Skip to content
crmnuggets
Menu
  • Home
  • ABOUT
  • CRM
  • RCCG SOD
  • FACEBOOK ADS
  • TERMS
  • PRIVACY
  • HIRE ME
Menu

Follow Us On Social Media

5 Layers Of Computer Security: Analysing The Levels In Computer Security

5 Layers Of Computer Security: Analysing The Levels

Posted on July 11, 2023July 31, 2025 by Adeniyi Salau

 

Analysing Five Layers Of Computer Security

Contents hide
1 Analysing Five Layers Of Computer Security
2 #1 Physical Security
3 #2 Network Security
3.1 #3 System security
3.2 #4 Application Security
3.3 #5 User security
3.4 Action Point
3.5 Related posts:

In my previous article, I have discussed at length some of the facts that you need to know about computer security. In this article, I want to look at the five layers of computer security. Follow me as we will be analysing this together in this article.

#1 Physical Security

This has to do with the process of safeguard network hardware, computers, and other infrastructure from intruders and thieves.

Most at times, you have to ensure that computer devices are kept away from locations where they can be damaged or tampered with. You have to keep some of these data away from unauthorised access as much as possible.

#2 Network Security 

This has to do with protecting your network appliances and there services from unauthorised modification, destruction and disclosure.

This will prevent hackers and unauthorised users from having access to your network resources. 

#3 System security 

This protect system and it’s resources as well as information from corruption, theft and unauthorised access to users resources. This will ensure that computer systems available in the organisation are kept secured. 

#4 Application Security

This has to do with the use of software, hardware and procedural methods to protect applications against external attacks.

It has to do with all measures that organisations have put in place in order to ensure that users are secured when using organisations resources. 

PEOPLE ALSO READ:  Reconnaissance Attacks In Networking: How It Works
Powered by Inline Related Posts

#5 User security 

This ensures that a valid user is logged in and that the logged-in user is allowed to have access to all the resources that are needed in order to guarantee user experience. 

 

Action Point

PS: I know you might agree with some of the points raised in this article or disagree with some of the issues raised.

Please share your thoughts on the topic discussed. We would appreciate it if you could drop your comment. Thanks in anticipation.

 

WhatsApp: @CRMNuggets Community

 

 
Follow Us on Facebook: CRMNuggets
 
Follow on X Platform 

 

Follow on TikTok @crmnuggets

 

Telegram: Join Here

Sharing Is Caring. If you enjoy this article, help us share with others.
truehost

Related posts:

  1. The Ultimate Online Privacy Guide for Journalists
  2. Differences Between Wireless And Wired LANs
  3. How To Establish Incident Response Capability
  4. Understanding Diamond Model Of Intrusion Analysis

Post navigation

← Understanding The Basic Concept Of Entrepreneurship
Fundamental Concepts Of Computer Security →

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

CHECK THIS

WE GOT YOU COVERED

ads

You may also like

  1. The Ultimate Online Privacy Guide for Journalists
  2. Differences Between Wireless And Wired LANs
  3. How To Establish Incident Response Capability
  4. Understanding Diamond Model Of Intrusion Analysis

SEARCH THROUGH OUR BLOG

HOST WITH REST OF MIND

truehost

NAVIGATE HERE

WE GOT YOU COVERED

ads
© 2025 CRMNUGGETS | Powered by Minimalist Blog WordPress Theme