Security of
computer
system
Software and
Hardware
Security of Computer System
Computer
security
Hardware Software
Security Security
Hardware Security
Any physical component of a computer that you can touch and
see is called hardware.
It has a definite shape.
The hardware devices
outside of a computer
inside the system unit .
outside of a computer
Inside of Computer
Possible Hardware Security Issues
Some ways that cause damage to hardware devices
Sudden flow of high voltage current
Sudden power failure
Overheat inside the system unit.
Dust gathering on computer hardware accessories (devices) and
insects
Issues related to theft
Steps 1 that can be taken to minimize
damages caused to the computer by electricity
Using UPS
Using Fuse
Using surge protection
Using UPS
During sudden power failure, UPS continues to supply power to
computer without interruption for a while.
So, it enables to give sufficient time to save the current work and
shut down the computer.
Using Fuse
Prevents damages caused to computer due to sudden flow of high
voltage current
It is widely used in power supply units and etc.
However, at present Mini Circuit Breakers-MCB are used in place of
fuse due to easy use.
Using surge protection
Protects the computer from high voltage current and lightning
Controls the flow of high voltage current to the devices and sends
it to earth
Steps 2 that can be taken to minimize
overheating inside the computer
Steps 3 that can be taken to protect
the computer from physical harm
Steps that can be taken to
protect from theft
Let’s protect Computer Software Components
Computer Software
Data and information in the computer and programmes used for
various tasks come under the category of software.
Ex: Operating System Word processing software
Files containing documents
Files containing pictures / images
Possible Software Security Issues
Protection of computer software components
Controlling unauthorized access
providing software solutions :- (logical security)
using locks and door bolts :- (physical security)
Protection against malware : - using anti-virus software
Protection against power failure, natural disasters, complications
in the operating system, deletion of files or overwrite and etc.
Keeping backups
Providing Protection against Malware
What is malicious software (malware)?
Malicious software can be defined as any man-made software or
part of a software that functions against the requirements of the
computer user and designed to intentionally cause damage to
software installed in the computer
data, information stored in the computer
computer networks and perhaps computer hardware devices as well.
Types of malware
Computer virus
A computer virus is a main malicious software
A computer virus is a harmful program that enters software and files,
makes copies of itself, and spreads from one computer to another, often
through USB drives or other portable devices.
It can delete or modify data / information and it can corrupt software as
well.
Computer worms
A computer worm is a type of harmful program that
makes copies of itself and spreads automatically from one
computer to another through networks or the internet,
without needing to attach to files or programs.
•Virus → spreads when you open or run an infected file.
•Worm → spreads on its own through networks (no need to open files).
Trojan horse
A Trojan Horse is a harmful program that looks like a useful or safe
file, but once you install or open it, it secretly gives control to
hackers or damages your computer.
Trojan Horse story in history – it looks like a gift from outside,
but inside it hides enemies.
A Trojan Horse program looks like something good (a game,
tool, or free software).
But inside, it hides something bad (a virus or malware) that can
harm the computer.
Spyware
Spyware is a type of harmful software that secretly watches what
you do on your computer.
It can track your passwords, messages, and websites you visit.
It often installs without you knowing.
The stolen information is sent to hackers.
Just like a spy in real life secretly watches people, spyware
secretly watches your computer activities.
malicious software Comparison
Type Icon How it Spreads What it Does
Attaches to files,
Damages files, slows
Virus 🦠 spreads when
computer
opened
Spreads by itself Fills network, makes
Worm 🪱
through networks system slow
Looks safe but hides Lets hackers in,
Trojan 🐎
danger steals data
Watches you, steals
Spyware 👀 Installs secretly
info
Keeping Backups
keeping copies of software components.
backups can be used in case the original copy is misplaced or
damaged.
Several storage techniques can be applied to keep backups.
Compact disks (CD) Digital Video Disks (DVD) external hard disks
Different location in the same computer or network (another folder or
another drive)
Access Control
What is Access Control?
Access control means controlling who can enter or use a place,
system, or file — like using a key to open a door, but in digital form.
Software Solutions for Access Control
These are programs or apps that help manage who is allowed to
access certain information, computers, or buildings.
1. Login Systems
People must enter a username and password to access
the system.
Example: Logging into a website or email.
2. Two-Factor Authentication (2FA)
After the password, you also need a code from your phone or email.
Adds an extra layer of security.
Software Solutions for Access Control
3. User Roles and Permissions
Software can give different access levels to different people.
Example: A student can see their grades, but a teacher can change them.
4. Biometric Access
Uses fingerprint, face, or eye scans to allow access.
Common on smartphones and secure areas.
5. File Access Control
Controls who can view, edit, or delete a file.
Example: Only managers can open salary reports.
6. Time-Based Access
Allows access only during certain hours.
Example: Employees can log in only during work hours.
Use of physical locks for access control
Keeping the computer at a secure place.
Use of CCTV cameras and alarms