You are on page 1of 5

KYAMBOGO UNIVERSITY

FACULTY OF SCIENCE
DEPARTMENT OF COMPUTER SCIENCE
COURSE: BITC YEAR ONE

COURSE UNIT: COMPUTER MAINTENANCE AND MANAGEMENT

NAME: EKODE JOSHUA

REG NO: 20/U/ITE/9812/PE


COPMUTER SECURITY
Computer security, cyber security or information technology security is the protection of computer
systems, information and networks from harm, theft and unauthorized use. To ensure that the security
of information and data is not compromised we take the following actions explained below;

 Use of a firewall.

Windows and mac OS have built-in firewalls – software designed to create a barrier between your
information and the outside world. Firewalls prevent unauthorized access to your network and alert you
to any intrusion attempts.

Make sure the firewall is enabled before going online. You can also purchase a hardware firewall from
companies such as Cisco, Sophos or Fortinet, depending on your broadband router, which also has a
built-in firewall that protects your network.

 Installing antivirus software.

Computer viruses and malware are everywhere. Antivirus programs such as Bit defender, Panda Free
Antivirus, Malware bytes and Avast protect your computer against unauthorized code or software that
may threaten your operating system. Viruses may have easy-to-spot effects – for example, they might
slow your computer or delete key files – or they may be less conspicuous.

Antivirus software plays a major role in protecting your system by detecting real-time threats to ensure
data is safe. Some advanced antivirus programs provide automatic updates, further protecting a
machine from the new viruses that emerge every day.

Installing an anti-spyware package.

Spyware is a special kind of software that secretly monitors and collects personal or organizational
information. It is designed to be hard to detect and difficult to remove and tends to deliver unwanted
ads or search results that are intended to direct you to certain (often malicious) websites.

Some spyware records every keystroke to gain access to passwords and other financial information.
Anti-spyware concentrates exclusively on this threat, but it is often included in major antivirus packages,
like those from Webroot, McAfee and Norton. Anti-spyware packages provide real-time protection by
scanning all incoming information and blocking threats.

 Using complex passwords.

Using secure passwords is the most important way to prevent network intrusions. The more secure your
passwords are, the harder it is for a hacker to invade your system.

More secure often means longer and more complex. Use a password that has at least eight characters
and a combination of numbers, uppercase and lowercase letters, and computer symbols. Hackers have
an arsenal of tools to break short, easy passwords in minutes.
Don't use recognizable words or combinations that represent birthdays or other information that can be
connected to you. Don't reuse passwords, either. If you have too many passwords to remember,
consider using a password manager, such as Dashlane, Sticky Password, LastPass or Password Boss.

 Keeping OS, apps and browser up-to-date.

Always install new updates to the operating systems. Most updates include security fixes that prevent
hackers from accessing and exploiting data. The same goes for apps. Today's web browsers are
increasingly sophisticated, especially in privacy and security. Be sure to review your browser security
settings in addition to installing all new updates. For example, you can use your browser to prevent
websites from tracking your movements, which increases your online privacy. Or, use one of these
private web browsers.

 Ignore spam.

Being on the lookout of email messages from unknown parties, and never to click on links or open
attachments that accompany them. Inbox spam filters have gotten pretty good at catching the most
conspicuous spam. But more sophisticated phishing emails that mimic your friends, associates and
trusted businesses (like your bank) have become common, so it’s better to keep your eyes open for
anything that looks or sounds suspicious.

 Back up your computer.

If information or data is not already backed up to the hard drive, ensure to do so immediately. Backing
up information is critical in case hackers do succeed in getting through and trashing the system.

Always being sure you can rebuild as quickly as possible after suffering any data breach or loss. Backup
utilities built into mac OS (Time Machine) and Windows (File History) are good places to start. An
external backup hard drive can also provide enough space for these utilities to operate properly.

 Shutting down computers.

Many organizations, especially those operating a web server, are "all systems go" all the time. But If not
operating a complex internet-based company, it’s better to switch off the machines overnight or during
long stretches when not working. Always being on makes the computer a more visible and available
target for hackers; shutting down breaks the connection a hacker may have established with your
network and disrupts any possible mischief.

 Using virtualization.

Not everyone needs to take this route, but if you are visiting sketchy websites, expect to be bombarded
with spyware and viruses. While the best way to avoid browser-derived intrusions is to steer clear of
unsafe sites, virtualization allows you to run your browser in a virtual environment,
like Parallels or VMware Fusion that sidesteps your operating system to keep it safer.
 Securing your network.

Routers don't usually come with the highest security settings enabled. When setting up your network,
log in to the router, and set a password using a secure, encrypted setup. This prevents intruders from
infiltrating your network and messing with your settings.

 Use two-factor authentication.

Passwords are the first line of defense against computer hackers, but a second layer boosts protection.
Many sites let you enable two-factor authentication, which boosts security because it requires you to
type in a numerical code – sent to your phone or email address – in addition to your password when
logging in.

 Use encryption.

Even if cybercriminals gain access to your network and files, encryption can prevent them from
accessing any of that information. You can encrypt your Windows or mac OS hard drive
with BitLocker (Windows) or File Vault (Mac), encrypt any USB flash drive that contains sensitive
information and use a VPN to encrypt web traffic. Only shop at encrypted websites; you can spot them
immediately by the "https" in the address bar, accompanied by a closed-padlock icon.

 Turning off Bluetooth.

When you're not using Bluetooth, turn it off. Keeping your Bluetooth on but dormant opens another
back door for computer hackers.

 Preventing use unsecured public Wi-Fi.

Password-free, widely used Wi-Fi networks have no security features. As such, they're prime targets for
computer hackers.

 Use of better passcodes.

Unlock codes like 0000 and 1234 are easy to remember, but they're also easy to guess. Instead, opt for a
randomly generated, six-number passcode.

 Switching off autocomplete.

Autocomplete is the feature that guesses what you're typing and completes the word, phrase or other
information for you. While convenient, this tool all but hands your email address, mailing address,
phone number and other important information to hackers. Switch it off.

 Clearing your browsing history.

Web browsers have browsing history, clearing it often – including cookies and cached files – to give
hackers as little information as possible to work with if the system is broken into.

 Staying away from pirated material


Avoiding streaming or downloading movies, music, books, or applications that do not come from trusted
sources. These contain malware that compromises system security

 Avoiding use USBs or other external devices unless you own them

Use of removable devices like flash drives can cause infections by malware and viruses, ensure that all
external devices either belong to you or come from a reliable source.

 Locking your screen when you’re away from the desk

Ensuring all staff lock their computer screens. Taking steps to lock screens when you leave your desk is a
simple thing to do and will prevent someone else from accessing the computers.

 Keep on top of who has access to what

You have to restrict who has access to your IT systems and buildings – you can’t let just anyone in
unaccompanied because this will leave your systems vulnerable. The fewer people with access, the
better. Visitors should be clearly identifiable. Make sure you limit IT access to people who work for you,
where possible. If someone leaves the company, or if they’re absent for long periods of time, you may
want to consider suspending their access to your systems.

 Don’t keep data for longer than needed.

Staying on top of what personal data you hold will save you time and resources. It will also help you with
your data protection responsibilities. Only keep what you need, for as long as you need it.

 Dispose of old IT equipment and records securely

Before getting rid of them, make sure no personal data is left on personal computers, laptops,
smartphones or any other devices. You could consider using deletion software to wipe the data. This will
ensure no one can access information they’re not supposed to see when disposing off the equipment.

Reference

https://www.businessnewsdaily.com/11213-secure-computer-from-hackers.html

You might also like