This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Operating systems

Security in Computing

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Security in Computing

Chapter 2

Security in computing

Security is to the protection of resources from dangers or threats, either physically or online. Therefore, security in computing will offer a wide range of protection to all the data stored in computers. Security in computing covers all aspects of computer security, which includes software, devices, operating systems, networks, databases, and data from any threats imposed on them. Some of the best practices are employed to ensure security is implemented in the computing systems includes authenticating users, the use of encryption keys, preventing the execution of malicious programs, deployment of firewalls over the network to filter packets. Other measures include the use of intrusion detection mechanisms and privacy protection.

Computer security is essential since it makes work easy for people to carry out their work, researches, and education activities. However, it Supports business procedures and the protection of critical information. It enables everyone who uses the computer or mobile devices to secure their personal or corporate data. Security in computing information is regarded as a critical component in computing since is allows only authorized users to access information. Any unauthorized user who tries to access information is denied; this can be witnessed where two rival companies want to steal valuable data from one another. This can be possible where the competing company identifies vulnerabilities in the system of the other company’s operation. Companies employ white hackers with the aim of sealing all the system loopholes to ensure that its essential data is protected.  Security in computing can be achieved by using a different types of security measures. Physical security mostly prevents the system from being accessed by unauthorized persons. It can be made by the use of personnel to guard the premises, biometric, where one is required to provide what they have or what they know to the system so that they can be allowed to access the premises. Mostly in biometrics, the credentials provided by the user, such as fingerprint, the system tries to find a match on the database. In case of a match, one is allowed to access the premise; otherwise, you denied access.

Biometrics uses an access control list mechanism, which determines the action to be taken when a request is sent to the system. A party can either be allowed or denied access to the system. The main objective of access control is to reduce the risk of unauthorized access, either physically or logically, to the system. It’s a significant component of the security observance program to ensure that all the policies in place to prevent information are observed. Privileges are also used to control the number of users who are able to access the system. Examples of these privileges are the ability to read and write a directory and execution of a file. The list can be applied differently in the operating system. The users can be a role name, for example, programmer or tester. Where users, roles, groups, the privileges can be written in strings bits, which are known as access mark. In other words, the system administrator takes the responsibility to generate the access control list.

 

 

 

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask