IBPS EXAMS, WWW.IBPSEXAMS.COM, IBPS Clerks, IBPS PO, IBPS RRB, Specialist Officers, SBI Jobs, Bank Jobs, IBPS Exam Materials, Short cuts, Exam Model papers, Results, Interview Tips, Latest Government Jobs, notification, recruitment, Results

Explain about Computer security / security in computer environment.

Explain about Computer security / security in computer environment.

Computer security day (CSD) is observed on 30th November every year. Security ensures effective functionality of the computer systems and has bearing on the cost effectiveness of the company. As the data stored in the computer systems is of utmost importance, its security is also gains importance.

The risks with computers are – destruction, disruption/dislocation, disclosure and modification i.e., destruction due to natural calamities, disruption/dislocation due to improper installation, improper placement, virus attacks, access and disclosure to/by unauthorized persons and modification of data by unscrupulous/unauthorized persons.

Our bank has already established comprehensive Information Systems Security Policies Standards & Procedures on all important aspects of computer security, including Acceptable Usage Policy. A few of the important policy prescriptions are mentioned below:

• Ensuring password secrecy

• Using Secure Configuration in systems

• Using Anti-Virus

• Ensuring Physical Security

• Guarding against Social Engineering (attempts by tricksters to obtain sensitive information by gaining an employee’s trust or inadvertent disclosure by employees)

We are providing core banking solutions, and multi-channel services to our customers, both in the domestic and foreign branches, and undertaking business process reengineering to improve operational efficiency and enhance customer satisfaction. Therefore, it is so important for all of us, at all levels, to resolve to adopt safe end-user practices and take precautions to protect our computer systems.

Steps to minimise losses :

• Access to computer room restricted, computer access also restricted and user-defined, need-based access with password protection should be given.

• Planning of proper computer site

• Not in vulnerable places like basements

• Fire protection

• Proper backup procedures for programs & data

• Backup arrangement for alternate site

• Screening of personnel

• Educate them on importance of security

Share :

Facebook Twitter Google+
Back To Top