Get premium membership and access questions with answers, video lessons as well as revision papers.
1). Fire.
Fire destroys data, information, software & hardware.
Security measures against fire:
- Use fire-proof cabinets and lockable metal boxes for floppy disks.
- Use of backups.
- Install fire fighting equipment, e.g., fire extinguishers.
- Have some detectors.
- Training of fire-fighting officers.
- Observe safety procedures, e.g., avoid smoking in the computer rooms.
- Have well placed exit signs.
- Contingency plans.
2). Water, floods & moisture.
This causes rusting of the metallic components of the computer.
Security measures:
- Set up computer rooms on higher grounds to avoid floods & humidity.
- Avoid installing computer components in the basement.
- There should be adequate drainage system.
- Use water-proof ceilings & floors.
3). Lightening, electricity and electrical storms.
This causes power failure that can cause damage to data, which has not been transferred to permanent storage devices.
Security measures:
- Install facilities to control power fluctuations, e.g., use of Uninterrupted power source (UPS)
- Use power stabilizers.
- Have standby power generators/sources.
- Have lightening arresters in the building.
4). Excessive Heat or Temperature.
Excessive heat or temperature from the computer itself or from the surrounding environment can destroy computer storage media or devices.
Security measures:
- There should be efficient ventilation system.
- Use a cooling system in the computer rooms, e.g., cooling fans & air conditioners.
5). Computer virus attack.
A virus is a rogue software program that spreads rampantly through computer systems, destroying data or causing the system to break down.
Security measures against computer virus:
- Make backup copies of software, and store the copies off-site.
- Restrict access to programs & data on a ‘need-to-use’ basis.
- Check all programs regularly for change of size, as this could be a sign of virus infiltration.
- Be careful with ‘Shareware’ and ‘Freeware’ programs, as they are the major entry points for viruses.
- Make sure all purchased software is in its original sealed-disk containers.
6). Smoke and Dust.
Dust and Smoke particles settle on storage devices and may scratch them during Read/write operation.
Security measures:
- Have dust mats or carpets to prevent entry of dust.
- Fit the computer room with special Curtains to reduce entry of dust particles.
- Cover the devices with Dust covers when cleaning the room.
- Remove shoes before entering the room to prevent dust.
7). Terrorist attack.
This includes activities such as:
- Political terrorists,
- Criminal type of activities,
- Individuals with grudges, or
- People intending to cause general destruction.
Security measures:
- Hiring of security guards to control physical access to the building housing the computer room.
- Activities that can cause terrorism should be avoided, e.g., exploitation of workers.
- Have double door and monitoring devices.
- Use of policies.
- System auditing / use of log files.
- Use of passwords.
- Punitive measures.
- Encryption of data.
- Use of firewalls.
- Consult and co-operate with the Police and Fire authorities on potential risks.
8). People.
People threats include:
- Carelessness.
- Clumsiness.
- Accidental deletion of data, information or programs.
- Vandalism, i.e., theft or destruction of data, information or programs and hardware.
- Piracy of copyrighted data and software.
Security measures against Carelessness and Clumsiness:
- Better selection of personnel.
- Have a good office layout.
- Improve employee training and education.
- Limit access to data and computers.
- Regular backups.
- Use of Undelete and Unformat utilities.
Security measures against Vandalism:
- Should have a sensitive attitude to office behaviour.
- Tighten security measures, e.g., install alarm systems, burglar-proof doors/windows, and roofs).
- Limit access to sensitive company information.
- Use Keyboard lock on terminals used by authorized users.
- Use of disk locks.
- Punitive measures.
9). Earthquakes.
francis1897 answered the question on March 15, 2023 at 05:45
- A computer system can only be claimed to be secure if precautions are taken to safeguard it against damage or threats such as accidents, errors...(Solved)
A computer system can only be claimed to be secure if precautions are taken to safeguard it against damage or threats such as accidents, errors and omissions. What do we secure in computers?
Date posted: March 15, 2023. Answers (1)
- What is computer security?(Solved)
What is computer security?
Date posted: March 15, 2023. Answers (1)
- What are rules that must be observed in order to keep within the law when working with data?(Solved)
What are rules that must be observed in order to keep within the law when working with data?
Date posted: March 15, 2023. Answers (1)
- What are log files?(Solved)
What are log files?
Date posted: March 15, 2023. Answers (1)
- With the aid of a diagram, describe data encryption(Solved)
With the aid of a diagram, describe data encryption
Date posted: March 15, 2023. Answers (1)
- Describe audit trails as a way of detection and protection against computer crimes(Solved)
Describe audit trails as a way of detection and protection against computer crimes
Date posted: March 15, 2023. Answers (1)
- State some of the ways of reducing piracy(Solved)
State some of the ways of reducing piracy
Date posted: March 14, 2023. Answers (1)
- What are the different ways tapping may take place?(Solved)
What are the different ways tapping may take place?
Date posted: March 14, 2023. Answers (1)
- Who is an hacker?(Solved)
Who is an hacker?
Date posted: March 14, 2023. Answers (1)
- Give the reasons for hacking(Solved)
Give the reasons for hacking
Date posted: March 14, 2023. Answers (1)
- Discuss the types of computer crimes.(Solved)
Discuss the types of computer crimes.
Date posted: March 14, 2023. Answers (1)
- What causes errors and accidental access to data and information?(Solved)
What causes errors and accidental access to data and information?
Date posted: March 14, 2023. Answers (1)
- Discuss the forms of unauthorized access(Solved)
Discuss the forms of unauthorized access
Date posted: March 14, 2023. Answers (1)
- In your own view, what are some of the intentions of the people who may want to access data without permission?(Solved)
In your own view, what are some of the intentions of the people who may want to access data without permission?
Date posted: March 14, 2023. Answers (1)
- State the types of destructions/damages caused by a virus attack(Solved)
State the types of destructions/damages caused by a virus attack
Date posted: March 14, 2023. Answers (1)
- What are the two tasks a virus (computer code) is designed to undertake?(Solved)
What are the two tasks a virus (computer code) is designed to undertake?
Date posted: March 14, 2023. Answers (1)