September 17, 2010

CASE NO. 7

Ways to Secure Computer Systems from being Compromised


1. Regularly scan your computer system

Regular Scanning of your Computer System is one of the important things to do because it helps a lot in maintaining the security to avoid losing of information stored on your computers or important files and other data.

2. Cleaning Up of your computer system

It is important to get in the habit of running a computer clean up to protect yourself against hackers that can exploit your operating system and view all of your files and where you have been on the Internet.

3. Use UPS to protect your hard disk failure and data loss due to the power failure

Uninterpretible Power Supply (UPS) is an electrical apparatus that provides emergency power to a load when the input power source, typically the fails. It provide instantaneous or near-instantaneous protection from input power interruptions by means of one or more attached batteries and associated electronic circuitry for low power users, and or by means of diesel generators and flywheels for high power users.

4. Install software programs that is compatible to your computer system

Installing software programs that is compatible to your computer system is better to avoid avoid errors in running that particular programs. And it lessen the time in installing it because it easy for the computer system to adapt that said software programs.

5. Verify File Integrity

The integrity of the file is just as important as anything in it -- both to guard against tampering and to ensure that files aren't corrupted during downloads or from being transported on bad media. Such things are rare, but they do happen, and they contribute in their own small way to what might be the only available copy of something becoming unusable.

6. Install proper Tools

Good tools make tieing off the top rail much easier and faster. Its better to use proper tools to avoid the destruction of your computer system because using unappropriate tools it tends breaks the parts of the computers.

7.
Make sure your computer is physically secure

When the computer isn't being used make sure it's switched off to minimize electricity. It also protected from all unauthorized changes that are undetectable to authorized users. In most of the hacking cases, integrity of resources is compromised.

8. Defragmentation

It is a process that reduces the amount of fragmentation in file system. It does this by physically organizing the contents of the disk to store the pieces of each file close together and contiguously It also attempts to create larger regions of free space using compaction to impede the return of fragmentation. Some defragmenters also try to keep smaller files within a single directory together, as they are often accessed in sequence.

9. Know your processes

Knowing what is running on your computer will increase your ability to identify potentially harmful processes. To make things easier, break things down into simple parts. I know it may sound silly, but your first part should be on how to turn on a computer if you know that simple process then you know how to use the computer system.

10. Know your Registry

Residual files, unused or undeleted drivers, and corrupt or bad entries in registry settings will quickly litter even the newest of computers causing a loss of performance and general PC instability. If you keep your registry clean and know what is inside, you will be in a better position to realize immediately when performance has taken a downturn. Therefore it is advisable to invest in a good registry cleaner: one that allows you to scan your registry thoroughly and fix all errors. Moreover, the cleaner must be able to backup your registry.


No comments:

Post a Comment