Computers come with a number of security features to protect users' data and computers.
You will study three
safety and security features in this unit, which are as follows:
PASSWORDS
Passwords are the primary security feature on the majority of computers and internet services. A computer can
be made password-protected so that only those with the password can access it and its contents. You should be
the only person with access to your computer if you create a strong password that you keep private.
When using online services, all it takes is your password to prevent someone from trying to log into your account
from anywhere in the world. Use the following tips to ensure that your password is as safe as possible:
• Make sure your password is lengthy—at least eight characters.
• Your password should contain both capital and lowercase letters, as well as digits.
• Never use your birthdate or the name of your favourite sports team as part of your password.
• Make distinct passwords for every website you visit. In this manner, your online banking password
cannot be used by someone who hacks your social media account.
• Keep your passwords private and confidential. Don't write them down or share them with anyone.
https://qrs.ly/vca5qel
ENCRYPTION
Encryption is the final computer security measure. Any data transferred between two computers is transformed
using encryption from usable data to be encrypted data that is challenging for unauthorized users to decrypt and
use. The encryption key, which is only known by the receiving computer, is necessary in order to decrypt the
encrypted data and restore it to its original form.
The HTTPS (Hypertext() Transfer Protocol Secure) protocol, which is used by the majority of websites today,
guarantees that all data transferred to and from the website is encrypted. Today's online services also encrypt
user data in their databases, so even in the unlikely event that a hacker gains access
to the database, they won't be able to read every user's username and password.
MULTI-LAYER VERIFICATION
Similar to a password, multi-layer authentication requires a computer user to provide two or more pieces of
evidence to the authentication mechanism in order to be granted access.
• Knowledge (that which the user alone is aware of) For example, your mother's middle name or ID
number
• Possession (something that belongs to the user alone), such as accepting authentication through a
different device
• As well as inherent (what the user is, and only the user is) for instance, fingerprint or voice verification