Preview

Possible Risks Which Affect Computer System

Good Essays
Open Document
Open Document
754 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Possible Risks Which Affect Computer System
Abstract
The short report reveals about the possible risks that affecting the computer system in terms of data loss and malfunctioning of programs. By taking simple precautionary measures the unexpected hazards can be completely eliminated. The most significant preventive measure is timely backing up the data. The other involves physical safety and installation of anti-virus programs. One factor to be kept in mind is that without proper physical safety no data is safe, as the hardware parts including motherboard, processor, and storage system constitute a computer brain. Once the brain gets damaged the whole system is collapsed.

Introduction
Normally people never think of taking precautionary measures until they experience individual loss or feel the bitterness of unexpected disasters. This may also happen in most of the cases regarding back up processes against possible risks involved in information loss. There is no use of running after the data, which has already been a lost or taking bleak effort to regain it. But one has to be vigilant regarding the backup process by learning from the drastic experiences of others. If one realize about the importance of information stored in the system and feel the perspiration to create and process the data associated with it, he will never let it go by silly causes. Firstly he would concern about the protection of information by all possible ways. This short report reveals about the possible risks involved in data loss and the ways to eliminating those risks.
Possible Risks to the Data
There are several risks, which cause the data in the computer to vanish or to corrupt. Therefore different backup processes are to be adopted to protect data from different risks. Only a few numbers of backup processes are capable to handle all the risks and protect data loss. Here is a short description about the commonly seen risks to PCs.
Hardware Failure
It is termed as the most significant risk that may affect the

You May Also Find These Documents Helpful

  • Good Essays

    Bus 4060 U06A1

    • 387 Words
    • 2 Pages

    Principle violated is safeguard assets. The information saved for backup should be stored in another location, possibly in fireproof/waterproof location. If a fire were to happen in the office the backup tape being stored in a desk will do Nadine no good, she still loses the backup and the computer. Also a lock can be broken, so if someone wanted the information badly enough, it’s still accessible.…

    • 387 Words
    • 2 Pages
    Good Essays
  • Good Essays

    I would like to start off by saying that there are various threats when discussing about computer security the word threat would mean something that can indicate a danger when in relation to computer security. In this task I will be showing the Malicious damage, counterfeit goods, (software/hardware) human errors, phishing and hacking, theft of equipment, threats related to e – commerce and technical failure.…

    • 1232 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Unit 10 Assignment 1

    • 344 Words
    • 2 Pages

    * Data should constantly be tested to make sure there is no corruption or lost. The redundant servers should greatly help with this. When the data is taken off site there should be a working sever there to test the backup upon arrival. All checks should be logged.…

    • 344 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    =: No Disaster Recovery Plan: No failover = all data gets lost in a crash No backup in place…

    • 186 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Lab6 7 8 9

    • 425 Words
    • 2 Pages

    2. Because if something were to happen to the computer the backups wouldn’t be gone with the computer.…

    • 425 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Any event that causes damage to information resources, whether it is a computer virus, natural disaster or system failure could be devastating to an individual (i.e. identity theft), company, its customers, suppliers and shareholders. Failing to do so may threaten the survival of the company itself.…

    • 532 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Computers systems are an essential piece of equipment in many people’s everyday lives they have to deal with a lot of processes information and be able to go on the internet where there is a risk of getting viruses and bugs. This is why computer systems have to be equipped with the right software utilities to ensure that they are working at their best at all times. There are many different types of software utilities available for a computer system I will explain them in detail in this report.…

    • 518 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Estimated losses from malicious programs and viruses have been estimated in the billions of dollars. The costs come not only from theft of funds or information, but also the manpower and resources that it takes to find, track, and remove malicious programs, as well as replace programs or files damaged or removed. If you add in trust issues and loss of business from consumers because of data loss, the effects can be long lasting and even devastating to a business.…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    There are many precautions that can be taken to protect IT systems and data. These are as simple as:…

    • 914 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Website Migration Project

    • 3004 Words
    • 13 Pages

    * Gunther, N. J. (2006). Guerrilla Capacity Planning: A Tactical Approach to Planning for Highly…

    • 3004 Words
    • 13 Pages
    Better Essays
  • Satisfactory Essays

    unit 242

    • 658 Words
    • 3 Pages

    Threats to the system and information security can be things such as accidentally deleting a file and unauthorised access which may lead to theft of private details. Hackers and viruses also prove a huge threat to a system.…

    • 658 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Electronic storage of an organisation’s information can take various forms depending upon the size and specific industry. The benefit of electronic information storage systems is the lack of physical space that they require. Information stored electronically is also very easily backed up by a central server.…

    • 501 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 4

    • 581 Words
    • 2 Pages

    Loss of Integrity – Impact if system or data integrity is lost by unauthorized changes to the data or system.…

    • 581 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Once data is corrupted, it affects the performance of the computer because the computer is unable to load the data and the user is unable to use it. In the worst case scenario, the whole computer can become corrupted depending on how large a virus there is.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Week Discussion

    • 754 Words
    • 4 Pages

    It is important to backup your files regularly. A best practice is to select a time and day each week to complete this task, then write it on your weekly calendar.…

    • 754 Words
    • 4 Pages
    Good Essays