Hardware Security

Subject: Computer Basics

Find Your Query

Overview

The protection of all hardware and software components used in computer system is called computer security. This note provides an information on hardware security.
Hardware Security

The protection of all hardware and software components used in computer system is called computer security. A phenomenal amount of information now resides on computers. Individual computers as well as computers that communicate with each other in geographically-restricted local networks as well as globally, via the internet, contain billions of pages of text, graphics, and other sources of information. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users.

Threats

The entire point of computer security is to eliminate or protect against threats. A threat is any thing that can cause harm. In the context of computer security, a threat can be a burglar, a virus, cyber crime, human error, war and terrorist activity, hardware failure or natural disasters.

Scholarships after +2 Abroad Studies Opportunities

Hardware security

The protection of all hardware components used in computer system is called hardware security. Hardware security protects the machine and peripheral hardware from theft, electric hazard and vandalism of the equipment.

Types of hardware security

  • Regular maintenance
  • Insurance
  • Dust and Smoke free environment
  • Air condition
  • Power Protection device (UPS, Volt Guard and Spike Guard)

Regular maintenance:

Regular maintenance is necessary for proper functioning of the computer. We should clean our computer and its peripherals by using dust cleaner. We should scan hard disk using latest and updated antivirus software to make the system virus free.

Insurance:

The term 'insurance' is not new for us. Generally, people ensure their health, life, company, building, vehicles, etc. But nowadays people ensure their computer also. If the computer is damaged or theft, we can claim the insurance amount and get the system replaced with a new one. So, it is also a computer security measure.

Dust and Smoke Free environment:

Dust is one of the major factors which causes infection to our computer system. Dust affects external as well as internal parts of computer system. So, we should keep our computer at a dust and smoke free place. We should use dust cleaner or cover (cloth or plastic) to prevent our computer from dust. Smoke can also damage many parts of our computer system. So, we should keep our computer free from smoke.

Air condition:

We should maintain suitable temperature, moisture and circulation of air in the computer room. Low or high temperature in the computer system may cause unexpected crashes during the operation of computers. Heat can break down contracts or junctions the chip or other devices. So, there should be proper air condition to maintain suitable temperature in the computer system. Similarly, there should be enough light in the computer system.

Power Protection Device

A computer requires a steady voltage of 110 V or 220 V. The fluctuations (rise or fall) in electric voltage or frequent power failure can damage computer hardware. The device that protects the computer system from the fluctuation of electric voltage or frequent power failure is known as power protection device.

Types of Power Protection Device

  1. UPS (UninterruptedPower Supply)
  2. Volt Guard
  3. Spike Guard

1. UPS

A UPS is a power protection device which stores electricity and provides backup power automatically to the computer when required so that huge amount of data is prevented from being lost.

2. Volt Guard

A Volt Guard is an electrical regulator designed automatically to maintain a constant voltage level.

3. Spike Guard

It is also power protection device which is used to prevent computer from sudden high voltage (spikes) because in rainy season, it can control such voltage.

Things to remember
  • The protection of all hardware components used in computer system is called hardware security.
  • In the context of computer security, a threat can be a burglar, a virus, cyber crime, human error, war and terrorist activity, hardware failure or natural disasters.
  • Regular maintenance is necessary for proper functioning of the computer.
  • A computer requires a steady voltage of 110 V or 220 V.
  • It includes every relationship which established among the people.
  • There can be more than one community in a society. Community smaller than society.
  • It is a network of social relationships which cannot see or touched.
  • common interests and common objectives are not necessary for society.
Videos for Hardware Security
Hardware security module
HSM 101: What is a Hardware Security Module?
Questions and Answers
The hardware security refers to the protection of computer hardware from being damaged or lost due to accidental or international harm.
Any four hardware security measures are as follows:

  • Regular Maintenance
  • Insurance
  • Free from dust
  • Protection from fire
The computer hardware are very delicate and they require regular maintenance which helps to increase the life span of the hardware. The regular maintenance of hardware keeps the computer on good working condition and helps to find out problems in hardware and correct the problems before they cause several damages. In this way, regular maintenance helps to protect computer hardware.
The device that protects the computer system from the fluctuation of electric voltage or frequent power failure is known as power protection devices.
Any four power protection devices are as follows:

  • UPS
  • Volt guard
  • Spike guard
  • Switching power supply (SPS)

The UPS supplies back up electric power to the computer system where there is electric power failure so that user can save their unsaved work and can shut down the computer system properly. In this way, UPS protects computer hardware as well as data, files, and operating system from being damaged

The physical parts of computer that can be touched , seen and felt are called hardware.This includes the computercase, monitor, keyboard, and mouse.along with all the parts inside thecomputercase, such as the hard disk drive, motherboard, video card, and many others.

The protection of all hardware and software components used in computer system is called computer security system. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users.
There are two types of computer security system . They are hardware and software security system.

Hardware security protects the machine and peripheral hardware from theft, electric hazard and vandalism of the equipment.

Regular maintenance:

Regular maintenance is necessary for proper functioning of the computer. We should clean our computer and its peripherals by using dust cleaner.

Insurance:

The term 'insurance' is not new for us. Generally, people ensure their health, life, company, building, vehicles, etc.

Dust and Smoke Free environment:

Dust is one of the major factors which causes infection to our computer system. Dust affects external as well as internal parts of computer system.

Air condition:

We should maintain suitable temperature, moisture and circulation of air in the computer room.

Power Protection Device

A computer requires a steady voltage of 110 V or 220 V. The fluctuations (rise or fall) in electric voltage or frequent power failure can damage computer hardware.

The protection of data and programs used in computer system is known as software security.
Password Protection
A password is a secret word or phrase that provides uses access to a particular program system. Every software enable you to password-protect a variety of resources.
Backup
Backup means to store some copy of programs, operating system, compilers, data, information, etc. permanently in secondary storage devices like hard disk, floppy disk, etc.
Defragmentation
Defragmentation is the process of rewriting part of a file to contiguous sector on hard disk to increase the speed of processing.
Hard Lock Key
Some software use hard lock key which is connected to one of the ports of the computer. When software is executed it checks for hard lock. If the hard lock key is absent then the software does not execute.
Virus scanning
Computer viruses are the most effective factor of data and software. Virus may damage our data and software.
Scandisk

Scandisk is a process, which analyzes and repairs logical and physical disk errors like files, folders, bad sectors and lost chains. It can fix errors on commonly-used data storage devices.

Using a Firewall
A firewall's main purpose is to prohibit unauthorized access to your computer via the internet.
Quiz

© 2019-20 Kullabs. All Rights Reserved.