What are the environmental threats to computers and information systems and the security measures against them?

      

What are the environmental threats to computers and information systems and the security measures against them?

  

Answers


Francis
1). Fire.
Fire destroys data, information, software & hardware.

Security measures against fire:
- Use fire-proof cabinets and lockable metal boxes for floppy disks.
- Use of backups.
- Install fire fighting equipment, e.g., fire extinguishers.
- Have some detectors.
- Training of fire-fighting officers.
- Observe safety procedures, e.g., avoid smoking in the computer rooms.
- Have well placed exit signs.
- Contingency plans.


2). Water, floods & moisture.
This causes rusting of the metallic components of the computer.

Security measures:
- Set up computer rooms on higher grounds to avoid floods & humidity.
- Avoid installing computer components in the basement.
- There should be adequate drainage system.
- Use water-proof ceilings & floors.


3). Lightening, electricity and electrical storms.
This causes power failure that can cause damage to data, which has not been transferred to permanent storage devices.

Security measures:
- Install facilities to control power fluctuations, e.g., use of Uninterrupted power source (UPS)
- Use power stabilizers.
- Have standby power generators/sources.
- Have lightening arresters in the building.


4). Excessive Heat or Temperature.
Excessive heat or temperature from the computer itself or from the surrounding environment can destroy computer storage media or devices.

Security measures:
- There should be efficient ventilation system.
- Use a cooling system in the computer rooms, e.g., cooling fans & air conditioners.


5). Computer virus attack.
A virus is a rogue software program that spreads rampantly through computer systems, destroying data or causing the system to break down.

Security measures against computer virus:
- Make backup copies of software, and store the copies off-site.
- Restrict access to programs & data on a ‘need-to-use’ basis.
- Check all programs regularly for change of size, as this could be a sign of virus infiltration.
- Be careful with ‘Shareware’ and ‘Freeware’ programs, as they are the major entry points for viruses.
- Make sure all purchased software is in its original sealed-disk containers.


6). Smoke and Dust.
Dust and Smoke particles settle on storage devices and may scratch them during Read/write operation.

Security measures:
- Have dust mats or carpets to prevent entry of dust.
- Fit the computer room with special Curtains to reduce entry of dust particles.
- Cover the devices with Dust covers when cleaning the room.
- Remove shoes before entering the room to prevent dust.


7). Terrorist attack.
This includes activities such as:
- Political terrorists,
- Criminal type of activities,
- Individuals with grudges, or
- People intending to cause general destruction.

Security measures:
- Hiring of security guards to control physical access to the building housing the computer room.
- Activities that can cause terrorism should be avoided, e.g., exploitation of workers.
- Have double door and monitoring devices.
- Use of policies.
- System auditing / use of log files.
- Use of passwords.
- Punitive measures.
- Encryption of data.
- Use of firewalls.
- Consult and co-operate with the Police and Fire authorities on potential risks.


8). People.
People threats include:
- Carelessness.
- Clumsiness.
- Accidental deletion of data, information or programs.
- Vandalism, i.e., theft or destruction of data, information or programs and hardware.
- Piracy of copyrighted data and software.

Security measures against Carelessness and Clumsiness:
- Better selection of personnel.
- Have a good office layout.
- Improve employee training and education.
- Limit access to data and computers.
- Regular backups.
- Use of Undelete and Unformat utilities.

Security measures against Vandalism:
- Should have a sensitive attitude to office behaviour.
- Tighten security measures, e.g., install alarm systems, burglar-proof doors/windows, and roofs).
- Limit access to sensitive company information.
- Use Keyboard lock on terminals used by authorized users.
- Use of disk locks.
- Punitive measures.


9). Earthquakes.
francis1897 answered the question on March 15, 2023 at 05:45


Next: A computer system can only be claimed to be secure if precautions are taken to safeguard it against damage or threats such as accidents, errors...
Previous: What are the precautions against data loss due to power failure?

View More Data Security and Control Questions and Answers | Return to Questions Index


Exams With Marking Schemes

Related Questions