answersLogoWhite

0


Best Answer

It heavily depends on software installed on them.

For example, computers with Windows installed aren't very secure, unless they have a firewall and antivirus installed.

Linux is secure, unless somebody configures it to not be secure.

BSD is security-oriented, so it's very secure.

As for hardware - not very much, since one can take out a hard disk and read it elsewhere, boot a LiveCD/DVD and crack local password, etc.

User Avatar

Wiki User

13y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

11y ago

Use of simple security software such as AVG (Anti-Virus Grisoft), and the activation of Window's Firewall which is automatically done. Regular system scans will detect any new viruses. Anti-Malware software will also get rid of malware.

This answer is:
User Avatar

User Avatar

Wiki User

11y ago

To be sure of computer security, it is important to make sure one's computer is equipped with a good anti-virus as well as a firewall. Additionally, many browsers now include the capability to warn you when you attempt to access a website that may contain malware.

This answer is:
User Avatar

User Avatar

Wiki User

11y ago

The best way to ensure data security on a computer is to never include personal information in any data being saved or sent. However, as this is nearly possible to achieve, the other best ways include installing firewalls, anti-spyware, and anti-virus softwares which will give the user protection against hackers. Individuals will also want to ensure that they have strong passwords and do not download software from untrusted sources.

This answer is:
User Avatar

User Avatar

Wiki User

9y ago

There was a lot of ways on how you secure your computer but most of all, they secured their computer by putting a security code after booting up a computer.

This answer is:
User Avatar

User Avatar

Wiki User

12y ago

1. Use antivirus software and keep it up-to-date.

2. Install security patches.

3. Use a firewall.

4. Secure your browser.

This answer is:
User Avatar

User Avatar

Wiki User

13y ago

Some of the methods to assure better security are established network firewalls, computer user policies, filter rules, incoming packet inspection mechanisms, and server isolation

This answer is:
User Avatar

User Avatar

666nolen999

Lvl 2
3y ago

By downloading antivirus. I recommend the best antivirus: AVG

htt ps://ya zing.co /deals/avg/Avdollo

(Just remove probels so that link should work correctly)

This answer is:
User Avatar

User Avatar

Wiki User

8y ago

Most of it isn't.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: How is computer information protected?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What assets require protection in computer?

Everything on your computer should be protected by a firewall and anti virus software. Personal information and files should be password protected. Passwords should not be stored on the computer.


Can someone using your wireless network get your information?

If you computer and network is not protected, then yes, there is that possibility.


Why does your computer have an Administrator called PC protected?

The person that initially set the computer up created that account name. The name signifies that the account is protected against security risks. For more information on computer security visit Answers.com


Why is computer software protected by copyright?

The code is protected as a literary work.


What happen if you didn't protected your computer from viruses?

it will kill our computer


What is protected health information phi?

It is protected by FERPA laws


What is computer and internet security?

Computer security refers to be protected from the viruses present inside your computer whereas Internet security refers to be protected from the malwares those could attack your computer through Internet.


How do you remove a file from your computer if it is protected?

you dont


Which are things from which a computer must be protected?

Temperature


What laws outlaws unauthorized access to a system to acquire national defense information damage protected computers or perpetrate fraud?

Computer Fraud & Abuse Act


What is the acronyms PHI EPHI stand for?

PHI- Protected Health Information EPHI- Protected Health Information in Electronic form


Any damage to a protected computer system by fraudulent or related activities when that system is used in interstate commerce is usually reportable to the FBI under what USC statute?

TITLE 18 > PART I > CHAPTER 47 > § 1030Prev | Next(5)(A) knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage without authorization, to a protected computer;(B) intentionally accesses a protected computer without authorization, and as a result of such conduct, recklessly causes damage; or(C) intentionally accesses a protected computer without authorization, and as a result of such conduct, causes damage and loss