A network system refers to the interconnection of two or more computers to share resources (such as printers and scanners) to easily exchange and transmit information through cables or wireless connection that follows certain rules or protocols.
There are three common types of network, the Local Area Network (LAN), Wireless Local Area Network WLAN), and Wide Area Network (WAN).
- Local Area Network (LAN) generally covers a limited geographic area like an internet café, school laboratory, or office. Computers are connected to a server or workstations. The server is configured so it can do its function without direct human intervention. Its function includes software hosting, file storage and retrieval, complete access control for the network resources, and many more. On the other hand, workstations need human users to interact and utilize network services, unlike servers.
- Wireless Local Area Network (WLAN) is the same as LAN, but the connection on the network is wireless.
- Wide Area Network (WAN) connects a larger geographic area such as a whole state, country, or even the world. This global network is made possible by connecting through the satellite. WAN is a complex network because it uses a variety of connection materials such as multiplexers, bridges, and routers to connect locally, then metropolitan networks for global connection like the internet.
Connecting to any network will create an opening to potential risk and attacks on the security of computer systems. Thus, an effective and strict computer security system must be implemented.
What are the main types of computer security?
Computer security protects the information that is stored in a computer from anyone who wants to harm or steal it and prevents unauthorized access. Below are the main types of computer security:
- Physical Security – setting a unique password to a computer. The password will be known to authorize the person only to assure the safety and confidentiality of the data being stored in that computer.
- Network Security – the network has many entry points. Thus, network security requires defense methods such as firewalls. A firewall is a software device that monitors the traffic and prevents access to the network depending on security rules.
- Executable security – installing an anti-virus. An anti-virus is a computer program that will try to identify, remove and prevent viruses from harming your computer system. A virus may delete, duplicate or even damage your whole computer system. So it is a must to have an installed and updated anti-virus.
The main goal of computer security is to ensure the confidentiality of the information to authorized persons, to maintain the integrity of the information (which means there are no deviations from the original information being stored), and to make information available to concerned persons only.
What are the 3 basic internal security of computer system?
Attacks on the computer system and networks are rampant these days; thus, a computer’s internal security system must be strictly implemented and observed. There is three basic internal security of a computer system: management security, operational security, and physical security.
- Management security is referred to as administrative controls, which provide the guidance, rules, and procedures for implementing the overall security of the system.
- Operational security is referred to as technical controls, which assure the effectiveness of your controls, such as access controls, authentication, and security topologies applied to networks and installed applications.
- Physical security refers to the protection of personnel, data, hardware and etc., from physical attacks and threats that can harm, damage, disrupt the operation or even destroy and affect the confidentiality, integrity, or availability of data or the system.
What are computer security risks?
Nowadays, it is complicated and unpredictable to know how or when an attack on your computer system will occur. Harming your computer system through physical damage and non-physical (viruses) may happen at any time, so it’s always better to be careful and avoid it from happening as much as possible.
Computer security risk is an act that could damage the hardware and software of a computer unit. Following are examples of computer security risks:
- Humans – the biggest security risk. In an organization, if your employee is not well trained about safety and good practices, misuse of a computer system may happen. It is critical to make sure that they are knowledgeable in terms of security, especially if that employee holds or is assigned in a very important and confidential task.
- Bad backups – if your backup is corrupted or lost, you will face big trouble, especially if you don’t have any alternative copies. Always make sure that you properly back up the data and keep it in a safe place.
- Not maintaining hardware or software – will give a potential entry to an attacker. It is always recommended to have regular check-ups of your hardware and software systems.
- Not planning for a natural disaster and more.
Connecting to a network or to the internet and installing software, your computer system is already introduced to risk. Today, almost all people need the internet to communicate and need to install new software and applications, we can never assure 100% security, but building and creating strong computer security helps alleviate the risk.
What is the importance of computer security?
Computer security will keep all information protected. Tightening the security of your computer will prevent unnecessary and harmful incidents that may result in information leaks and loss, and even hardware damages. Being aware and knowing the do’s and don’ts in terms of security will help you to sidestep unwanted occurrences.
Strengthening computer security, guaranteed safety processing, storage of sensitive information, and more. It also provides confidentiality, integrity, and availability for all components of the computer system.
Computer security allows your computer system to avoid the following:
- Viruses – are malicious programs that will be installed into your computer without your knowledge. This program can duplicate, hide and even delete your data. It can also replicate itself and infect other installed software in the system and files.
- Computer worm – a software program that replicates itself in greater volume and excessive speed and infects from one computer to another computer without the users’ knowledge. This program will use and consume users’ computer hard disk space.
- Man-in-the-Middle Attacks (MITM) – a cybercrime that occurs when a visitor user uses an unsecured public Wi-Fi network. Hackers interrupt the traffic between the user and the network, and during that time, they can steal data by using malware to install the software.
- Phishing – a cybercrime that involves someone pretending to be a legitimate and trusted institution over the telephone, email, or even text messages to trick possible targets into disclosing personal and confidential information (such as email, passwords, bank details and etc.). This may result in financial loss and stealing and using your identity.
- Botnet – a network of connected computers that are conceded by hackers without the users’ knowledge. The infected individual computers are now called a ‘zombie computer,’ which now is the bot. It will be used for doing malicious activities on bigger-scale attacks such as DDoS.
- Rootkit – malicious software designed to enable unauthorized access to a computer system or restricted network while hiding its existence. It allows a hacker to modify system settings and configurations and execute commands remotely.
- Keylogger – a software monitoring that can track and record all keyboard strokes and activities without the users’ knowledge
Additional precautions to secure harmful incidents:
- Do not leave your computer unattended
- Do not visit websites without SSL certificates
- Do not click links that you are not familiar
- Be mindful of the information you are entering
Here are some important reasons why computer security is important:
- Protects your personal information
- Protects your companies property
- Stops unauthorized access
- Prevents data leak and theft
- Prevents viruses and malware
How do we maintain computer security?
Maintaining your computer security allows you to avoid hacking and stealing attempts on your information and even your computer hardware. Computer hardware can be secured and protected through lockers, doors, confidential information, and unauthorized access to your system requires complex security strategies and practices. Below are some strategies and practices to maintain your computer security:
- Backup your data regularly and store it in a protected place
- Use a unique and strong password and change it regularly
- Use a two-factor authentication
- Use a firewall. Always activate your firewall because it acts as a security guard between your local network and the internet.
- Keep all your installed software up to date.
- Install reliable and trustworthy anti-virus software and malware protection
- Be cautious of suspicious emails. Do not easily disclose personal information when asked. Always verify the reliability of all emails you receive.
- Do not click any link provided or open any attachments, especially if it’s not familiar to you.
- Make sure that the Wi-Fi is secure. Browse the web safely. Do not visit sites that offer prizes or promos.
- Avoid pirated materials and cracked software. Always use and install software from a trusted source.
- Do not leave your computer unit unattended.
- Avoid using USB and other external devices unless you own it
- Educate yourself with basic aspects of computer security and the latest security, as well as the evolving threats and ways to attack.
- Always perform a daily or regular full system scan.
- And more..
A network system is critical in terms of security mainly because security threats are constantly evolving, and so as the security programs to defend the system against any threats and attacks continuously.
There are numerous threats and attacks that only wait for the opportunity to enter your system. However, understanding them and knowing how to avoid these threats is a key to preventing or defending your network and system from potential malicious activities.
Strengthening your computer security system is always the best solution to avoid any harmful effects on your software, hardware, and network.
Just visit www.thepractical.co.th for more information or any queries and concerns.