File Security

 

Welcome to Class !!

We are eager to have you join us !!

In today’s Computer Science class, We will be learning about File Insecurity. We hope you enjoy the class!

 

file security csc classnotesng

 

File Insecurity

This is the concept that a file is always vulnerable and is prone to be lost or missing in the computer. File security is a feature of your file system which controls which users can access which files, and places limitations on what users can do to various files in your computer.

Effect of File Insecurity

  1. Loss of Data: Computer users and experts often experience data loss when files are destroyed, and sometimes there is no hope of recovery and this is as a result of files being tampered with on the computer or through virus invasion or sudden crash of the operating system.
  2. Overwriting: This is a process of writing a binary set of data on memory. Data that has been overwritten is generally considered to be unrecoverable.
  3. Dis-orientation of the file system: As a result of someone tampering with the computer system, there may be displacement of files and re-arrangement of the file system.

 

Methods of File Security
  1. Lock computers away when leaving the office, if possible. Turn computer screens away from windows.
  2. Use surge protectors for all power outlets (variations in the electrical current can damage your computer).
  3. Back-up refers to making copies of data so that these additional copies are used to restore the original after a loss. It is also a method of making copies of the file in a separate location so that they can be restored if something happens to the computer. This can be done by using removable media such as re-writable CD, memory card, flash etc. Keep back-up information, including paper files, in a secure, separate location. Make sure your back-ups are secure by keeping them on an encrypted computer hard drive with a secure data back-up organisation or secured by sophisticated physical locks.
  4. To reduce the risk of someone accessing your computer, use a password to protect your computer and always shut down your computer when you are not using, don’t hibernate.
  5. Encrypt your files in case someone does access your computer or bypasses your password protection.
  6. If your computer is stolen or destroyed, you will still be able to recover your files if you have created a secure back-up every day. Keep the encrypted back-ups away from your office in a safe place or external hard drive.
  7. Erased files cannot be reconstructed if you have deleted them, instead of just placing them in the computer’s trash or recycle bin.
  8. A virus is a self – replicating program that copies itself and that can infect other programs by modifying them or their environment such that a call to an infected program implies a call to a virus. The use of anti-virus is important to protect your computer. An antivirus is a software used to protect your computer from viruses that may try to infect your computer or might have done so already. Anti-viruses are used to scan files in the computer in order to detect virus-infected files.
  9. Your computer can be programmed to send out your files or otherwise make you vulnerable without your knowledge. To avoid this, purchase your computer from a trusted source, format the computer hard drive when you first get it, and then only install the software you want. Only allow trusted technicians to service your computer and watch them at all times.
  10. Consider unplugging your computer’s phone connection/modem, or otherwise physically disabling your internet connection, when leaving the machine unattended. This way, rogue programs or viruses in disguise will not be able to access your computer. Never leave your computer on when you leave for the day. Consider installing software that will disable access after a certain set time of inactivity. This way, your machine is not vulnerable while you are busy with something else.
  11. In your web preferences, enable file extensions in order to tell what kind of file it is before you open it. You don’t want to launch a virus by opening an executable file that you thought was a text file. In Internet Explorer, go to the Tools menu and choose Folder Options. Click View and make sure the box Hide extensions for known file types is NOT checked.

 

 

 

We have come to the end of this class. We do hope you enjoyed the class?

Should you have any further question, feel free to ask in the comment section below and trust us to respond as soon as possible.

In our next class, we will be learning about Word Processing. We are very much eager to meet you there.

 

Pass WAEC, JAMB, POST-UTME & more in One Sitting for FREE!💃

Leave a Reply

Your email address will not be published.

Don`t copy text!