Computer-based methods

* System backup - In IT, a backup or the process of a backup refers to the computer copying and archiving data so it may be used to restore the original data after a data loss occurrence.

* Firewalls - A firewall protects and notifies you when your system is trying to be breached, or if there are harmful files on your system. Firewalls are also useful for allowing remote access to a private network through a series of secure, authentication certificates and logins.

* Encryption - Encryption is a process of encoding messages or information in a way only authorized parties can read it. Encryption does not prevent interception, but denies the message content to them.

* Software patches/updates - Software patches and updates notify you when your computer is either out of date or just needs updating because your drivers aren't optimal anymore, patches and updates will also increase performance and run smoother if you keep up with them.

* Anti-Virus and anti-spyware software - Anti-virus software will keep your system protected from viruses, Trojans and other infected software. Anti-spyware is a type of program designed to prevent and detect unwanted spyware

program installations and to remove those programs if they were successfully installed.

* Access rights - The permissions that are granted to a user, or to an application, read/write/erase files in the computer. Access rights can be tied to a specific client or server, to folders within that machine or particular programs and data files.

* User ID's and passwords - A user ID is the "code" used by the user to identify themselves when they log into a system and begins a login session. it is used by the system to uniquely identify the user. The user ID is half of a set of credentials, the other is passwords, only the user should know their password as beyond it will have personal data and details, along with bank credentials etc.

           Why protecting IT systems & data                                   is important

Protecting IT systems and data is a very vital thing to do, we protect our data and system to ensure that everything that is held on that system is safe and secure, this is why there are so many components to keeping your data away from the risk of being stolen or viewed by unwanted people.

Users protect there data so strictly because of how easy it is (if you know how) to get hold of their details, passwords, credentials and other confidential data. Also backing-up can restore your system to an earlier date if your system is vulnerable, this will then take it back to the last (known) backup you did.

        Impact of possible security threats

Possible security threats include things such as having your system hacked into, getting DDOS'd and other possibilities from people that are capable of doing so, most users that try hacking systems will target companies, although smaller places have been known to become compromised. The people that do the hacking are usually part of a hacking group/club, or even an employee at the company (for easier access and knowledge on the security systems)

                              Evaluation

Access control is a beneficial way of limiting access to a system or informational resources. Having passwords and locks on your files mean users that are trying to access your files will require authorization (present credentials,) before they can be granted access to the systems resources. In some systems credentials come in many forms, although credentials that cannot be transferred provide with the most security.