System Security Management
Sign in

System Security Management

Student of MBA

System security is the basic requirement of any computer user, company or any organization which uses the computers.

The goal of security management system is the accuracy, integrity, & safety of all information system process & resources. Thus effective security management can minimize errors, fraud & losses in the information system that incorrect today’s companies & their customers, suppliers & their customer, supplier & other share holders.

Encryption: The process of disguising a message or data in such a way as to hide its substance.

The most widely used encryption method uses a pair of public & private keys unique to individuals. It uses public key & private keys for data encryption.

Firewalls:

A combination of hardware and software that provides a security system, usually to prevent unauthorized access from outside to an internal network or intranet. A firewall prevents direct communication between network and external computers by routing communication through a proxy server outside of the network. The proxy server determines whether it is safe to let a file pass through to the network. A firewall is also called a security-edge gateway.

E-mail Monitoring:

Internet & other online e-mail monitoring system are one of the favourite avenues of attack by hackers for spreading computer viruses or breaking into computer networks.

It is important to monitor e-mails to protect the system from viruses. Content monitoring software can be used for e-mail monitoring.

Anti Virus:

So many companies are making anti virus software for the system protection. It is very important to use an updated anti virus in your system because new viruses, worms & Malwares are coming every day. Select the suitable antivirus & protect your system from these speed breakers.

Security Codes:

Normally a multilevel password system is used for security management. The end user log on to the system by entering his or her unique password (the passwords should be a combination or words as well as digits and should be changed frequently after few days)

Backup Files:

These are duplicated files of the original data, to secure the data. Backup files can be used in case of system failure. Auxiliary memory can be used to store these backup files.

Security Monitors:

Security of a network may be provided by specialized system software packages known as system security monitors. These are the programs that monitor the use of the computer system and networks and protect them from unauthorised use, fraud & destruction. These security monitors ensure the overall security of the computer system.

Biometric Security:

Bio metric security is a fast growing area of computer security. These are security measures provided by computer devices that measure physical trade to make individual unique. This includes voice verification, finger prints, signature dynamics, keystroke analysis; retain scanning, face recognition etc.

Bio metric control devices use special purpose sensors, to measure & digitized the biometric profile of an individual’ fingerprints, voice, or other physical traits. The digitized signal is processed and compare to previously stored profile of the individual, if the profile matched with previous one then only the user is allowed to access the computer system otherwise not.

Computer Failure Controls:

A variety of controls can prevent such computer failure or minimize its effects. Computer systems fail for several reasons- power failure, telecommunication network problems hidden programming errors, viruses attacks etc.

A highly trained data centre personnel and the use of performance & security management software help to keep a company’s computer system networking properly.

For internet abuses: click on following link:-

http://www.bloxx.com/assets/downloads/bloxx_whitepaper_productivity.pdf

start_blog_img