- Published: October 3, 2022
- Updated: October 3, 2022
- Level: College Admission
- Language: English
- Downloads: 25
Computer Security Systems The risks present in the virtual world is plenty and fast enough to steal any important information in a matter of second from one’s personal computer. Hackers, viruses, spy wares and ad wares are some of the threats that commonly cause the malfunction of computer systems. Due to the presence of these harmful threats, computer security systems were created. To further provide convenience to computer savvy people, software companies have developed this all-in-one computer security system to protect personal computers; it contains features like firewalls and antivirus software. A Firewall is effective at protecting one’s computer. Firewall sets limits to the allowable access point of users and it restricts the users from entering those sites that are suspected to be harmful. It also blocks malicious sites from opening up; this is done to ensure that the threats are unable to enter into one’s computer system. Another type of security system is the virus protection software. In installing this type of software it is important to constantly update its features, most importantly the current virus definition as it tends to change from time to time (Reardon, 2001). Actually, there are a lot of anti-virus products offered online but before one would opt to purchase it, factors like the source or the company offering it as well as the over-all product features must be taken into consideration. Upon using technological gadgets like computers, it is always vital to take the necessary precautions. Installing an antivirus software or turning on the firewall does not take a lot of energy, it only requires a person to click the button of a mouse. By doing this one is guaranteed of protection. Computers are just like human beings, once it gets affected by viruses or of something that is not a part of its system, it will malfunction and eventually end up being broken, but if preventive measures are done to protect it for sure it will continue to function well for a long period of time. Reference Reardon, T. E. 2001. Computer security in the age of the Internet. Disam Journal of International Security Assistance Management, 23 (3), 91+.