You are on page 1of 2

Yes I agree that we’re in post-PC sage in the evolution of information systems.

Security

- is the state of being free from danger and threat, security prevents unauthorized access to organizational
assets such as computers, network, and data. It maintains the integrity and confidentiality and sensitive
information blocking the access of sophisticated hackers

Data can be managed for security purpose by using Strong password and use password management
tools: make strong password for your device or system that no one can interrupt in your system

Strong password at least must have characters, letters, numbers and special symbol, make sure you create
strong and long password for more security. Also avoiding sharing password to other people

Use firewall: firewall is a system built to protect the private network from unauthorized and
unverified access through an internet connection; this can be used to prevent traffic and filtering Un
needed things like viruses. Because all those viruses and traffic can lead you to lose your data and
information.

Firewalls are security systems that monitor and control incoming and outgoing traffic on a network. By
restricting access to certain types of traffic, firewalls can help prevent unauthorized access to sensitive
data.

Use encryption: Encryption is the process of converting data into a secret code that can only be
decoded with a key. This is an effective way to protect data from unauthorized access, as even if someone
gains access to the data, they won't be able to read it without the key.

Make your software up to date and also you can backup your data ; sometime you can lose your data
maybe the system fail and attacks through backing up you will get back your data and all information that
you have lost

Use Antivirus protection to secure viruses in your device that manage data and system in all;
example of Antivirus is like AVG, Antispyware etc.

Implement access controls: Access controls are security measures that limit who can access specific
data. This can include user authentication, role-based access controls, and audit logs that track who
accessed what data and when.
Conclusion

-yourself as a system developer make shure to keep on eyes of your system to secure it from unauthorized
and unverified access to your device we all know that no one is perfect that no mistake will happen but
you can protect data by following the ways used by expert in order to be safe and protected.

You might also like