Bajpai, Smita; Gupta, Shalini
December 2012
Asian Journal of Computer Science & Information Technology;Dec2012, Vol. 2 Issue 12, p344
Academic Journal
Today every house has minimum 2 members who use internet all the time for chatting, e-mailing, browsing, playing games, shopping and more. Therefore it is necessary to protect your system and data from viruses, worms, Trojans, spyware and adware. Plenty of anti-virus software is developed every year that have their own strengths and weaknesses. Security administrators need to decide how much time, money, and effort needs to be spent in order to develop the appropriate security policies and controls. Each organization should analyze its specific needs and determine its resource and scheduling requirements and constraints. Computer systems, environments, and organizational policies are different, making each computer security, services and strategy unique. However, the principles of good security remain the same, and this document focuses on those principles. Although a security strategy can save the organization valuable time and provide important reminders of what needs to be done, security is not a one-time activity. It is an integral part of the system lifecycle. The activities described in this document generally require either periodic updating or appropriate revision. These changes are made when configurations and other conditions and circumstances change significantly or when organizational regulations and policies require changes. This is an iterative process. It is never finished and should be revised and tested periodically


Related Articles

  • Data Protection. Guha, Subo // Database Trends & Applications;Apr/May2014, Vol. 28 Issue 2, p30 

    The article provides helpful information for business enterprises when it comes to data protection. It presents several ways that could lead to data loss which include ignoring hardware failure, trusting co-employees to follow policies, and disregarding software corruption. Other issues such as...

  • HACKER TRACKER.  // CRN;8/6/2007, Issue 1246, p38 

    The article presents the top 5 vulnerabilities of computer security software which include Joomla Search Component Remote Command Execution Vulnerability, Sun Java Application Server JSP Source Code Disclosure Vulnerability, Trend Micro OfficeScan Authentication Bypass Vulnerability, and Apache...

  • A National RACI Chart for an Interoperable "National Cyber Security" Framework. El Kettani, Mohamed Dafir Ech-Cherif; Debbagh, Ta├»eb // Proceedings of the European Conference on Information Warfare & ;2009, p60 

    Governments worldwide have faced serious Cyberterrorism threats, in a context where interoperability of "TransNational CyberSecurity Plans" is quite absent, in order to deal with incidents. It is important to know which agency or agencies should be given the responsibility for "National...

  • Operational Aspects of Cyberwarfare or Cyber-Terrorist Attacks: What a Truly Devastating Attack Could do. Filiol, Eric // Proceedings of the European Conference on Information Warfare & ;2009, p71 

    Cyberwarfare and cyber-terrorism (mainly e-jihad) are nowadays a fashion topic. Since the Estonian attack in May 2007 and some intents of computer attacks by Al-Qaida, many papers have addressed, discussed not so say disputed about this. But those papers, for the most interesting ones, have just...

  • On the Capacity of Fingerprinting Codes against AND, Averaging, and Related Attacks. Gou Hosoya; Hideki Yagi; Manabu Kobayashi; Shigeichi Hirasawa // Journal of Information Assurance & Security;2012, Vol. 7 Issue 1, p41 

    A new attack model in which the number of colluders is distributed according to a certain probability distribution is introduced. Two classes of collusion attacks which include well-known collusion attacks in the context of multimedia fingerprinting are provided. For these two attack classes,...

  • Safety first.  // Fortune;Winter98 Special Issue Buying Guide, Vol. 137 Issue 1, p218 

    Explains techniques and products which can prevent or manage computer system problems. Prevention from self-inflicted damage; Eliminating unneeded files; Emergency booting disks; Defragmentation; Backup systems, disks, and devices; Crash prevention utilities; Anti-virus packages; Updating...

  • Lock up your data.  // MacUser;Oct2013, Vol. 29 Issue 11, p80 

    A question and answer related to protecting files containing sensitive information is presented. INSET: USING ENCRYPTED DISK IMAGES.

  • Who do you call to report a computer break-in? Is it time for Internet cops? Petreley, Nicholas // InfoWorld;10/25/99, Vol. 21 Issue 43, p118 

    Recommends the program called Swatch to handle any possible computer break-in. Series of alert encountered; Suggestion to government to protect against online privacy.

  • DATA PROTECTION.  // Buying Business Travel;Mar/Apr2013, Issue 61, p123 

    The article discusses the need to set the data protection as per the changing landscape in anticipation of new technology.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics