There are plenty of ways to prevent authorized access. Your first line of security is your computer password - this prevents physical intrusion at a basic level. Your second line of defense are the two brothers: Antivirus and Antimalware; often times AntiVirus programs are bundled with AntiMalware, ultimately that choice is up to you if you want to use a dedicated Antimalware program. These two programs defend and seek out intrusions via complex algorithms and comparing known attacks and symptoms by constantly monitoring your PC. While lots of AntiVirus programs offer a web-defense (defends you from shady websites) it's always good to consult your browsers' settings and enable any sort of Web Protection they offer; Chrome and Mozilla both maintain an initiative which collects user submitted info on reported websites and notifies you when you try to access one. These notifications may appear long before your AntiVirus picks them up.
If you wanted to take a step further in being actively protected, there are Keystroke Scrambler programs which scramble your keystrokes when typing - this prevents any program, such as a keylogger, from recording what you are actually typing. The scrambling software employs special algorithms which keystrokes appear normal for the user, but not for malicious software.
Lastly, the most important line of defense is common sense! Remember to remain aware of the dangers of clicking suspicious links, visiting websites you are unsure about, and downloading programs.
Any number of security systems can help block unauthorized access. Typically, access comes via three routes, physical access to the console, physical access to the computer itself, and access via network or similar connections.
Physical access to the console can be blocked by a requirement for user authentication. This can be as simple as a user ID and password, or it can require two-factor authentication using a smart card or a number generated on a key fob.
Physical access to the computer is typically blocked by physical security: locks, locked rooms, and security cables.
Network access to the computer can be filtered by means of software such as firewalls and virus scanners, and by dedicated hardware such as firewall appliances.
techniques to prevent Unauthorized Computer Access and Use?
Personal software firewalls
That's called a firewall.
Unauthorized Accessis an offence punishable with penalty upto Rs. 1 Crore. It involves access or even touching any computer, computer system or computer resource without the consent of the authorized person incharge. A major proportion of evidence in divorce cases is obtained by spouses by unauthorized accessing their partner's whats app, social media profiles and emails, and this evidence is inadmissible in a court of law as it is tainted and the party has not approached the Court with clean hands.
Physical access restrictions
The computer Misuse Act of 1990 made provision for securing computer material against unauthorized access or modification. Its impact to people is to refrain from any unauthorized use of computer data.
Computer security basically refers to the preventive and resistive measures taken to protect information, ensure integrity of the system and to prevent unauthorized access to information or computing resources. Computer security is required to protect hardware, software, sensitive information and it is enforced using software solutions (antivirus, firewall, encryption, digital certificates, authentication and authorization protocols etc) or hardware solutions (firewall, antivirus, biometrics etc). Along with hardware and software security solutions, formulating and enforcing strict policies and educating about threats are very important for computer security.
to protect a computer or network from unauthorized access
Windows Firewall
Unauthorized access is the use of a computer or network without permission. Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities.
It makes the computer vulnerable to unauthorized access through the network.
Having a computer security system is very important to protect one's computer from unauthorized access, change or destruction. The best security system is to change one's passwords on a regular basis.
A firewall is a device made to either allow or deny transmissions from other computers (particularly from the Internet) to protect the computer from unauthorized access. A firewall is necessary because, as was said, it blocks unauthorized access by hackers and disallows any files that may contain harmful data like viruses and malware.
Below is additional information about helping to secure your computer and prevent any unauthorized access from other people or software programs; helping keep your information safe.
The firewall controls what programs can access the internet and what programs from the internet can access the computer what is a firewall ?How does it work? http://computer.howstuffworks.com/computer-internet-security-channel.htm Is a security program which protects your computer from unauthorized access through the Internet. It resides on your PC and filters traffic coming and going from your computer http://www.Microsoft.com/protect/computer/firewall/faq.mspx
That's called a firewall.
Firewalls help to protect you from hackers trying to gain access to your computer. They monitor network traffic and detect suspicious activity, such as repeated pings to a specific port (which could indicate a port scan followed up by an attack) and malformed packets.
Encryption
The Computer Misuse Act was voted into law in the United Kingdom, partially based on the outcome of a 1987 case, R V Gold and Schifreen. Stephen Gold and Robert Schifreen were able to gain access British Telecom through its Prestel service by using regular home computers. They had obtained the password by shoulder Surfing at a trade show. Once they gained access to Prestel, they managed to gain access to the personal messages of Prince Philip. The Computer Misuse Act introduced three new criminal codes. They are unauthorized access to a computer, unauthorized access to a computer with the intent of engaging in further offenses, and unauthorized modification of computer information.