successful intentional or accidental misuse of computer security are:

  1. Loss of confidentiality
  2. Loss of system integrity
  3. Data theft or loss

Why do I need to learn about Computer Security? Isn’t this just an I.T. problem?

Good Security Standards follow the “90 / 10” Rule:

  • 10% of security safeguards are technical.
  • 90% of security safeguards rely on the computer user (“YOU”) to adhere to good computing practices

Example: The lock on the door is the 10%. You remembering to lock the lock, checking to see if the door is closed, ensuring others do not prop the door open, keeping control of the keys, etc. is the 90%. You need both parts for effective security. more…

Know More About – “computer system”A system of connected computers that share a central storage system and various peripheral devices such as a printers, scanners, or routers.

Do join our free email subscribers with a single click to send an email from the Electronic mail subscription Box on this site, Join now to keep getting out day Tech and Sci updates daily.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

error: Content is protected !!