Making you and your activities and possessions being safe from interference or harm. It is an ever-vigilant struggle against known and unknown forces. Computer security is a process that protects data, communications, and systems from harm or failure, including accidents and acts of nature.


Tenants of Security

  • Never absolute – The best systems are often tested and retested to reaffirm their strength. These tests try their best to cover genuine dangers. Over a long enough time line, anything is possible.
  • Policy And Technical Some elements of security are highly technical while others are simple policy and procedure. For instance, security on a very large wide-area network with a fast network connection can be very difficult and require a dedicated, trained technician. Meanwhile, if no one locks their doors when they leave the office everyday per imposed procedures,
  • Communication – Internal suspicion can also harm genuinely secure systems. Possible failures in security must be reported, checked on, and follow up with.
  • Systems Thinking – Don’t focus on one thing; a security system is only as strong as its weakest link. Anytime something attempts to compromise your security, it is considered an attack.
  • Turn things off – on your computer, every open program that can connect to the Internet or, even more, be connected to is a potential security risk. Turn everything off. Nearly every computer security book on the market will recommend this first and foremost.


  1. Security often involves giving up control and ease of access. This can include locks or passwords added to prevent access to a computer or creating a separate account on a computer that is incapable of installing programs.
  2. Effective security enables users to do what they need to do safely. Too much security can often lead to Paranoia and wastes time and energy.


  • To create a secure environment specific boundaries need to be defined so that violations can be monitored. Mechanisms should be based on prevention, detection and reaction.
  • For computers, information can be copied perfectly and easily so backup is often a universal defense against failure.


Attacks against transmission of data include interruption, modification, fabrication and interception.

Using tools such as cryptography and authentication can help prevent security breeches.


Attacks include cracking, viruses, and theft. Applying patches to keep individual computers up to date is also important.


To prevent theft, physical security includes a process as simple as locking your office door when you leave or as complex as motion-detector alarms and retinal scanners.

Related Topics:

Topics of distant relation


Free Open Source Information Security Standards ]

Online security scans

Offering a basic security check (mostly for Windows systems)

TakeDown.NET -> “Security