Informatics Practices

Internet provides great opportunities for business to reach new markets and more customers than ever before, but unfortunately, with those opportunities come some e-security risks. Information security CIA (Confidentially, Integrity and Authentication) protects our computer system. Cyber crime involves a computer and a network. It is an unlawful act where in the computer is either a tool or a target or both. Desktop Security is a mechanism to stop entry of viruses and other threats.Technical risks can be avoided by taking access control, using firewalls and virus scanner etc. Authorised user can only be allowed to access internet for the transaction. Password and biometric should be made to check the authorisation of the user.A virus scanner is a computer program that checks files for the presence of computer viruses.Encryption is the conversion of data into a form, called a cipher text that cannot be easily understood by unauthorized people. Encrypted data is converted back into its original form, so it can be understood.

Network security involves the authorization of access to data in a network, which is controlled by network administrator. Network security is accomplished through hardware and software. The software must be constantly updated and managed to protect data from emerging threats. File access permissions are characteristics given by users or network administrators on a network that prevent or allow access to files on a computer network. A firewall is a security system that acts as a protective boundary between a network and the outside world. Digital signatures ensure the authenticity of the signer.

To Access the full content, Please Purchase