![]() In order to access a computer, the user requires some form of identification and authentication. It is used to regulate who can view or use the resources in a computer. User privilege is the permission given to a user to perform an action. This also ensures that personal data or information in the computer is secured.Įvery user of the computer can have an account created for their use, each account with different privileges. Every user’s history of activities can be tracked if the system is carefully inspected.Ī computer requires the configuration of certain control measures to ensure that privacy is maintained. In this case, every authorised user would have to log into the system. Persons who gain unauthorised access to a computer system pose a great threat to any institution.Ī computer system can be protected from security threats by assigning every authorised person user privileges or passwords in order to access it. It is essential to take measures to protect the computer from threats such as unauthorised access. Security should be ensured for both computer software and hardware. In any organisation or institution, it is always necessary to think about the security of computers, as well as the data and information stored in them. All forms of data are considered assets for an organisation or an institution. Data are usually represented in units of eight bits, which are called bytes.ĭata protection is defined as the process of safeguarding data from corruption, loss, or unauthorised access. Data refers to a collection of numbers, characters, and symbols which are held in a computer. In modern usage, the word data is accepted when expressed either in singular and plural form. Use computers safely and securely to ensure that data is protected.ĭata is the plural form of the word datum. Key Unit Competency: By the end of this unit, you should be able to:
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |