Wednesday 27 February 2019

2019 SS2 WEEK 8 TOPIC: FILE INSECURITY

File Security is a feature of your file system which controls which users can access which files, and places limitation on what users can do to files. For example, a file may be secured so that everyone can view it but only certain specific people may change it, while another is secured so that only the owner may view it. Folders may also be secured in this way EFFECTS OF FILE INSECURITY: The general effects of file insecurity are Data loss and overwriting DATA LOSS: Computer users and many experts often consider lost data permanently destroyed, with no hope of recovery. And because much of the information about data loss is complex, inconsistent or inaccurate, it’s not surprising that data loss and data recovery are some of the most confusing and misunderstood concepts. CAUSES OF DATA LOSS 1. Human error 2. Computer viruses 3. Natural disaster 4. Hardware or system problem 5. Software corruption or program problem OVERWRITTING: is a process of writing a binary set of data on the memory. In general it writes over the previous data, hence the name. Overwriting generally occurs when unused file system clusters are written upon wit new data. Data that has been overwritten, even just ones, is generally considered to be unrecoverable. FILE SECURITY METHOD:  Data Backup  Anti-Virus  Password protection  Labeling storage devicesFile Security is a feature of your file system which controls which users can access which files, and places limitation on what users can do to files. For example, a file may be secured so that everyone can view it but only certain specific people may change it, while another is secured so that only the owner may view it. Folders may also be secured in this way EFFECTS OF FILE INSECURITY: The general effects of file insecurity are Data loss and overwriting DATA LOSS: Computer users and many experts often consider lost data permanently destroyed, with no hope of recovery. And because much of the information about data loss is complex, inconsistent or inaccurate, it’s not surprising that data loss and data recovery are some of the most confusing and misunderstood concepts. CAUSES OF DATA LOSS 1. Human error 2. Computer viruses 3. Natural disaster 4. Hardware or system problem 5. Software corruption or program problem OVERWRITTING: is a process of writing a binary set of data on the memory. In general it writes over the previous data, hence the name. Overwriting generally occurs when unused file system clusters are written upon wit new data. Data that has been overwritten, even just ones, is generally considered to be unrecoverable. FILE SECURITY METHOD:  Data Backup  Anti-Virus  Password protection  Labeling storage devices BACKUP or the process of backing up refers to making copies of data so that these additional copies may be used to restore the original after a data loss event. There are many ways to backup files. Most computer systems provide utility programs to assist in the backup process, which can become very time consuming if there many files to safe guard. Files are often copied to removable media such as writable CDs or cartridge tapes VIRUS: A computer virus is a self-replicating program that copies itself and that can infect other programs by modifying them or their environment such that a call to an infected program implies a call to a virus. If a virus has any damaging routines, they are known as payloads or warheads. The effects of a computer virus are a loss of information or your computer will shut down or your computer might just break. Care need be apply in what we open or download on the computer Virus types vary. Most have at least one of the following goal: 1. Randomly deletes personal files 2. Send your personal files to the virus programmer 3. Destroys your operating system 4. Infiltrate (and maybe destroy) your boot sector and / or BOIS Antivirus: An antivirus is software to protect your computer from viruses that may try to infect your computer or might have already done so. There are number of antivirus packages available in the market but the most trusted and acceptable are the Norton and McAffe scan. Password Protection: Password protection can prevent people accessing computer systems, accounts, files or parts of files by requiring a user to enter password. This prevents people damaging files or getting into e-mail accounts or network accounts and disrupting them. Storage Device Labeling: You should label your devices like floppies, CDs, DVDs; Pen drives etc. so that you know what you stored in them so are not accidentally deleted or formatted. BACKUP or the process of backing up refers to making copies of data so that these additional copies may be used to restore the original after a data loss event. There are many ways to backup files. Most computer systems provide utility programs to assist in the backup process, which can become very time consuming if there many files to safe guard. Files are often copied to removable media such as writable CDs or cartridge tapes VIRUS: A computer virus is a self-replicating program that copies itself and that can infect other programs by modifying them or their environment such that a call to an infected program implies a call to a virus. If a virus has any damaging routines, they are known as payloads or warheads. The effects of a computer virus are a loss of information or your computer will shut down or your computer might just break. Care need be apply in what we open or download on the computer Virus types vary. Most have at least one of the following goal: 1. Randomly deletes personal files 2. Send your personal files to the virus programmer 3. Destroys your operating system 4. Infiltrate (and maybe destroy) your boot sector and / or BOIS Antivirus: An antivirus is software to protect your computer from viruses that may try to infect your computer or might have already done so. There are number of antivirus packages available in the market but the most trusted and acceptable are the Norton and McAffe scan. Password Protection: Password protection can prevent people accessing computer systems, accounts, files or parts of files by requiring a user to enter password. This prevents people damaging files or getting into e-mail accounts or network accounts and disrupting them. Storage Device Labeling: You should label your devices like floppies, CDs, DVDs; Pen drives etc. so that you know what you stored in them so are not accidentally deleted or formatted.

No comments:

Post a Comment