Computers can be protected from: Computer theft Fires Dust Extreme temperature Voice printsA person speaks into a microphone and the computer analyses the voice. If it belongs to an authorized person, the computer allows entry to a room or allows access to a computer. Physical security
Identity CardsIn order to gain access to a room or a computer, a person may have to swipe an identity card through a card reader. Cont…….
Software security Installing anti viruses Taking precautions to avoid viruses during transfer of data such as buying pirated software CDs, used USBs, installing and use of free ware should be avoided. Data Encryption i-e The data may be encrypted (coded) into a form which can only then be decoded by the intended user. If the data falls into the wrong hands it will be meaningless.
Backing up data on regular basis. Creating transaction logs A record of all transactions made by a business since the last backup was made. Cont….