Beruflich Dokumente
Kultur Dokumente
Vol.05,Issue.06,
WWW.IJITECH.ORG June-2017,
Pages:1145-1149
Keywords: FRoDO, PoS Breaches, Effectiveness. 1. Physical security: Technical measures like login
passwords, anti-virus are essential. (More about those
I. INTRODUCTION below) However, a secure physical space is the first and
A. What is Secure Computing? more important line of defense. Is the place you keep your
Computer security (Also known as cyber security or IT workplace computer secure enough to prevent theft or access
Security) is information security as applied to computers and to it while you are away? While the Security
networks. The field covers all the processes and mechanisms Department provides coverage across the Medical center, it
by which computer-based equipment, information and only takes seconds to steal a computer, particularly a
services are protected from unintended or unauthorized portable device like a laptop or a PDA. A computer should be
access, change or destruction. Computer security also secured like any other valuable possession when you are not
includes protection from unplanned events and natural present. Human threats are not the only concern. Computers
disasters. Otherwise, in the computer industry, the term can be compromised by environmental mishaps (e.g., water,
security or the phrase computer security refers to techniques coffee) or physical trauma. Make sure the physical location
for ensuring that data stored in a computer cannot be read or of your computer takes account of those risks as well.
compromised by any individuals without authorization. Most
computer security measures involve data encryption and 2. Access Passwords: The University's networks and shared
passwords. Data encryption is the translation of data into a information systems are protected in part by login credentials
form that is unintelligible without a deciphering mechanism. (user-IDs and passwords). Access passwords are also an
A password is a secret word or phrase that gives a essential protection for personal computers in most
user access to a particular program or system. circumstances. Offices are usually open and shared spaces, so
physical access to computers cannot be completely controlled.