Explain The Hardware Measures To Protect The Computer System

Explain The Hardware Measures To Protect The Computer System
Explain The Hardware Measures To Protect The Computer System

Hardware Measures To Protect The Computer System

Hardware refers to the physical components that make up a computer system. There are many different kinds of hardware that can be installed inside, and connected to the outside, of a computer. The physical destruction of hardware and other equipment may be caused by the misuse or mishandling of equipment. You have to be very careful while handling equipment because it is delicate and is prone to damage.

Explain The Hardware Measures To Protect The Computer System
Explain The Hardware Measures To Protect The Computer System

Hardware security refers to the protection of computers from physical loss and damage. Security of computers from theft, physical damage etc refers to the hardware security. There are various securities measures that helps us to protect computer hardware.

Regular Maintenance
Computer is a very delicate machine. It is prone to damage. In Hardware Measures To Protect The Computer System Regular maintenance of computer is must to keep hardware components in working condition. It is also used to find and correct problems before they develop into several malfunctions. Hardware maintenance includes a call-out service and preventive maintenance cover. Software maintenance consists of fault diagnosis, and regular software updates. Similarly, software may be maintained either in house or externally. A software maintenance contract can either be taken out with the supplier or with an independent third party.

Air Conditioning System
Computer work run at normal room temperatures. The high or low temperature and humidity pose a hardware threat. High or very low humidity can also have a adverse affect on the computer equipment. This leads to a reduction in the life span of equipment. So, a good air conditioning  system is required to eradicate heat failures. The  temperature in the computer system should be maintained between 21C to 25C. Computer equipment should be used and stored at a relative humidity of 50 percent.

Dust-Free Environment
Dust is one of the major factors that cause computer components failure. It forms  an insulating blanket that traps heat next to active devices and can cause overheat. Excessive heat can cause premature aging and failure of the computer components.  So, the computer room has to be free from dust.

Protection From Theft
Theft or sabotage also pose a major threat to the security of data or information. An intruder with malicious intentions may resort to theft or sabotage to destroy critical data or information. Many people resort to theft if they are unable to adopt any other measures to destroy data. Usually, intruders take help from internal users to perform such malicious acts. For example, an intruder or a rival organization may persuade an employee to steal critical data. Employees may  also be persuaded to destroy data or equipment containing data so that the  organization incurs a loss.

Power Protection Devices
Electric power is just like a fuel for the computer. It is an electronic device that needs constant electric voltage of 220-240 volts (AC). The frequent failure  of electric power or fluctuation in electric voltage can result in the damage of computer hardware and this may result in the loss of our valuable data, program and software.  There are several power protection devices available in the market, including the Uninterruptible Power Supply (UPS), voltage regulator and surge protector.

  1. Uninterruptible Power Supply
    Uninterruptible Power Supply (UPS) is a device that allows your computer to keep running for at least a short time when the primary power source is lost. It also provides protection from power surges. it contains a battery that “kicks in” when the device senses a loss of power from the primary source. If you are using the computer when the UPS notifies you of the power loss, you have time to save any data you are working on an exit gracefully before the secondary power source runs out. When all power runs out, any data in your computer’s random  access memory (RAM) is erased. When power surges occur, a UPS intercepts the surge so that it doesn’t damage your computer.
  2. Voltage Regulator
    Voltage Regulator is a power protection device used to maintain voltage levels. The regulator sometimes uses electromechanical mechanism whereby it converts input voltage and generates stable  regulated output voltage. Voltage regulators are obtainable in a variety of outputs.
  3. Surge Protector
    Surge protector is an appliance designed to protect electrical devices from voltage spikes. A surge protector attempts to limit the voltage supplied to an electric device by either blocking or by shorting to ground any unwanted voltages above a safe threshold.

Computer Security

Computer security is a general term that covers a wide area of computing and information processing. Industries that depend on computer systems and networks to conduct daily business transactions and access crucial information regard their data as an important part of their overall assets. Network outages, data compromised by hackers, computer viruses and other incidents affect our lives in ways that range from inconvenient to life-threatening. As  the number of mobile users, digital applications and data networks increase, so do the opportunities for exploitation. Computer security refers to the protection of a computer system from accidental or intentional harm, including destruction of computer hardware and software, physical loss of data, and the deliberate invasion of databases by unauthorized individuals.

Computer Security Goals
In an organization, computer security involves securing the assets that are either a source of information or can be used to access information. These assets can range from the physical hardware and equipment to the employees of the organization. Physical assets include various items, such as data files, databases,  application software and documentation about technology, products, processes and business operations.
The goals of securing the assets or information broadly involves ensuring confidentiality, integrity and availability of assets or information.

Thank You for visiting us.
Visit again for daily updates and more tech related information.

-ThecosmoTech

You May Also Like:

Define Computer Security And It’s Goals.

What Is Search Engine?

World Wide Web, FTP & FAQ