answersLogoWhite

0

The principle measures to be used to protect your computer security is not leaving your computer vunderable. Leaving it open for the world to see by not using anti-viruses programs or having a easy password to use.

User Avatar

Wiki User

12y ago

What else can I help you with?

Continue Learning about Computer Science

How could one describe computer security?

Computer security basically refers to the preventive and resistive measures taken to protect information, ensure integrity of the system and to prevent unauthorized access to information or computing resources. Computer security is required to protect hardware, software, sensitive information and it is enforced using software solutions (antivirus, firewall, encryption, digital certificates, authentication and authorization protocols etc) or hardware solutions (firewall, antivirus, biometrics etc). Along with hardware and software security solutions, formulating and enforcing strict policies and educating about threats are very important for computer security.


Is the computer security vulnerability at risk?

"Yes, all computer security are vulnerable to risks like the Trojan and other computer viruses or spams. If you want to protect your computer, you need to buy antivirus soft-wares."


Which two devices are used for the sole function of protecting computer equipment from theft?

You can purchase security cables with locks and security plates to protect your computer equipment from theft.


Safety Measures in Computer system?

There are a few safety measures a person can take to protect their computer system. Installing a firewall, having an anti-virus program, installing spyware, and making sure the operating system is up to date will ensure the safety of the computer system.


What security measures should you implement on your website to ensure customers data is protected?

One way to tell whether a website offers security to help protect your sensitive data is if they have a security certificate for the site matches the name of the site.

Related Questions

What security measures are in place for users of HSBC internet banking?

There is a Secure Key you create that helps protect you. You can also download Rapport on your computer to protect you against fraud and identity theft.


How can you protect your computer from virus?

get norton security!


What are the security measures in place to protect the valuable items locked with a chain?

Security measures in place to protect valuable items locked with a chain may include surveillance cameras, alarms, security guards, and secure storage facilities. These measures help deter theft and ensure the safety of the locked items.


How could one describe computer security?

Computer security basically refers to the preventive and resistive measures taken to protect information, ensure integrity of the system and to prevent unauthorized access to information or computing resources. Computer security is required to protect hardware, software, sensitive information and it is enforced using software solutions (antivirus, firewall, encryption, digital certificates, authentication and authorization protocols etc) or hardware solutions (firewall, antivirus, biometrics etc). Along with hardware and software security solutions, formulating and enforcing strict policies and educating about threats are very important for computer security.


What are the security measures in place to protect my information during a third party ACH transfer?

Security measures such as encryption, authentication, and monitoring are used to protect your information during a third party ACH transfer. These measures help ensure that your data is secure and not accessed by unauthorized parties.


Can you provide more information about the security measures in place to protect against potential threats on the exposed site?

The security measures in place on the exposed site include encryption protocols, firewalls, intrusion detection systems, and regular security audits to protect against potential threats.


What are the best security measures to protect a business, including the installation of a high-quality business door lock?

The best security measures to protect a business include installing a high-quality business door lock, using security cameras, implementing access control systems, conducting regular security audits, and training employees on security protocols.


What security measures can be used to protect one's WiFi network?

To protect one's WiFi network, there are a number of different security measures to take. The easiest and most common of these is to set up a password so that the network cannot be accessed by unwanted guests.


What has the author Bruce Schneier written?

Bruce Schneier has written: 'Schneier on security' -- subject(s): Computer networks, Computer security, Prevention, Privacy, Right of, Right of Privacy, Security measures, Terrorism 'The Twofish Encryption Algorithm' 'Applied Cryptography' -- subject(s): Security measures, Telecommunication, Computer security, Cryptography 'Liars and outliers' -- subject(s): Interpersonal relations, Sociology, Social stability, Social aspects, Trust, Social interaction, Truthfulness and falsehood 'Protect Your Macintosh' 'Beyond fear' -- subject(s): Terrorism, Prevention, War on Terrorism, 2001-, War on Terrorism, 2001-2009


How do i stop error content blocked and admistrator license?

It sounds like someone has restricted which websites you're allowed to visit ! The restrictions are there for a reason - to protect you and your computer from harm !.. We in the Wiki community will not help you circumvent the security measures someone has placed on your computer.


What is Physical safeguards?

measures used to protect the computer from making saved data be erased.


What security measures are in place to protect the door with lock from unauthorized access?

Security measures in place to protect a locked door from unauthorized access may include using high-quality locks, installing security cameras, implementing access control systems, using key cards or biometric scanners, and having security personnel monitor the area.